Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

13/01/2025, 05:27

250113-f5d5lszrem 10

12/01/2025, 20:07

250112-yv3pbszlel 10

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2025, 20:07

General

  • Target

    55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddcN.exe

  • Size

    1.7MB

  • MD5

    2709efc85a850a7ddb9ec3d228ef6640

  • SHA1

    010165c876f030f0158b09d20af67238b954af66

  • SHA256

    55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddc

  • SHA512

    de2741c12710609eb94a420ca2ff139d10e3783ced7ec827b3f30cba6824a81c23b2e8608fe3725f26c7beb816884720fcef689b9c78a4150228772352772de1

  • SSDEEP

    24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:tgwuuEpdDLNwVMeXDL0fdSzAG

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddcN.exe
    "C:\Users\Admin\AppData\Local\Temp\55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddcN.exe"
    1⤵
    • Drops file in Drivers directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2836
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2664
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2840
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2856
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2844
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2920
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1812
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2268
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2296
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2516
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2624
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1316
    • C:\MSOCache\All Users\taskhost.exe
      "C:\MSOCache\All Users\taskhost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e66dc026-7434-4007-8b5b-e8da9d080540.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2456
        • C:\MSOCache\All Users\taskhost.exe
          "C:\MSOCache\All Users\taskhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2380
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\17cb71fe-c045-462c-91b3-4cc00bcee3f0.vbs"
        3⤵
          PID:868
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\taskhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2576
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2616
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2084
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2308
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2816
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2176

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\All Users\taskhost.exe

      Filesize

      1.7MB

      MD5

      2709efc85a850a7ddb9ec3d228ef6640

      SHA1

      010165c876f030f0158b09d20af67238b954af66

      SHA256

      55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddc

      SHA512

      de2741c12710609eb94a420ca2ff139d10e3783ced7ec827b3f30cba6824a81c23b2e8608fe3725f26c7beb816884720fcef689b9c78a4150228772352772de1

    • C:\Users\Admin\AppData\Local\Temp\17cb71fe-c045-462c-91b3-4cc00bcee3f0.vbs

      Filesize

      486B

      MD5

      b8136ad0237837350a74bce91bc69a36

      SHA1

      742560b325ccd60e94bf8b2e593e072966590eae

      SHA256

      4397f762b10d34a4a0f7d6c5341f16a210fc76d1637209d4a8692d5e1412c6d1

      SHA512

      9dfbacc2df26c5611b54147eb1cfce11e71c4b95bf48a6b6b7ff8a2d586a33e43a2884c29d4e57750913056d30fed78f4778239c924868d9ae40d24ec81dc787

    • C:\Users\Admin\AppData\Local\Temp\e66dc026-7434-4007-8b5b-e8da9d080540.vbs

      Filesize

      710B

      MD5

      fca576e9eb607f047f0aca42e46857e5

      SHA1

      ac662544623050b82276192bcaa30e04a5e00eef

      SHA256

      f3e90a5c8bd5d7573fdf27ce534bdf521ab93386905f3c69ebb60fbf673f5a46

      SHA512

      1d8170a4041bdfbc9727048822e4d9841ace91b88891aa5a013f3bb729590c30aa8bf5983d3c0c80960d117fa7000ab1891f10af6a9ce51ebd99decc3d65f15b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

      Filesize

      7KB

      MD5

      72e6bcd95f423be3f6232d7ccadd5333

      SHA1

      ab6fe57cb7d754e35dac1ca81be9329cb69417c9

      SHA256

      a8a36a3db17eb39e8a8c6fac4be0224cc423fcb4473d2c50bbd9847edbd72714

      SHA512

      7aead0790d6a0e98246e2bd88233604a4cdca767d0360c346553df2bc3949f0015d7d0e387bf2a75d82d94973e8db2b825a02d3b1f0125f3df1883e6660c070e

    • memory/1864-75-0x0000000000870000-0x0000000000A26000-memory.dmp

      Filesize

      1.7MB

    • memory/2380-133-0x0000000000850000-0x0000000000862000-memory.dmp

      Filesize

      72KB

    • memory/2380-132-0x0000000000010000-0x00000000001C6000-memory.dmp

      Filesize

      1.7MB

    • memory/2516-74-0x000000001B470000-0x000000001B752000-memory.dmp

      Filesize

      2.9MB

    • memory/2516-76-0x0000000002810000-0x0000000002818000-memory.dmp

      Filesize

      32KB

    • memory/2704-7-0x0000000000AD0000-0x0000000000AE2000-memory.dmp

      Filesize

      72KB

    • memory/2704-9-0x0000000000AE0000-0x0000000000AEC000-memory.dmp

      Filesize

      48KB

    • memory/2704-12-0x0000000000B10000-0x0000000000B1C000-memory.dmp

      Filesize

      48KB

    • memory/2704-16-0x0000000000BD0000-0x0000000000BDC000-memory.dmp

      Filesize

      48KB

    • memory/2704-15-0x0000000000B40000-0x0000000000B48000-memory.dmp

      Filesize

      32KB

    • memory/2704-14-0x0000000000B30000-0x0000000000B3A000-memory.dmp

      Filesize

      40KB

    • memory/2704-13-0x0000000000B20000-0x0000000000B2C000-memory.dmp

      Filesize

      48KB

    • memory/2704-17-0x0000000000BE0000-0x0000000000BEC000-memory.dmp

      Filesize

      48KB

    • memory/2704-20-0x000007FEF56A0000-0x000007FEF608C000-memory.dmp

      Filesize

      9.9MB

    • memory/2704-10-0x0000000000B00000-0x0000000000B08000-memory.dmp

      Filesize

      32KB

    • memory/2704-8-0x0000000000AF0000-0x0000000000B00000-memory.dmp

      Filesize

      64KB

    • memory/2704-0-0x000007FEF56A3000-0x000007FEF56A4000-memory.dmp

      Filesize

      4KB

    • memory/2704-6-0x0000000000AB0000-0x0000000000AC6000-memory.dmp

      Filesize

      88KB

    • memory/2704-5-0x0000000000670000-0x0000000000680000-memory.dmp

      Filesize

      64KB

    • memory/2704-86-0x000007FEF56A0000-0x000007FEF608C000-memory.dmp

      Filesize

      9.9MB

    • memory/2704-4-0x0000000000450000-0x0000000000458000-memory.dmp

      Filesize

      32KB

    • memory/2704-3-0x0000000000650000-0x000000000066C000-memory.dmp

      Filesize

      112KB

    • memory/2704-2-0x000007FEF56A0000-0x000007FEF608C000-memory.dmp

      Filesize

      9.9MB

    • memory/2704-1-0x0000000001190000-0x0000000001346000-memory.dmp

      Filesize

      1.7MB