Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2025, 19:19
Behavioral task
behavioral1
Sample
041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe
Resource
win10v2004-20241007-en
General
-
Target
041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe
-
Size
783KB
-
MD5
c8d2ced6b877c7b41224c5a90b871c3f
-
SHA1
145c31bdc83c5eb0f83b50b87681219a96c4c7bb
-
SHA256
041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b
-
SHA512
43f90eae3568a9406395db971fd1f7c90a8cf233e115f1a7971beb4223f87f63324c4d1bbbb33688529c44dc44010a1ef67bfb29861f8a11e2b6f21f891addde
-
SSDEEP
12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 972 2688 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2448 2688 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 216 2688 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4212 2688 schtasks.exe 82 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" StartMenuExperienceHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" StartMenuExperienceHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" StartMenuExperienceHost.exe -
resource yara_rule behavioral2/memory/3832-1-0x0000000000700000-0x00000000007CA000-memory.dmp dcrat behavioral2/files/0x000a000000023b9d-37.dat dcrat behavioral2/files/0x0009000000023bc4-73.dat dcrat behavioral2/memory/3588-75-0x00000000007F0000-0x00000000008BA000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe -
Executes dropped EXE 1 IoCs
pid Process 3588 StartMenuExperienceHost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Windows\\SystemApps\\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\\InputApp\\SuggestionUI\\TextInputHost.exe\"" 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\StartMenuExperienceHost.exe\"" 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\\resources\\StartMenuExperienceHost.exe\"" 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\Windows\\System32\\PNPXAssocPrx\\sihost.exe\"" 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA StartMenuExperienceHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" StartMenuExperienceHost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\PNPXAssocPrx\RCXBAA9.tmp 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe File opened for modification C:\Windows\System32\PNPXAssocPrx\sihost.exe 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe File created C:\Windows\System32\PNPXAssocPrx\sihost.exe 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe File created C:\Windows\System32\PNPXAssocPrx\66fc9ff0ee96c2b21f0cfded48750ae9e3032bf3 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\resources\StartMenuExperienceHost.exe 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe File created C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\SuggestionUI\TextInputHost.exe 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\SuggestionUI\TextInputHost.exe 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe File created C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\SuggestionUI\22eafd247d37c30fed3795ee41d259ec72bb351c 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe File created C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\resources\StartMenuExperienceHost.exe 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe File created C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\resources\55b276f4edf653fe07efe8f1ecc32d3d195abd16 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\SuggestionUI\RCXB41E.tmp 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\resources\RCXB837.tmp 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 972 schtasks.exe 2448 schtasks.exe 216 schtasks.exe 4212 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3832 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe 3832 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe 3832 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe 3832 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe 3832 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe 3832 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe 3832 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe 3832 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe 3832 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe 3832 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe 3832 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe 3588 StartMenuExperienceHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3832 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe Token: SeDebugPrivilege 3588 StartMenuExperienceHost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3832 wrote to memory of 1040 3832 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe 87 PID 3832 wrote to memory of 1040 3832 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe 87 PID 1040 wrote to memory of 3872 1040 cmd.exe 89 PID 1040 wrote to memory of 3872 1040 cmd.exe 89 PID 1040 wrote to memory of 3588 1040 cmd.exe 93 PID 1040 wrote to memory of 3588 1040 cmd.exe 93 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" StartMenuExperienceHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" StartMenuExperienceHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" StartMenuExperienceHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe"C:\Users\Admin\AppData\Local\Temp\041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe"1⤵
- UAC bypass
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3832 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\eI3ejkRQdC.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3872
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\resources\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\resources\StartMenuExperienceHost.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3588
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\SuggestionUI\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\ProgramData\WindowsHolographicDevices\SpatialStore\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\resources\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\System32\PNPXAssocPrx\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4212
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
279B
MD5e85ce23db0860130ae2f98824fd41df5
SHA1bb10acd4fb5b3f9773d5998048a9f38ceacb9cf8
SHA256ac7b107512bb7af7ead56f9b3591b8d74badf04863f2071e39b938a1fa8dda03
SHA512ab78f7e1a4738e3556d26ee8af8ab5b321a6d0c1567bf987f8ac2d2b04439bbe3ffc9398732e520fcd627604c6204669244dcf26a324b677da97a942d4a3989b
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\resources\StartMenuExperienceHost.exe
Filesize783KB
MD55fc0195fde25c6f901304fdad1214685
SHA1f9bdab4bc5cecb249ca2fe1a46f7ce9e52dca784
SHA256cf3c5ed3c158f7733d0f23f6f3cdb25dea479e3aa413b65c9b7f5ab15720aef8
SHA5123f6922f8332c123ca8fc4ff558c6c5056323c3fbf438dfa9d861c3d11247bf727b8f7157e18b51540a53db87c3062f331bc7f88ed258bfb5b82179e00d312ae4
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\SuggestionUI\TextInputHost.exe
Filesize783KB
MD5c8d2ced6b877c7b41224c5a90b871c3f
SHA1145c31bdc83c5eb0f83b50b87681219a96c4c7bb
SHA256041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b
SHA51243f90eae3568a9406395db971fd1f7c90a8cf233e115f1a7971beb4223f87f63324c4d1bbbb33688529c44dc44010a1ef67bfb29861f8a11e2b6f21f891addde