Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

13/01/2025, 13:56

250113-q81swswqcp 10

13/01/2025, 13:53

250113-q64rrswpgm 10

Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2025, 13:53

General

  • Target

    Echo test.exe

  • Size

    3.8MB

  • MD5

    a6055484fbf56a8cfe6a8ce1ad5fe91c

  • SHA1

    5e159ecd3265c619dcaae0dbdfaa71fa0533c6f6

  • SHA256

    7a2e63f7601af70c3660110cd7d0967d909b2c5ad2ab3bdf834c85d900fe5c94

  • SHA512

    6f0dc67e4c14b34cc000e3ad1886f4586d02bba55f5ae8f7ae46eb7269f9603b9120ffe7053fc2cfd91ee3f2f6eb250a47e6cad53e73cbe9e637cfc6f9f847f7

  • SSDEEP

    98304:yTApDs2KOw0axITDx00qlvqZpXSfU7dFDSfJtMKSGM:Cp2Kf0ZTDx0z88fUdEIKSGM

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Echo test.exe
    "C:\Users\Admin\AppData\Local\Temp\Echo test.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\PortServerhostSvc\0u1xIFn5uBTahgPweE61XDW6gni0pA9hGvjOu.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4400
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\PortServerhostSvc\deeiCKZkZiO4AO25b.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2044
        • C:\PortServerhostSvc\ChainComponentBroker.exe
          "C:\PortServerhostSvc/ChainComponentBroker.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3392
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\PbkuXlrJQx.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:5096
            • C:\Windows\system32\chcp.com
              chcp 65001
              6⤵
                PID:2096
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                6⤵
                  PID:4852
                • C:\Recovery\WindowsRE\RuntimeBroker.exe
                  "C:\Recovery\WindowsRE\RuntimeBroker.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4596

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\PortServerhostSvc\0u1xIFn5uBTahgPweE61XDW6gni0pA9hGvjOu.vbe

        Filesize

        213B

        MD5

        1756f8178d512638ebc8309601aee1da

        SHA1

        b860c43f352f88394555c3e9377114d03265554d

        SHA256

        4b404d99abccf5a372b76f904723e69d2c52746305f51d26c82d4a59842e4aaa

        SHA512

        be69f0e7ce83717de283f44e95ba46c6d192d926060315bd43c393fd5dacf89213fd41e545586c27479f678fa29ad4b4a12823c163e8d555a071488981d6b622

      • C:\PortServerhostSvc\ChainComponentBroker.exe

        Filesize

        3.5MB

        MD5

        748b7d9fafaffefe123f11305dd0383b

        SHA1

        9e94086fce6fc65a72e2f339cb5cffeb3545390c

        SHA256

        8c9eb584cec3f2640cbdb865cdbb38413f63e7d1485d41bde77bc56624b00890

        SHA512

        4ab9d407d0d8f5e8ab6c9f8a802fedbfe5b49eccc590e52495dbb1ee0f948b65c7bc3aefbc94c6a500c22453114a423404e9ce00b74642d8c9314d6c032e9354

      • C:\PortServerhostSvc\deeiCKZkZiO4AO25b.bat

        Filesize

        88B

        MD5

        c8423ea58aa138504ea50ad34e8dcd74

        SHA1

        f3054ba306c1605084d4c4ac6b213b3130061d85

        SHA256

        a02c0e705931f16ed8c56c6797eab6f0a1f14fbc4237f529244278b3c117feae

        SHA512

        7151a7f841b05c0a1d1f48f176416ee8988508bee65f9253a9973284ab83cfdf2898ade5979bd30e5a80e2fe41cfc849ebdc8fa0b526be9369b50d32ab4d321b

      • C:\Users\Admin\AppData\Local\Temp\PbkuXlrJQx.bat

        Filesize

        215B

        MD5

        5cfacbb71ec0ecc8e5e7d30e9622c1e0

        SHA1

        95a3ab3313f5f7e255c03442289bf9a89a4f21ab

        SHA256

        be590728c58cff36c3b4d5afb6e83ed39db21f280aa7165c20a151b73971b4f0

        SHA512

        8717e4efdc60ed49bcc4633b69df38c2990b0b8385b502ed5503d4ec7220499e6223519ce039fe6185978c37259e92eb9d1ef8db9442484c26b3e8274f275ebc

      • memory/3392-32-0x000000001C6E0000-0x000000001C6F2000-memory.dmp

        Filesize

        72KB

      • memory/3392-38-0x000000001C720000-0x000000001C732000-memory.dmp

        Filesize

        72KB

      • memory/3392-17-0x0000000002550000-0x000000000255E000-memory.dmp

        Filesize

        56KB

      • memory/3392-19-0x000000001B210000-0x000000001B22C000-memory.dmp

        Filesize

        112KB

      • memory/3392-20-0x000000001C670000-0x000000001C6C0000-memory.dmp

        Filesize

        320KB

      • memory/3392-22-0x000000001B1A0000-0x000000001B1B0000-memory.dmp

        Filesize

        64KB

      • memory/3392-24-0x000000001C640000-0x000000001C658000-memory.dmp

        Filesize

        96KB

      • memory/3392-26-0x000000001B1B0000-0x000000001B1C0000-memory.dmp

        Filesize

        64KB

      • memory/3392-28-0x000000001B230000-0x000000001B240000-memory.dmp

        Filesize

        64KB

      • memory/3392-30-0x000000001C620000-0x000000001C62E000-memory.dmp

        Filesize

        56KB

      • memory/3392-13-0x0000000000130000-0x00000000004BC000-memory.dmp

        Filesize

        3.5MB

      • memory/3392-34-0x000000001C630000-0x000000001C640000-memory.dmp

        Filesize

        64KB

      • memory/3392-36-0x000000001C700000-0x000000001C716000-memory.dmp

        Filesize

        88KB

      • memory/3392-15-0x000000001B240000-0x000000001B266000-memory.dmp

        Filesize

        152KB

      • memory/3392-39-0x000000001CC70000-0x000000001D198000-memory.dmp

        Filesize

        5.2MB

      • memory/3392-41-0x000000001C660000-0x000000001C66E000-memory.dmp

        Filesize

        56KB

      • memory/3392-43-0x000000001C6C0000-0x000000001C6D0000-memory.dmp

        Filesize

        64KB

      • memory/3392-45-0x000000001C6D0000-0x000000001C6E0000-memory.dmp

        Filesize

        64KB

      • memory/3392-47-0x000000001C7A0000-0x000000001C7FA000-memory.dmp

        Filesize

        360KB

      • memory/3392-49-0x000000001C740000-0x000000001C74E000-memory.dmp

        Filesize

        56KB

      • memory/3392-51-0x000000001C750000-0x000000001C760000-memory.dmp

        Filesize

        64KB

      • memory/3392-53-0x000000001C760000-0x000000001C76E000-memory.dmp

        Filesize

        56KB

      • memory/3392-55-0x000000001CA00000-0x000000001CA18000-memory.dmp

        Filesize

        96KB

      • memory/3392-57-0x000000001C770000-0x000000001C77C000-memory.dmp

        Filesize

        48KB

      • memory/3392-59-0x000000001CA70000-0x000000001CABE000-memory.dmp

        Filesize

        312KB

      • memory/3392-12-0x00007FFC0D503000-0x00007FFC0D505000-memory.dmp

        Filesize

        8KB

      • memory/4596-102-0x000000001FB00000-0x000000001FC15000-memory.dmp

        Filesize

        1.1MB