Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 16:25
Behavioral task
behavioral1
Sample
8b67c5a17d70755e35ef3f2ea8c949c1d57d324cd91289102598d1547bcffed7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8b67c5a17d70755e35ef3f2ea8c949c1d57d324cd91289102598d1547bcffed7N.exe
Resource
win10v2004-20241007-en
General
-
Target
8b67c5a17d70755e35ef3f2ea8c949c1d57d324cd91289102598d1547bcffed7N.exe
-
Size
1.4MB
-
MD5
2a3c1d84e60706342147aac7f0240c60
-
SHA1
19b61cc258f44a8cbead3b7cc312ffb184b8ee1e
-
SHA256
8b67c5a17d70755e35ef3f2ea8c949c1d57d324cd91289102598d1547bcffed7
-
SHA512
13f68a2a4bfacd33bcbd1a1b941dd343d747accdd236b1d2ddd57ea210f606fa6dd224809b3a839c9b553aeba2b88386cf2f1e5e7e62fe995df358024672cf3b
-
SSDEEP
24576:U2G/nvxW3Ww0teOtQEIQ/E8pi63hn89pN3bfqaeTBHLChWFBAtlIBGIP5M:UbA30cn8Y6d89f3e5LhFSnIBhG
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 21 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2780 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2976 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2756 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2672 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2648 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2696 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2180 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2168 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2036 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2708 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2812 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2836 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1656 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1164 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1716 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1056 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1276 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2852 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2844 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2960 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 2744 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x0007000000018687-9.dat dcrat behavioral1/memory/2320-13-0x0000000000A60000-0x0000000000B84000-memory.dmp dcrat behavioral1/memory/2284-37-0x0000000000940000-0x0000000000A64000-memory.dmp dcrat -
Executes dropped EXE 2 IoCs
pid Process 2320 bridgereviewwin.exe 2284 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 2252 cmd.exe 2252 cmd.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\System.exe bridgereviewwin.exe File created C:\Program Files\7-Zip\Lang\27d1bcfc3c54e0 bridgereviewwin.exe File created C:\Program Files (x86)\Windows Mail\ja-JP\csrss.exe bridgereviewwin.exe File created C:\Program Files (x86)\Windows Mail\ja-JP\886983d96e3d3e bridgereviewwin.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\PLA\System\System.exe bridgereviewwin.exe File opened for modification C:\Windows\PLA\System\System.exe bridgereviewwin.exe File created C:\Windows\PLA\System\27d1bcfc3c54e0 bridgereviewwin.exe File created C:\Windows\ja-JP\smss.exe bridgereviewwin.exe File created C:\Windows\ja-JP\69ddcba757bf72 bridgereviewwin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b67c5a17d70755e35ef3f2ea8c949c1d57d324cd91289102598d1547bcffed7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 21 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2844 schtasks.exe 2960 schtasks.exe 2648 schtasks.exe 2708 schtasks.exe 1056 schtasks.exe 1276 schtasks.exe 2852 schtasks.exe 2780 schtasks.exe 2756 schtasks.exe 2168 schtasks.exe 2180 schtasks.exe 2812 schtasks.exe 1656 schtasks.exe 2984 schtasks.exe 2976 schtasks.exe 2672 schtasks.exe 2696 schtasks.exe 1716 schtasks.exe 2036 schtasks.exe 2836 schtasks.exe 1164 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2320 bridgereviewwin.exe 2284 smss.exe 2284 smss.exe 2284 smss.exe 2284 smss.exe 2284 smss.exe 2284 smss.exe 2284 smss.exe 2284 smss.exe 2284 smss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2320 bridgereviewwin.exe Token: SeDebugPrivilege 2284 smss.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2380 2364 8b67c5a17d70755e35ef3f2ea8c949c1d57d324cd91289102598d1547bcffed7N.exe 31 PID 2364 wrote to memory of 2380 2364 8b67c5a17d70755e35ef3f2ea8c949c1d57d324cd91289102598d1547bcffed7N.exe 31 PID 2364 wrote to memory of 2380 2364 8b67c5a17d70755e35ef3f2ea8c949c1d57d324cd91289102598d1547bcffed7N.exe 31 PID 2364 wrote to memory of 2380 2364 8b67c5a17d70755e35ef3f2ea8c949c1d57d324cd91289102598d1547bcffed7N.exe 31 PID 2380 wrote to memory of 2252 2380 WScript.exe 32 PID 2380 wrote to memory of 2252 2380 WScript.exe 32 PID 2380 wrote to memory of 2252 2380 WScript.exe 32 PID 2380 wrote to memory of 2252 2380 WScript.exe 32 PID 2252 wrote to memory of 2320 2252 cmd.exe 34 PID 2252 wrote to memory of 2320 2252 cmd.exe 34 PID 2252 wrote to memory of 2320 2252 cmd.exe 34 PID 2252 wrote to memory of 2320 2252 cmd.exe 34 PID 2320 wrote to memory of 2440 2320 bridgereviewwin.exe 57 PID 2320 wrote to memory of 2440 2320 bridgereviewwin.exe 57 PID 2320 wrote to memory of 2440 2320 bridgereviewwin.exe 57 PID 2440 wrote to memory of 2656 2440 cmd.exe 59 PID 2440 wrote to memory of 2656 2440 cmd.exe 59 PID 2440 wrote to memory of 2656 2440 cmd.exe 59 PID 2440 wrote to memory of 2284 2440 cmd.exe 60 PID 2440 wrote to memory of 2284 2440 cmd.exe 60 PID 2440 wrote to memory of 2284 2440 cmd.exe 60 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b67c5a17d70755e35ef3f2ea8c949c1d57d324cd91289102598d1547bcffed7N.exe"C:\Users\Admin\AppData\Local\Temp\8b67c5a17d70755e35ef3f2ea8c949c1d57d324cd91289102598d1547bcffed7N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providerbrowserWebFont\YIgtMaExFJFBncNn1em9wJcGNWr3f.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providerbrowserWebFont\5cmX3eeCizBMduOP4xHF1p.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\providerbrowserWebFont\bridgereviewwin.exe"C:\providerbrowserWebFont\bridgereviewwin.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\svxx5o0Swo.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2656
-
-
C:\Windows\ja-JP\smss.exe"C:\Windows\ja-JP\smss.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Windows\PLA\System\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\PLA\System\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Windows\PLA\System\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Program Files\7-Zip\Lang\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Program Files\7-Zip\Lang\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Windows\ja-JP\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\ja-JP\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Windows\ja-JP\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Mail\ja-JP\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\ja-JP\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Mail\ja-JP\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\providerbrowserWebFont\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\providerbrowserWebFont\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\providerbrowserWebFont\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\All Users\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\providerbrowserWebFont\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\providerbrowserWebFont\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\providerbrowserWebFont\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD5fad31747c319803597c036e913f65ac0
SHA1ebfbde0f2f7479c440ddd64962ef35fef2406e74
SHA25672b101b2514586df4e15ef364622eb98f55c782c3f96501a2a1b04d589d3fdd5
SHA51296448d20242138293df4df0950a937eb84c299089c5dcbcd1d3e659cb735618d06d4cc1b8525e13b84884b555894b395aa2987e58bff05cf524f94bc7b106e38
-
Filesize
47B
MD5e9d505caa65e63b5d93b82e1877f2062
SHA10276dfd379ea89be367b66950300a1455a583571
SHA25621badcf7822aac68d4d060e89fd6f04df3ff68dcd39217ba3863d7503237d101
SHA512077eb5a528e0015e7c6f8ead1b2351d16abf0a05b6132e04a640b9c40a12234091bae5f9268eeb61b75886449320465619cacdacb7733b502d76b7bc3016d917
-
Filesize
221B
MD506865e53406b18d46604d04a3bd9b396
SHA1d9e26ebaa48e997333364143c3d8441eb984dca7
SHA256956279f84b64c8db50862edddfcd9fc43266cab11fced78a0e6d3d2a47e429cc
SHA5121d8b16ed4aa71712900c394b61f2133c305644fc28266ee95e314c09cbb7671d69ed199a544fdbbc618c1ebb803935203da723909da94b2d9d2b3dbec4f7284b
-
Filesize
1.1MB
MD58a6b7ad242f380978aa7318c3fdafe4f
SHA1c78489883e9ce873f7a67c0d3ad662adef9a0c61
SHA256f7a4bc7bacb5fce2daafe9b4db183f60f87528a02832e814417d089a6f6bc2b3
SHA512198e5fe3fb97f7541ec69511a60cb3baffed07046560f6f4455cc403f71d66f17ddf733511d6bd810312028d22d013897be28e66ddcb6eaa1ba5a91b0ab2079c