Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/01/2025, 04:02
Behavioral task
behavioral1
Sample
9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe
Resource
win10v2004-20241007-en
General
-
Target
9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe
-
Size
952KB
-
MD5
fa2fda3605fcdbaf69212aa3edb9f0f4
-
SHA1
f44fde95e3d9915f65fab24f48dcd4eb505a26da
-
SHA256
9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325
-
SHA512
019536005222cf19bdcc3c018993e3be36b1149f3b7a27938f65194b59aed6eba256e5949a119c7b90c7fe441b2201b7093e19066821875d81051e1869fccfdd
-
SSDEEP
24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\Idle.exe\", \"C:\\Documents and Settings\\dwm.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\Idle.exe\", \"C:\\Documents and Settings\\dwm.exe\", \"C:\\Windows\\System32\\elshyph\\dwm.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\Idle.exe\", \"C:\\Documents and Settings\\dwm.exe\", \"C:\\Windows\\System32\\elshyph\\dwm.exe\", \"C:\\ProgramData\\Start Menu\\spoolsv.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\Idle.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2780 2840 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2348 2840 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2880 2840 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2808 2840 schtasks.exe 30 -
UAC bypass 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
resource yara_rule behavioral1/memory/1128-1-0x0000000000D10000-0x0000000000E04000-memory.dmp dcrat behavioral1/files/0x000600000001a489-23.dat dcrat behavioral1/files/0x000900000001a489-45.dat dcrat behavioral1/memory/2912-80-0x00000000011D0000-0x00000000012C4000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2912 dwm.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\Idle.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\Idle.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Documents and Settings\\dwm.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Documents and Settings\\dwm.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\elshyph\\dwm.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\elshyph\\dwm.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\ProgramData\\Start Menu\\spoolsv.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\ProgramData\\Start Menu\\spoolsv.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Checks whether UAC is enabled 1 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\System32\elshyph\RCXB90A.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\elshyph\dwm.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\System32\elshyph\dwm.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\System32\elshyph\6cb0b6c459d5d3455a3da700e713f2e2529862ff 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\elshyph\RCXB909.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2780 schtasks.exe 2348 schtasks.exe 2880 schtasks.exe 2808 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1128 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1128 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Token: SeDebugPrivilege 2912 dwm.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1128 wrote to memory of 1704 1128 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe 35 PID 1128 wrote to memory of 1704 1128 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe 35 PID 1128 wrote to memory of 1704 1128 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe 35 PID 1704 wrote to memory of 1200 1704 cmd.exe 37 PID 1704 wrote to memory of 1200 1704 cmd.exe 37 PID 1704 wrote to memory of 1200 1704 cmd.exe 37 PID 1704 wrote to memory of 2912 1704 cmd.exe 39 PID 1704 wrote to memory of 2912 1704 cmd.exe 39 PID 1704 wrote to memory of 2912 1704 cmd.exe 39 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe"C:\Users\Admin\AppData\Local\Temp\9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1128 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\K27RZ1o8t6.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1200
-
-
C:\Documents and Settings\dwm.exe"C:\Documents and Settings\dwm.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2912
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Documents and Settings\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\elshyph\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\ProgramData\Start Menu\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2808
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197B
MD5d64cd7f8bcff210ca55cd41cca3eb1bd
SHA17e28521273751fd4ad2f3180b2540cfecc24638d
SHA256a9f65d6070ed11530158ac4c1d8e0bcb6b3af9cce6024ec153019495b63ed791
SHA51289b7cb5ddcaf025074f662ad90d7575de623eb77569fcc3cfb42b680b7a9575bc341d2c5ae55f6f743c08f47192cf818ccabf2a32d4eb717cc7c6afde406ed74
-
Filesize
952KB
MD5fa2fda3605fcdbaf69212aa3edb9f0f4
SHA1f44fde95e3d9915f65fab24f48dcd4eb505a26da
SHA2569d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325
SHA512019536005222cf19bdcc3c018993e3be36b1149f3b7a27938f65194b59aed6eba256e5949a119c7b90c7fe441b2201b7093e19066821875d81051e1869fccfdd
-
Filesize
952KB
MD594567e1d8b73404d7b2a30faf1472209
SHA1436e07e8ae94cf9fa2d4157269f3a9d583c4ceb1
SHA256fdec4047171d68e95f84c081fa963a68d7d1d4e6b0361942788eb9854706a517
SHA5121025df8fd48d96debb2ce0905ece2c9508cd2196637c148893ae8b1c84bb71a57be932d6baf9063f126f8001ee3de5e4afc74947444fc4a46e6bc136b070bfcd