Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    15/02/2025, 16:40

General

  • Target

    2891a1770d5724146e5c2b436b990f66.exe

  • Size

    2.3MB

  • MD5

    2891a1770d5724146e5c2b436b990f66

  • SHA1

    db1a33568f79cb33363b19ef174491a16832fff4

  • SHA256

    4c04379fe5ff8e88b7cfd025d5eeb3e5f82a69fd100e16154f726a39c065c829

  • SHA512

    9a83deeee92ef2f03ff9b003ed64cedf1c44326cee1d3ef5ee019eaef63ce3af709c46bf551b73a0a81860ccb8daf5e6fc98755014c91bf8146131ffe350691e

  • SSDEEP

    24576:2TbBv5rUyXVkW04UlpbayL/VxDqddNa9HGqDK0q8xGUxTW3TUFJcGqfc6Nl9WnXQ:IBJkz6SxGUBWZNfRl9WnXE5

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2891a1770d5724146e5c2b436b990f66.exe
    "C:\Users\Admin\AppData\Local\Temp\2891a1770d5724146e5c2b436b990f66.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\AgentRef\OkvCGDfU3ex3.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\AgentRef\bnbVUJlvMujqmG.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\AgentRef\hyperServerWebreview.exe
          "C:\AgentRef/hyperServerWebreview.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nntfldho\nntfldho.cmdline"
            5⤵
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:388
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4328.tmp" "c:\Windows\System32\CSCDB745A99FF1B4AD8BF4EE2D5D953D632.TMP"
              6⤵
                PID:2524
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\whfjDxqUJ9.bat"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2268
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:2112
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:2916
                • C:\AgentRef\hyperServerWebreview.exe
                  "C:\AgentRef\hyperServerWebreview.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1572
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Libraries\winlogon.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1268
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Public\Libraries\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1676
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Libraries\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1720
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:944
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2936
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1564
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Windows\system\sppsvc.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2864
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\system\sppsvc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:768
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Windows\system\sppsvc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2336
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1756
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3016
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2120
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\AgentRef\lsass.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2492
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\AgentRef\lsass.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2232
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\AgentRef\lsass.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2196
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "hyperServerWebreviewh" /sc MINUTE /mo 6 /tr "'C:\AgentRef\hyperServerWebreview.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2096
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "hyperServerWebreview" /sc ONLOGON /tr "'C:\AgentRef\hyperServerWebreview.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1348
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "hyperServerWebreviewh" /sc MINUTE /mo 10 /tr "'C:\AgentRef\hyperServerWebreview.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1864

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\AgentRef\OkvCGDfU3ex3.vbe

        Filesize

        197B

        MD5

        fb2cbdc312e57c37b697fd0fbf537d35

        SHA1

        39234d3130e5192fd7b957105498ff2ea129ef30

        SHA256

        c5e9bc252b96bcb1c42066ea50f86ba57a5a900d07d467882ba7355d7bd776ec

        SHA512

        e46155fbe1443ad4e34d26e3644a4bd0afeafdbdc1127a881a6fd8055aa2ab3eef0b2cbb27147ad24642e3e789fa1954621ff913a2acd2cc50561a0951f3f0f2

      • C:\AgentRef\bnbVUJlvMujqmG.bat

        Filesize

        82B

        MD5

        ef88eab648293dff34d1c614f19e6ba8

        SHA1

        ab2b9b312478c87906dbf19d74ad6daac55ec3ed

        SHA256

        bf4bb20748552d481137a59ea3f2135b670dc52f934fe191f089c263d43ea75d

        SHA512

        c691650e243aa6ae81edcddba7f6667020191a8004f816ec29ba929fff6a2ba4e9f2a9a0f3d6296e0842fdbe01f59c53303bb5e6e8ff521327f0d790c2546e1b

      • C:\Users\Admin\AppData\Local\Temp\RES4328.tmp

        Filesize

        1KB

        MD5

        5fd4877ec235164c7757da91b2a32e03

        SHA1

        0756725b52b6305f3071b6f0b86d171abd9f03ea

        SHA256

        817ff1f2485a2f0e45c3191dcbb9503cd472b6470d1dcd58432bb156324e2301

        SHA512

        e020eb14db68ef104414e5e3f96db3057539126e6f9dd5d7202856246a38812509268485a842cef380f0d0169b781527a826719b2a27a88c6b4681489f348afd

      • C:\Users\Admin\AppData\Local\Temp\whfjDxqUJ9.bat

        Filesize

        164B

        MD5

        f59baa938145a4966d5f97194be44eae

        SHA1

        b56449ff297151019a7878f0f823de4f2adbac7e

        SHA256

        1b67068d4e06b623bd3745a9dafbc0f825fe0fa6284667dca30fdff4ebdd527e

        SHA512

        6da25392a470150f917b5b5e21cc0e397e1ba81648b705944befa4f1df72540c39778355b3c7e444006bf941814c4ed54d008099213f69f396d3588177af626e

      • \??\c:\Users\Admin\AppData\Local\Temp\nntfldho\nntfldho.0.cs

        Filesize

        370B

        MD5

        a30e74fde10bc0e8f5c735b41a747d2b

        SHA1

        a0bef71624d400598963d3e01baaf74758f2ade9

        SHA256

        4d02ea3236836dd3910c5885aeb54fe534e510bf4939863ae3b571e1b798d2f2

        SHA512

        6efa01fc47fc3b15f19ade21a76701971b32c8258c2976aba64324091ce8ddffd720a0f9d23bf8e2b4573828b8e127f358c3f77b4efbb965a8663c29e9ff8429

      • \??\c:\Users\Admin\AppData\Local\Temp\nntfldho\nntfldho.cmdline

        Filesize

        235B

        MD5

        a2317c9f0cab30dd7d59c591685eb2e9

        SHA1

        543baefda3c3ba4304182eca8947e9e089c16441

        SHA256

        146f859c5ea48be6a8b3c53f62500dafd18d260b968a97d4727c85160963e8a1

        SHA512

        0127ca1b00d60171bc9dca619ea8b80d7a9d190e741922f5c7ff9eed077233ac6a3d85392b1103679ab799d8ea5914d578261d003c83228ae127e2bba17daf6e

      • \??\c:\Windows\System32\CSCDB745A99FF1B4AD8BF4EE2D5D953D632.TMP

        Filesize

        1KB

        MD5

        60a1ebb8f840aad127346a607d80fc19

        SHA1

        c8b7e9ad601ac19ab90b3e36f811960e8badf354

        SHA256

        9d6a9d38b7a86cc88e551a0c1172a3fb387b1a5f928ac13993ec3387d39cc243

        SHA512

        44830cefb264bac520174b4b884312dd0393be33a193d4f0fee3cc3c14deb86ca39e43ef281232f9169fd204d19b22e8a7aad72fa448ca52d5cbc3ee1dbb18a4

      • \AgentRef\hyperServerWebreview.exe

        Filesize

        2.0MB

        MD5

        a8a6023702a2b0a6d26e89836a2db7c3

        SHA1

        2ef4e311df983ab8792cdacf88213f452a07db7c

        SHA256

        93e1b97ae8a204de7100236e263ac4641a132587d2538b9e8f17303628a13c25

        SHA512

        4779c50be20b714ef52273594d08b07884e8a0a631b11754ad485facc01423cac31bb449b18843454df7b37b9736766ecdbc06a88934be98f99311591c43a57f

      • memory/1572-59-0x0000000000340000-0x000000000053C000-memory.dmp

        Filesize

        2.0MB

      • memory/2744-15-0x0000000000300000-0x000000000030E000-memory.dmp

        Filesize

        56KB

      • memory/2744-27-0x0000000000580000-0x000000000058E000-memory.dmp

        Filesize

        56KB

      • memory/2744-29-0x0000000000590000-0x0000000000598000-memory.dmp

        Filesize

        32KB

      • memory/2744-25-0x0000000000570000-0x000000000057C000-memory.dmp

        Filesize

        48KB

      • memory/2744-23-0x0000000000320000-0x000000000032C000-memory.dmp

        Filesize

        48KB

      • memory/2744-21-0x0000000000310000-0x000000000031E000-memory.dmp

        Filesize

        56KB

      • memory/2744-19-0x00000000004D0000-0x00000000004E8000-memory.dmp

        Filesize

        96KB

      • memory/2744-17-0x00000000004B0000-0x00000000004CC000-memory.dmp

        Filesize

        112KB

      • memory/2744-13-0x00000000009B0000-0x0000000000BAC000-memory.dmp

        Filesize

        2.0MB