Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
104s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/10/2024, 15:42
Behavioral task
behavioral1
Sample
ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe
Resource
win10v2004-20241007-en
General
-
Target
ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe
-
Size
1.6MB
-
MD5
8ce0a9103ab10fed54094a3a2d1146e0
-
SHA1
4aef0ddaa8d065170c0ff2cc099c31aa6b1085aa
-
SHA256
ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0
-
SHA512
cf0adcb740f1eec83e6477bc487cf3a0d152222e08f186b78a674e0e9178b591e7088c5a2d2763dbd6eed55e3eef2bbdfaddf1791158e7dad7c891577f71e76f
-
SSDEEP
24576:NsoVH984fBm2iMbyrpEGwFQ0Gm3eQk31V6hK5r898Qs:NAtJeGwkm3eQk31rF8V
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3248 1780 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2532 1780 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4312 1780 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1340 1780 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2460 1780 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 596 1780 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3812 1780 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1764 1780 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 928 1780 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3868 1780 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3968 1780 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2244 1780 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2056 1780 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 748 1780 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3660 1780 schtasks.exe 84 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe -
resource yara_rule behavioral2/memory/4828-1-0x00000000001A0000-0x0000000000340000-memory.dmp dcrat behavioral2/files/0x0007000000023cc5-25.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe -
Executes dropped EXE 1 IoCs
pid Process 1592 winlogon.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files\Google\1df779c366e423 ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe File created C:\Program Files\Uninstall Information\dllhost.exe ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe File created C:\Program Files\Uninstall Information\5940a34987c991 ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe File created C:\Program Files (x86)\Windows Sidebar\winlogon.exe ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe File created C:\Program Files (x86)\Windows Sidebar\cc11b995f2a76d ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe File opened for modification C:\Program Files\Java\RuntimeBroker.exe ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe File created C:\Program Files\Java\9e8d7a4ca61bd9 ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe File created C:\Program Files\Google\ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe File created C:\Program Files\Java\RuntimeBroker.exe ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-ie-imagesupport_31bf3856ad364e35_11.0.19041.746_none_5fa627937b52585b\winlogon.exe ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2532 schtasks.exe 1340 schtasks.exe 928 schtasks.exe 3968 schtasks.exe 748 schtasks.exe 3660 schtasks.exe 3248 schtasks.exe 596 schtasks.exe 1764 schtasks.exe 2244 schtasks.exe 2460 schtasks.exe 2056 schtasks.exe 4312 schtasks.exe 3812 schtasks.exe 3868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4828 ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe 1592 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4828 ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe Token: SeDebugPrivilege 1592 winlogon.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4828 wrote to memory of 1592 4828 ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe 104 PID 4828 wrote to memory of 1592 4828 ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe 104 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe"C:\Users\Admin\AppData\Local\Temp\ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4828 -
C:\Program Files (x86)\Windows Sidebar\winlogon.exe"C:\Program Files (x86)\Windows Sidebar\winlogon.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1592
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files\Java\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Java\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files\Java\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0Na" /sc MINUTE /mo 7 /tr "'C:\Program Files\Google\ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N" /sc ONLOGON /tr "'C:\Program Files\Google\ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0Na" /sc MINUTE /mo 6 /tr "'C:\Program Files\Google\ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files\Uninstall Information\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Program Files\Uninstall Information\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Sidebar\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Sidebar\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3660
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD58ce0a9103ab10fed54094a3a2d1146e0
SHA14aef0ddaa8d065170c0ff2cc099c31aa6b1085aa
SHA256ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0
SHA512cf0adcb740f1eec83e6477bc487cf3a0d152222e08f186b78a674e0e9178b591e7088c5a2d2763dbd6eed55e3eef2bbdfaddf1791158e7dad7c891577f71e76f