Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22/11/2024, 11:29
Behavioral task
behavioral1
Sample
8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe
Resource
win10v2004-20241007-en
General
-
Target
8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe
-
Size
952KB
-
MD5
41ccbb9f4e1b3b8acbe42f57842a6ab9
-
SHA1
777288aa34f632b9279a0ef0ef571ed8c32f6ede
-
SHA256
8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88
-
SHA512
b1030ff32bea991d7d1ce92fb6eebdeefb2637cc808becc73ff511112c8079cc7228891ab217d51953b22b768c339eaafe6052a6ba1b3b74fb78c6997d8c27e9
-
SSDEEP
24576:W+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXXe:x8/KfRTKQ
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Photo Viewer\\fr-FR\\audiodg.exe\"" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Photo Viewer\\fr-FR\\audiodg.exe\", \"C:\\ProgramData\\Documents\\lsass.exe\"" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Photo Viewer\\fr-FR\\audiodg.exe\", \"C:\\ProgramData\\Documents\\lsass.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\lsm.exe\"" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Photo Viewer\\fr-FR\\audiodg.exe\", \"C:\\ProgramData\\Documents\\lsass.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\lsm.exe\", \"C:\\PerfLogs\\Admin\\explorer.exe\"" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Photo Viewer\\fr-FR\\audiodg.exe\", \"C:\\ProgramData\\Documents\\lsass.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\lsm.exe\", \"C:\\PerfLogs\\Admin\\explorer.exe\", \"C:\\Recovery\\3a99bb82-4e15-11ef-8354-cae67966b5f6\\OSPPSVC.exe\"" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe -
Process spawned unexpected child process 5 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2960 3032 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3008 3032 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2708 3032 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2692 3032 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 840 3032 schtasks.exe 30 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe -
resource yara_rule behavioral1/memory/2744-1-0x0000000000240000-0x0000000000334000-memory.dmp dcrat behavioral1/files/0x000600000001933b-20.dat dcrat behavioral1/files/0x0009000000019926-47.dat dcrat behavioral1/files/0x000b0000000186dd-82.dat dcrat behavioral1/memory/1088-93-0x0000000000050000-0x0000000000144000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 1088 audiodg.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\PerfLogs\\Admin\\explorer.exe\"" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\PerfLogs\\Admin\\explorer.exe\"" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Recovery\\3a99bb82-4e15-11ef-8354-cae67966b5f6\\OSPPSVC.exe\"" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Recovery\\3a99bb82-4e15-11ef-8354-cae67966b5f6\\OSPPSVC.exe\"" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\fr-FR\\audiodg.exe\"" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\ProgramData\\Documents\\lsass.exe\"" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Program Files (x86)\\Windows Portable Devices\\lsm.exe\"" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\fr-FR\\audiodg.exe\"" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\ProgramData\\Documents\\lsass.exe\"" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Program Files (x86)\\Windows Portable Devices\\lsm.exe\"" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\audiodg.exe 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\42af1c969fbb7b2ae36b0e06bea61fc9a154b4af 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\RCX81EE.tmp 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\RCX81EF.tmp 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\RCX8666.tmp 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\audiodg.exe 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe File created C:\Program Files (x86)\Windows Portable Devices\101b941d020240259ca4912829b53995ad543df6 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\RCX8665.tmp 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\lsm.exe 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe File created C:\Program Files (x86)\Windows Portable Devices\lsm.exe 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2960 schtasks.exe 3008 schtasks.exe 2708 schtasks.exe 2692 schtasks.exe 840 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2744 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2744 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Token: SeDebugPrivilege 1088 audiodg.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2744 wrote to memory of 1088 2744 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe 36 PID 2744 wrote to memory of 1088 2744 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe 36 PID 2744 wrote to memory of 1088 2744 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe 36 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe"C:\Users\Admin\AppData\Local\Temp\8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2744 -
C:\Program Files (x86)\Windows Photo Viewer\fr-FR\audiodg.exe"C:\Program Files (x86)\Windows Photo Viewer\fr-FR\audiodg.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1088
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\ProgramData\Documents\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\PerfLogs\Admin\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:840
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
952KB
MD541ccbb9f4e1b3b8acbe42f57842a6ab9
SHA1777288aa34f632b9279a0ef0ef571ed8c32f6ede
SHA2568437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88
SHA512b1030ff32bea991d7d1ce92fb6eebdeefb2637cc808becc73ff511112c8079cc7228891ab217d51953b22b768c339eaafe6052a6ba1b3b74fb78c6997d8c27e9
-
Filesize
952KB
MD58a13538db71d4f5ca22acd4c67bfa273
SHA1560155934eeecb51d73406e4c503399e9e797658
SHA256359d1e19cd592dbe371178dc13f951c36ab20635308781f85aa5d9a3825283ef
SHA5125c522d33738eeb616df33050ed3fad7f692e2fe818f339a48127f13307d1baa7b90e06fe7332743c7cdb28f3e829481f5d6104057de5c8967bcfd7688eba8462
-
Filesize
952KB
MD5b267daae410d295921f6b417278c3f7c
SHA1afad6dd15f4da35ba87870fd6734f426dec7fe6e
SHA2563bb9730d3dc4dfcb377831df9302625ef9a00dbcbf961ddbe36eb3cd45dc7294
SHA51253ae9a712f3d1001ea91440ff82413a0b1d2d2df4b52d8a987bb3e491bfb3af8358fa6fa1f561dca7c6b87d3ada6aa425be5d26cdd18b21fa8ac860349a6ae7a