Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2025, 11:25

General

  • Target

    libcares-2.dll

  • Size

    1.9MB

  • MD5

    49abecb8967a527f3f8b5493f0f82820

  • SHA1

    31b535360199e41ae87111b36f9ef97977b3d9c6

  • SHA256

    17f1ca60b529a4617fdd64bdf686b78f704abbe6d19b69c109bffd352ac9503c

  • SHA512

    614593697a2acd897331595cc56164601528c03be6966aa599e2f541276ea71fdcc547195534119904da921b5fa9f8c5e14777c126aa6827be57b2b406d19be4

  • SSDEEP

    49152:A7rb1O0bSOWgRKuMCnuuUr11O75hIE1q9n/Xl:dN1

Malware Config

Extracted

Family

darkvision

C2

myasyncrat.ddns.net

Signatures

  • DarkVision Rat

    DarkVision Rat is a trojan written in C++.

  • Darkvision family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\libcares-2.dll,#1
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\SystemRootDoc' -Force"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2400
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
      2⤵
        PID:1636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1636-1-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/1636-0-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/1636-13-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/1636-12-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/1636-4-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/1636-9-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/1636-7-0x000007FFFFFDA000-0x000007FFFFFDB000-memory.dmp

      Filesize

      4KB

    • memory/1636-6-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/1636-5-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/1636-3-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/1636-11-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/1636-26-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/1636-2-0x0000000140000000-0x000000014007A000-memory.dmp

      Filesize

      488KB

    • memory/2400-20-0x00000000021D0000-0x00000000021D8000-memory.dmp

      Filesize

      32KB

    • memory/2400-19-0x000000001B5C0000-0x000000001B8A2000-memory.dmp

      Filesize

      2.9MB

    • memory/2400-21-0x000007FEF5D40000-0x000007FEF66DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2400-22-0x000007FEF5D40000-0x000007FEF66DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2400-23-0x000007FEF5D40000-0x000007FEF66DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2400-24-0x0000000002B8B000-0x0000000002BF2000-memory.dmp

      Filesize

      412KB

    • memory/2400-25-0x000007FEF5D40000-0x000007FEF66DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2400-18-0x000007FEF5FFE000-0x000007FEF5FFF000-memory.dmp

      Filesize

      4KB