Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2025, 19:19

General

  • Target

    041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe

  • Size

    783KB

  • MD5

    c8d2ced6b877c7b41224c5a90b871c3f

  • SHA1

    145c31bdc83c5eb0f83b50b87681219a96c4c7bb

  • SHA256

    041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b

  • SHA512

    43f90eae3568a9406395db971fd1f7c90a8cf233e115f1a7971beb4223f87f63324c4d1bbbb33688529c44dc44010a1ef67bfb29861f8a11e2b6f21f891addde

  • SSDEEP

    12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe
    "C:\Users\Admin\AppData\Local\Temp\041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3832
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\eI3ejkRQdC.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1040
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:3872
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\resources\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\resources\StartMenuExperienceHost.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:3588
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\SuggestionUI\TextInputHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:972
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\ProgramData\WindowsHolographicDevices\SpatialStore\StartMenuExperienceHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2448
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\resources\StartMenuExperienceHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:216
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\System32\PNPXAssocPrx\sihost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4212

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\eI3ejkRQdC.bat

      Filesize

      279B

      MD5

      e85ce23db0860130ae2f98824fd41df5

      SHA1

      bb10acd4fb5b3f9773d5998048a9f38ceacb9cf8

      SHA256

      ac7b107512bb7af7ead56f9b3591b8d74badf04863f2071e39b938a1fa8dda03

      SHA512

      ab78f7e1a4738e3556d26ee8af8ab5b321a6d0c1567bf987f8ac2d2b04439bbe3ffc9398732e520fcd627604c6204669244dcf26a324b677da97a942d4a3989b

    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\resources\StartMenuExperienceHost.exe

      Filesize

      783KB

      MD5

      5fc0195fde25c6f901304fdad1214685

      SHA1

      f9bdab4bc5cecb249ca2fe1a46f7ce9e52dca784

      SHA256

      cf3c5ed3c158f7733d0f23f6f3cdb25dea479e3aa413b65c9b7f5ab15720aef8

      SHA512

      3f6922f8332c123ca8fc4ff558c6c5056323c3fbf438dfa9d861c3d11247bf727b8f7157e18b51540a53db87c3062f331bc7f88ed258bfb5b82179e00d312ae4

    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\SuggestionUI\TextInputHost.exe

      Filesize

      783KB

      MD5

      c8d2ced6b877c7b41224c5a90b871c3f

      SHA1

      145c31bdc83c5eb0f83b50b87681219a96c4c7bb

      SHA256

      041c7be3d5c7216bf2db39211c3bb06f59033c41a81472cb422e4f4f3786599b

      SHA512

      43f90eae3568a9406395db971fd1f7c90a8cf233e115f1a7971beb4223f87f63324c4d1bbbb33688529c44dc44010a1ef67bfb29861f8a11e2b6f21f891addde

    • memory/3588-75-0x00000000007F0000-0x00000000008BA000-memory.dmp

      Filesize

      808KB

    • memory/3832-18-0x0000000002920000-0x0000000002928000-memory.dmp

      Filesize

      32KB

    • memory/3832-22-0x0000000002940000-0x0000000002948000-memory.dmp

      Filesize

      32KB

    • memory/3832-6-0x00000000010A0000-0x00000000010A8000-memory.dmp

      Filesize

      32KB

    • memory/3832-7-0x00000000010B0000-0x00000000010BC000-memory.dmp

      Filesize

      48KB

    • memory/3832-8-0x00000000010E0000-0x00000000010EA000-memory.dmp

      Filesize

      40KB

    • memory/3832-9-0x00000000010F0000-0x00000000010FA000-memory.dmp

      Filesize

      40KB

    • memory/3832-10-0x00000000010D0000-0x00000000010D8000-memory.dmp

      Filesize

      32KB

    • memory/3832-11-0x00000000028C0000-0x00000000028C8000-memory.dmp

      Filesize

      32KB

    • memory/3832-12-0x0000000001100000-0x0000000001108000-memory.dmp

      Filesize

      32KB

    • memory/3832-13-0x00000000028D0000-0x00000000028D8000-memory.dmp

      Filesize

      32KB

    • memory/3832-14-0x00000000028E0000-0x00000000028E8000-memory.dmp

      Filesize

      32KB

    • memory/3832-17-0x0000000002910000-0x0000000002918000-memory.dmp

      Filesize

      32KB

    • memory/3832-0-0x00007FFD9C523000-0x00007FFD9C525000-memory.dmp

      Filesize

      8KB

    • memory/3832-20-0x0000000002960000-0x0000000002968000-memory.dmp

      Filesize

      32KB

    • memory/3832-21-0x0000000002930000-0x000000000293C000-memory.dmp

      Filesize

      48KB

    • memory/3832-5-0x0000000001090000-0x00000000010A0000-memory.dmp

      Filesize

      64KB

    • memory/3832-19-0x0000000002950000-0x0000000002958000-memory.dmp

      Filesize

      32KB

    • memory/3832-16-0x0000000002900000-0x0000000002908000-memory.dmp

      Filesize

      32KB

    • memory/3832-15-0x00000000028F0000-0x00000000028F8000-memory.dmp

      Filesize

      32KB

    • memory/3832-25-0x00007FFD9C520000-0x00007FFD9CFE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3832-26-0x00007FFD9C520000-0x00007FFD9CFE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3832-4-0x0000000001080000-0x0000000001088000-memory.dmp

      Filesize

      32KB

    • memory/3832-36-0x00007FFD9C520000-0x00007FFD9CFE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3832-56-0x00007FFD9C520000-0x00007FFD9CFE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3832-63-0x00007FFD9C520000-0x00007FFD9CFE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3832-70-0x00007FFD9C520000-0x00007FFD9CFE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3832-3-0x0000000001070000-0x0000000001078000-memory.dmp

      Filesize

      32KB

    • memory/3832-2-0x00007FFD9C520000-0x00007FFD9CFE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3832-1-0x0000000000700000-0x00000000007CA000-memory.dmp

      Filesize

      808KB