Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2024, 08:14
Behavioral task
behavioral1
Sample
ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe
Resource
win10v2004-20241007-en
General
-
Target
ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe
-
Size
783KB
-
MD5
665d25b23b263b2654de48bfefeb68e0
-
SHA1
fbe169375d8b8d4864cf924495f9c3559d0e86bf
-
SHA256
ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2
-
SHA512
1b3688f94a1e390b411b3224c1681d2cfdb63a7cf3277b8cb168a29c59c8af017526938a36b06b481dcf9317befef5d9e16a3c2aa9f572ce5189c04e89a718c2
-
SSDEEP
12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3808 1492 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1436 1492 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2976 1492 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2408 1492 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 208 1492 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1732 1492 schtasks.exe 84 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" backgroundTaskHost.exe -
resource yara_rule behavioral2/memory/3260-1-0x0000000000800000-0x00000000008CA000-memory.dmp dcrat behavioral2/files/0x0007000000023c9c-33.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe -
Executes dropped EXE 1 IoCs
pid Process 4936 backgroundTaskHost.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Windows\\SystemApps\\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\\InputApp\\SuggestionUI\\TextInputHost.exe\"" ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Windows\\System32\\TetheringMgr\\backgroundTaskHost.exe\"" ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\PerfLogs\\Registry.exe\"" ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\Program Files\\Internet Explorer\\es-ES\\sihost.exe\"" ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\RMActivate\\RuntimeBroker.exe\"" ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\PerfLogs\\explorer.exe\"" ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\System32\RMActivate\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe File opened for modification C:\Windows\System32\TetheringMgr\RCX9721.tmp ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe File opened for modification C:\Windows\System32\TetheringMgr\backgroundTaskHost.exe ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe File opened for modification C:\Windows\System32\RMActivate\RCX9D2F.tmp ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe File opened for modification C:\Windows\System32\RMActivate\RuntimeBroker.exe ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe File created C:\Windows\System32\TetheringMgr\backgroundTaskHost.exe ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe File created C:\Windows\System32\TetheringMgr\eddb19405b7ce1152b3e19997f2b467f0b72b3d3 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe File created C:\Windows\System32\RMActivate\RuntimeBroker.exe ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\es-ES\sihost.exe ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe File created C:\Program Files\Internet Explorer\es-ES\66fc9ff0ee96c2b21f0cfded48750ae9e3032bf3 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\RCX9B2B.tmp ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\sihost.exe ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\SuggestionUI\22eafd247d37c30fed3795ee41d259ec72bb351c ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\SuggestionUI\RCX951D.tmp ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe File created C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\SuggestionUI\TextInputHost.exe ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\SuggestionUI\TextInputHost.exe ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1732 schtasks.exe 3808 schtasks.exe 1436 schtasks.exe 2976 schtasks.exe 2408 schtasks.exe 208 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3260 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe 3260 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe 3260 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe 3260 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe 3260 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe 3260 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe 3260 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe 3260 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe 3260 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe 3260 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe 3260 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe 3260 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe 3260 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe 3260 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe 4936 backgroundTaskHost.exe 4936 backgroundTaskHost.exe 4936 backgroundTaskHost.exe 4936 backgroundTaskHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3260 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe Token: SeDebugPrivilege 4936 backgroundTaskHost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3260 wrote to memory of 3192 3260 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe 97 PID 3260 wrote to memory of 3192 3260 ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe 97 PID 3192 wrote to memory of 3448 3192 cmd.exe 99 PID 3192 wrote to memory of 3448 3192 cmd.exe 99 PID 3192 wrote to memory of 4936 3192 cmd.exe 101 PID 3192 wrote to memory of 4936 3192 cmd.exe 101 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" backgroundTaskHost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe"C:\Users\Admin\AppData\Local\Temp\ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2N.exe"1⤵
- UAC bypass
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3260 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RyfzN4eHKA.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3448
-
-
C:\Windows\System32\TetheringMgr\backgroundTaskHost.exe"C:\Windows\System32\TetheringMgr\backgroundTaskHost.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4936
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\SuggestionUI\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\System32\TetheringMgr\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\PerfLogs\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\es-ES\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\RMActivate\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\PerfLogs\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1732
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219B
MD576f93d7b61dcf944d531a8b9c6dcfd1a
SHA126b86ff06f07cc1ae0fddfb34ee4aaea61f77251
SHA25624f497cbe9f9086e61487baebdfde1ff7e37ef6185d596055aa4c8db67341a4c
SHA512e4618d5b60dab4305dbc76f6e520b677ae47c2b29b2bc092cf0703638d820299f92dfa1df4ab30acac3a1b2c4841948d72a5b61d6ae9739e483beb6226fb5510
-
Filesize
783KB
MD5665d25b23b263b2654de48bfefeb68e0
SHA1fbe169375d8b8d4864cf924495f9c3559d0e86bf
SHA256ab18a7676dc9644e7ed41a2bc3ff1951da21d9a246493296d984b7aea82625e2
SHA5121b3688f94a1e390b411b3224c1681d2cfdb63a7cf3277b8cb168a29c59c8af017526938a36b06b481dcf9317befef5d9e16a3c2aa9f572ce5189c04e89a718c2