Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    37s
  • max time network
    28s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 22:51

General

  • Target

    d83eeb76d1dd2ff2b4786506b0a10b10N.exe

  • Size

    1.3MB

  • MD5

    d83eeb76d1dd2ff2b4786506b0a10b10

  • SHA1

    d7dab29809264a786ea3f8f8988d7ab22e02b754

  • SHA256

    9a3b444bd26b5b3e29f8328ded81bb66db55f45dfba063c4772ddeae9b82d3c3

  • SHA512

    45e606414c5cbc8057288299e285a6c09e8bf74894cc1d40e97f2b8df4d4305705c27e7d21f5023e9de1e100ea01b95ed51a5532d636bcea08a4ee172252360f

  • SSDEEP

    24576:BgYeYeZ3mh8EZ+pygc78oigPVf1US2SCLW+4:BeYz+pd7ZxNF

Malware Config

Signatures

  • DcRat 7 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 5 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in System32 directory 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d83eeb76d1dd2ff2b4786506b0a10b10N.exe
    "C:\Users\Admin\AppData\Local\Temp\d83eeb76d1dd2ff2b4786506b0a10b10N.exe"
    1⤵
    • DcRat
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FyGP3wHUI6.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2380
        • C:\ProgramData\Microsoft\OFFICE\UICaptions\1036\d83eeb76d1dd2ff2b4786506b0a10b10N.exe
          "C:\ProgramData\Microsoft\OFFICE\UICaptions\1036\d83eeb76d1dd2ff2b4786506b0a10b10N.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2872
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\557b1d5a-06da-4f4f-9fd4-3346414d8987.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1964
            • C:\ProgramData\Microsoft\OFFICE\UICaptions\1036\d83eeb76d1dd2ff2b4786506b0a10b10N.exe
              C:\ProgramData\Microsoft\OFFICE\UICaptions\1036\d83eeb76d1dd2ff2b4786506b0a10b10N.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:900
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\44bdeec1-4e8f-4c60-a6aa-6be2f7d11fdc.vbs"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1864
                • C:\ProgramData\Microsoft\OFFICE\UICaptions\1036\d83eeb76d1dd2ff2b4786506b0a10b10N.exe
                  C:\ProgramData\Microsoft\OFFICE\UICaptions\1036\d83eeb76d1dd2ff2b4786506b0a10b10N.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1528
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\217d266b-755e-4448-81db-705f0cf2e948.vbs"
                6⤵
                  PID:1732
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rkcF5G0aX5.bat"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2052
                  • C:\Windows\system32\w32tm.exe
                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                    7⤵
                      PID:1784
                    • C:\ProgramData\Microsoft\OFFICE\UICaptions\1036\d83eeb76d1dd2ff2b4786506b0a10b10N.exe
                      "C:\ProgramData\Microsoft\OFFICE\UICaptions\1036\d83eeb76d1dd2ff2b4786506b0a10b10N.exe"
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2392
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\43e3a7df-0303-4c93-94f1-af004f23da49.vbs"
                4⤵
                  PID:2160
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6ojzqIZqDm.bat"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2060
                  • C:\Windows\system32\w32tm.exe
                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                    5⤵
                      PID:604
                    • C:\ProgramData\Microsoft\OFFICE\UICaptions\1036\d83eeb76d1dd2ff2b4786506b0a10b10N.exe
                      "C:\ProgramData\Microsoft\OFFICE\UICaptions\1036\d83eeb76d1dd2ff2b4786506b0a10b10N.exe"
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1728
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\tspkg\WmiPrvSE.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:760
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\tintlgnt\csrss.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2784
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\iassdo\wininit.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2624
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "d83eeb76d1dd2ff2b4786506b0a10b10N" /sc ONLOGON /tr "'C:\ProgramData\Microsoft\OFFICE\UICaptions\1036\d83eeb76d1dd2ff2b4786506b0a10b10N.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1796
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\cryptui\lsm.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1688

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\43e3a7df-0303-4c93-94f1-af004f23da49.vbs

              Filesize

              537B

              MD5

              0ff92a639429e05c19ac8b76b43a9c0e

              SHA1

              79694e1adb6e7616db9e8c772c47e8227f893135

              SHA256

              26a6472221c6448bcb94c3f4979290999ec577771a9ad94d4195f9223e0b1a76

              SHA512

              e57939410ba40d78e66982a173c1fe64521f3446fcd8b8f817c55a7e04a348f1aec57cc9c1a9fa48f38e04d50500365e82d3922f7fc360f8d1129e50ef27ed65

            • C:\Users\Admin\AppData\Local\Temp\44bdeec1-4e8f-4c60-a6aa-6be2f7d11fdc.vbs

              Filesize

              760B

              MD5

              2ffe8654afa29d1b225b9c1c44050a39

              SHA1

              740b963d1e8bf0db16a208766edd19d65a77a921

              SHA256

              7350dad10927ab8d3b2bdb88aca9761e5e7cdba90fc02ec0660701387fe9736a

              SHA512

              ddc98f5a615252bfce9a29cffceb702ba6c7e51df876925125ca5f45042e911c683e022a0e84f9d1cf8c2e8785abfc939479d4fb23ef13b628f45cbd7995c300

            • C:\Users\Admin\AppData\Local\Temp\557b1d5a-06da-4f4f-9fd4-3346414d8987.vbs

              Filesize

              761B

              MD5

              987e04caaf126a3fd6599bf5d3810c53

              SHA1

              c62306137583946289569a62e6360cd62985971b

              SHA256

              64afc34e38ced04b620fe61804cd85810c0498af4872c178c78a0df76ea38e96

              SHA512

              d7eca6f0bf485d99a21e13b6aae8399b1a6c832c9a4384f0cf7b266617866c7a8acd2aa901c1cede52a6aa09805ec3f673178f433d9f4ffc086af8dc95554131

            • C:\Users\Admin\AppData\Local\Temp\6ojzqIZqDm.bat

              Filesize

              249B

              MD5

              473c111f8fbe20273d0e0067730be6c9

              SHA1

              1005795a4cc5e1e5d6ee230526aab98cc1bc9cc7

              SHA256

              c46e1ed4d95ae2de0919316d7c86d9b4d0596b7d20f6e4ef801adc1ae878c982

              SHA512

              e91344fcc814e18d97153a0bf1f3033e1205824a0c9d931d32b0c37f6f4cd14fa0c5596d27280b2c1b462af428f3bb2a6a9363faaa4a4492ad901f20838a6baf

            • C:\Users\Admin\AppData\Local\Temp\FyGP3wHUI6.bat

              Filesize

              249B

              MD5

              9d917b1958634024d04f0d0d91e4e4fb

              SHA1

              ff5140bf8fd761ea7f8a45650134c14e56d75888

              SHA256

              6b705615506040da25475028c1266bcfc2d9c38c5740173573c161b6f0aff001

              SHA512

              60dee664be944bc0b3b0e96ed7c53c5231abaafe7dd596da359469cebaaa40158e09eb83b049fcb66faff80c871778c3e7ad2df90f41592b467c369c8b5539bc

            • C:\Users\Admin\AppData\Local\Temp\rkcF5G0aX5.bat

              Filesize

              249B

              MD5

              7d1a3e699929de66ae518e4db645cbee

              SHA1

              ef4612705103c87dc47ce940d7ef23e9b670ab65

              SHA256

              12df48c4ed2b9fd19c3034eff08fba467c6de18f2d5eebf3b6903f0c65d60102

              SHA512

              8b5a5c9de2cff540a1f339de157dff31541201b993706117bf150a290324bfad7a8bc3100f3ea1b10412c92e0ac5715c38cfbb1e5bc540d6fc2a867a0ec62204

            • C:\Windows\System32\cryptui\lsm.exe

              Filesize

              1.3MB

              MD5

              d83eeb76d1dd2ff2b4786506b0a10b10

              SHA1

              d7dab29809264a786ea3f8f8988d7ab22e02b754

              SHA256

              9a3b444bd26b5b3e29f8328ded81bb66db55f45dfba063c4772ddeae9b82d3c3

              SHA512

              45e606414c5cbc8057288299e285a6c09e8bf74894cc1d40e97f2b8df4d4305705c27e7d21f5023e9de1e100ea01b95ed51a5532d636bcea08a4ee172252360f

            • C:\Windows\System32\cryptui\lsm.exe

              Filesize

              1.3MB

              MD5

              70988cdcd01a6e85730eaa7ab777eb1d

              SHA1

              c56d27faf092d816bf7a60179b6d30dd72d162b6

              SHA256

              bb6e60ae1b9797a2a4a598ea928f480117b5b809d8c0759a22bdac0707386b87

              SHA512

              5eba5fa5bad67f19532e719913198100a0db99b707ce9d5d1146f2e347415818c9337ddf77f137bb1960d657f4acad329da63fa95189dd8b833941d10058d589

            • memory/900-109-0x0000000000A70000-0x0000000000BBC000-memory.dmp

              Filesize

              1.3MB

            • memory/2240-9-0x0000000000730000-0x000000000073A000-memory.dmp

              Filesize

              40KB

            • memory/2240-0-0x000007FEF5C03000-0x000007FEF5C04000-memory.dmp

              Filesize

              4KB

            • memory/2240-10-0x0000000000760000-0x000000000076C000-memory.dmp

              Filesize

              48KB

            • memory/2240-8-0x0000000000720000-0x000000000072C000-memory.dmp

              Filesize

              48KB

            • memory/2240-7-0x0000000000740000-0x0000000000750000-memory.dmp

              Filesize

              64KB

            • memory/2240-90-0x000007FEF5C00000-0x000007FEF65EC000-memory.dmp

              Filesize

              9.9MB

            • memory/2240-6-0x0000000000710000-0x0000000000720000-memory.dmp

              Filesize

              64KB

            • memory/2240-4-0x00000000004E0000-0x00000000004E8000-memory.dmp

              Filesize

              32KB

            • memory/2240-5-0x0000000000700000-0x0000000000710000-memory.dmp

              Filesize

              64KB

            • memory/2240-3-0x0000000000250000-0x0000000000258000-memory.dmp

              Filesize

              32KB

            • memory/2240-2-0x000007FEF5C00000-0x000007FEF65EC000-memory.dmp

              Filesize

              9.9MB

            • memory/2240-1-0x0000000000810000-0x000000000095C000-memory.dmp

              Filesize

              1.3MB

            • memory/2872-93-0x0000000000A30000-0x0000000000B7C000-memory.dmp

              Filesize

              1.3MB