Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2025, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
Echo test.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Echo test.exe
Resource
win10v2004-20241007-en
General
-
Target
Echo test.exe
-
Size
3.8MB
-
MD5
a6055484fbf56a8cfe6a8ce1ad5fe91c
-
SHA1
5e159ecd3265c619dcaae0dbdfaa71fa0533c6f6
-
SHA256
7a2e63f7601af70c3660110cd7d0967d909b2c5ad2ab3bdf834c85d900fe5c94
-
SHA512
6f0dc67e4c14b34cc000e3ad1886f4586d02bba55f5ae8f7ae46eb7269f9603b9120ffe7053fc2cfd91ee3f2f6eb250a47e6cad53e73cbe9e637cfc6f9f847f7
-
SSDEEP
98304:yTApDs2KOw0axITDx00qlvqZpXSfU7dFDSfJtMKSGM:Cp2Kf0ZTDx0z88fUdEIKSGM
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Echo test.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation ChainComponentBroker.exe -
Executes dropped EXE 2 IoCs
pid Process 3392 ChainComponentBroker.exe 4596 RuntimeBroker.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\MEIPreload\upfc.exe ChainComponentBroker.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\MEIPreload\ea1d8f6d871115 ChainComponentBroker.exe File created C:\Program Files (x86)\Google\Update\Download\fontdrvhost.exe ChainComponentBroker.exe File created C:\Program Files (x86)\Google\Update\Download\5b884080fd4f94 ChainComponentBroker.exe File created C:\Program Files (x86)\Windows Mail\sihost.exe ChainComponentBroker.exe File created C:\Program Files (x86)\Windows Mail\66fc9ff0ee96c2 ChainComponentBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Echo test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings Echo test.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings ChainComponentBroker.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe 3392 ChainComponentBroker.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4596 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3392 ChainComponentBroker.exe Token: SeDebugPrivilege 4596 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 956 wrote to memory of 4400 956 Echo test.exe 82 PID 956 wrote to memory of 4400 956 Echo test.exe 82 PID 956 wrote to memory of 4400 956 Echo test.exe 82 PID 4400 wrote to memory of 2044 4400 WScript.exe 90 PID 4400 wrote to memory of 2044 4400 WScript.exe 90 PID 4400 wrote to memory of 2044 4400 WScript.exe 90 PID 2044 wrote to memory of 3392 2044 cmd.exe 92 PID 2044 wrote to memory of 3392 2044 cmd.exe 92 PID 3392 wrote to memory of 5096 3392 ChainComponentBroker.exe 93 PID 3392 wrote to memory of 5096 3392 ChainComponentBroker.exe 93 PID 5096 wrote to memory of 2096 5096 cmd.exe 95 PID 5096 wrote to memory of 2096 5096 cmd.exe 95 PID 5096 wrote to memory of 4852 5096 cmd.exe 96 PID 5096 wrote to memory of 4852 5096 cmd.exe 96 PID 5096 wrote to memory of 4596 5096 cmd.exe 97 PID 5096 wrote to memory of 4596 5096 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\Echo test.exe"C:\Users\Admin\AppData\Local\Temp\Echo test.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\PortServerhostSvc\0u1xIFn5uBTahgPweE61XDW6gni0pA9hGvjOu.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\PortServerhostSvc\deeiCKZkZiO4AO25b.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\PortServerhostSvc\ChainComponentBroker.exe"C:\PortServerhostSvc/ChainComponentBroker.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\PbkuXlrJQx.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:2096
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:4852
-
-
C:\Recovery\WindowsRE\RuntimeBroker.exe"C:\Recovery\WindowsRE\RuntimeBroker.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213B
MD51756f8178d512638ebc8309601aee1da
SHA1b860c43f352f88394555c3e9377114d03265554d
SHA2564b404d99abccf5a372b76f904723e69d2c52746305f51d26c82d4a59842e4aaa
SHA512be69f0e7ce83717de283f44e95ba46c6d192d926060315bd43c393fd5dacf89213fd41e545586c27479f678fa29ad4b4a12823c163e8d555a071488981d6b622
-
Filesize
3.5MB
MD5748b7d9fafaffefe123f11305dd0383b
SHA19e94086fce6fc65a72e2f339cb5cffeb3545390c
SHA2568c9eb584cec3f2640cbdb865cdbb38413f63e7d1485d41bde77bc56624b00890
SHA5124ab9d407d0d8f5e8ab6c9f8a802fedbfe5b49eccc590e52495dbb1ee0f948b65c7bc3aefbc94c6a500c22453114a423404e9ce00b74642d8c9314d6c032e9354
-
Filesize
88B
MD5c8423ea58aa138504ea50ad34e8dcd74
SHA1f3054ba306c1605084d4c4ac6b213b3130061d85
SHA256a02c0e705931f16ed8c56c6797eab6f0a1f14fbc4237f529244278b3c117feae
SHA5127151a7f841b05c0a1d1f48f176416ee8988508bee65f9253a9973284ab83cfdf2898ade5979bd30e5a80e2fe41cfc849ebdc8fa0b526be9369b50d32ab4d321b
-
Filesize
215B
MD55cfacbb71ec0ecc8e5e7d30e9622c1e0
SHA195a3ab3313f5f7e255c03442289bf9a89a4f21ab
SHA256be590728c58cff36c3b4d5afb6e83ed39db21f280aa7165c20a151b73971b4f0
SHA5128717e4efdc60ed49bcc4633b69df38c2990b0b8385b502ed5503d4ec7220499e6223519ce039fe6185978c37259e92eb9d1ef8db9442484c26b3e8274f275ebc