Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2025, 18:48

General

  • Target

    df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe

  • Size

    2.4MB

  • MD5

    62e601a986371d6a6ce17d5a78a0feba

  • SHA1

    24fc031ffd01e114fc3f78e1fc302ce3208b431c

  • SHA256

    df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32

  • SHA512

    19a4ab73a01b017a460844ddd7cd77c99452d78eb0e0e921bde6ee1946d4fa460f436a033232fa711c73971a8614c995e985fb9b17d4dadcf486b7d40ab9d02d

  • SSDEEP

    24576:zTbBv5rUNgz5PNmEetaAO6p1mTYhqIizNJ3wZK+Y/mtO/1uia2wf9GsVcoiJBRsd:tBmG5VivbqP3wZKZ/J/Zwf04k8FiGQ+

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe
    "C:\Users\Admin\AppData\Local\Temp\df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\MsChainbrowserweb\IkYDd80xTTPifjZ0ql0Oju60y6xFKjrayyuJ6q3Lt.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\MsChainbrowserweb\VjHSX7CifHTZSyWiEP30gXg6skFL8ARMSgjExtHXuC5j.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\MsChainbrowserweb\ComponentbrowserWebrefsvc.exe
          "C:\MsChainbrowserweb/ComponentbrowserWebrefsvc.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2560
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xc2pjkgu\xc2pjkgu.cmdline"
            5⤵
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:2792
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9186.tmp" "c:\Windows\System32\CSC52721A8F7B1C4B7E84277E65EB7D07F.TMP"
              6⤵
                PID:1232
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BB6cYnftGy.bat"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2860
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:3012
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:2248
                • C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\taskhost.exe
                  "C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\taskhost.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:952
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Favorites\conhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2492
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\Admin\Favorites\conhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2388
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Favorites\conhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1840
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\services.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1108
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2772
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2784
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\Windows\IME\imekr8\OSPPSVC.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2416
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Windows\IME\imekr8\OSPPSVC.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2800
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\Windows\IME\imekr8\OSPPSVC.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1924
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\taskhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1832
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\taskhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1596
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\taskhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2136
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Users\Public\smss.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2060
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Public\smss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2064
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Users\Public\smss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2932
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "ComponentbrowserWebrefsvcC" /sc MINUTE /mo 13 /tr "'C:\MsChainbrowserweb\ComponentbrowserWebrefsvc.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2116
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "ComponentbrowserWebrefsvc" /sc ONLOGON /tr "'C:\MsChainbrowserweb\ComponentbrowserWebrefsvc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:236
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "ComponentbrowserWebrefsvcC" /sc MINUTE /mo 12 /tr "'C:\MsChainbrowserweb\ComponentbrowserWebrefsvc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:760

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\MsChainbrowserweb\IkYDd80xTTPifjZ0ql0Oju60y6xFKjrayyuJ6q3Lt.vbe

        Filesize

        240B

        MD5

        93e993dbfd36957a2929c22bb21a8293

        SHA1

        55c48ebcf72e53ebb90108d050255deac4f388f8

        SHA256

        974506b2ad39a3ec0225b5cb3cbb8f774a032679d27ca1af3880ec1371498e19

        SHA512

        c47d40d530b42dfcbc3ef1c225aad7f0e1e18256459b579dd2b46b70ac354b02f6442564528a5991b3a966ab996423c91d863949a7d90b16541ccf9e40ac5a8b

      • C:\MsChainbrowserweb\VjHSX7CifHTZSyWiEP30gXg6skFL8ARMSgjExtHXuC5j.bat

        Filesize

        101B

        MD5

        b203c0ee33eade47ff78546bd923f433

        SHA1

        7928af76541c7b0e8ba5c32757f44d9954febcde

        SHA256

        5a367b756472a10df4a315e3b98f738f39706d1b57ae90c22dd69518b9b14430

        SHA512

        40e80f6f75061b50d513136ae710a34b584cc3151db3728ba4ad4eeaa12a369b35ed33d242823801d667a838e428f035d1c866940530f9ba8fea6d53e5d56b75

      • C:\Users\Admin\AppData\Local\Temp\BB6cYnftGy.bat

        Filesize

        211B

        MD5

        ff6f8f6a84188f5298f23575b9d1074a

        SHA1

        ea4003dec1e6b08dd91f0178255e3ea542773990

        SHA256

        62363c51ca57bc93b92130a4fac69a31af9bf5416ab6f1948f80af28f6910037

        SHA512

        3a785977ccd28265b6890f77d51eeca58c7cf643ed7a251332f2150ead66b66d5dec5bcf2099e5582dbc6e96116469334f6b13e5a0f9d101df9283ec7ac8a82c

      • C:\Users\Admin\AppData\Local\Temp\RES9186.tmp

        Filesize

        1KB

        MD5

        39365b08051f552dc772f48bb6b9b830

        SHA1

        b4a63464b43ca281edd02e76dd04651145e76c3e

        SHA256

        62ad1af070c8c31211f6cae68119ebb7a61c25cde89f9c8e2078ddebeee565b7

        SHA512

        384bd447abfe14c9a224499fa73c35a5d8ff3d88af7ff73b350255e16ca794acf7754855286bf722aea7d6b6a3b6371b67709a426a4f7872c5853b2fa1e1adf5

      • \??\c:\Users\Admin\AppData\Local\Temp\xc2pjkgu\xc2pjkgu.0.cs

        Filesize

        368B

        MD5

        3741d19ade9c93a610a5210b14d5c6fa

        SHA1

        e48894397f7c5ddefcba3a11f0ef9e830624afb2

        SHA256

        6ff1eb12a69ddcf13c3911e2a24f85b58f3d0fda501053b3bb6c0d89fc8a7734

        SHA512

        8e74c6334840c9cbea1d96d2dd93aa075a99ac2fca6c7e0f4b6e1bd7ce21c917edec9fce12e0a92878bb8c798edfbb1545d03c7cd1ba4ab806b990cc17928046

      • \??\c:\Users\Admin\AppData\Local\Temp\xc2pjkgu\xc2pjkgu.cmdline

        Filesize

        235B

        MD5

        836cefc3fecebef036603572a8b3c0bc

        SHA1

        4065325e94d25b6682d26fcfa92b91f4ece45d24

        SHA256

        dcbade0ede3e61dfb99935497f5a28eaf4f56bf11566f5cdffca78d1ac6ae4f6

        SHA512

        77a7500decb19aede0fd0fd13c465963f46414e98281b872ed26561352e8212dd85a1037af717f0f82352588951ad90643c8ca6d4a57fb6a47d01044f8d28ea8

      • \??\c:\Windows\System32\CSC52721A8F7B1C4B7E84277E65EB7D07F.TMP

        Filesize

        1KB

        MD5

        9446a6998523ec187daa3d79bec9c8fa

        SHA1

        16c7f73aef03c8a15b4d9e8b1cfa5183caf7ca96

        SHA256

        f55f1bd2c1246cfb3b60cd8649fcc78b3837896bdf5132d6fc8ea0ecabf892d7

        SHA512

        fac3ad1b0c8663aaa94cd66b6ea0aa1848e570ff4a22b709cf2696abb76e28f42fb0d2a74316a7ad86bb6216177013c6b71ce2f4df139edc3054a03ee3467c9d

      • \MsChainbrowserweb\ComponentbrowserWebrefsvc.exe

        Filesize

        1.8MB

        MD5

        fb0f2e049db96d6e8d9e84bda3a08193

        SHA1

        2bb51ca4db5bcf877e68541189fe99e7c070b579

        SHA256

        912f7f6b2a8bc1932e3b02ead638de1fbb5875f947730cf587fa63f63060bae5

        SHA512

        47d7c47730e433bd46b955f65dc3aea00b736e4e3f90fa7cea644e31f16ec12c9254e6039490193426217405935f3309dc88c2bf24672b3d27837e69d5ca35db

      • memory/952-52-0x0000000000860000-0x0000000000A3A000-memory.dmp

        Filesize

        1.9MB

      • memory/2560-13-0x0000000000F10000-0x00000000010EA000-memory.dmp

        Filesize

        1.9MB

      • memory/2560-21-0x0000000000310000-0x000000000031C000-memory.dmp

        Filesize

        48KB

      • memory/2560-19-0x0000000000B10000-0x0000000000B28000-memory.dmp

        Filesize

        96KB

      • memory/2560-17-0x0000000000440000-0x000000000045C000-memory.dmp

        Filesize

        112KB

      • memory/2560-15-0x0000000000300000-0x000000000030E000-memory.dmp

        Filesize

        56KB