Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:15

General

  • Target

    b6baedc86ebdd4c9c3cc812f509f777b.exe

  • Size

    999KB

  • MD5

    b6baedc86ebdd4c9c3cc812f509f777b

  • SHA1

    1dfd321978faba568b114ef07a663e799899b0c4

  • SHA256

    7197f07c5612e994e7f66a40975e6ebc328847ab957ba0c84625e1c9f4543c69

  • SHA512

    6b292e829209cfc6e2f7c7cd2c4afc4ce77cd36042e9af9494ad934f1ff840f7050511c09a54fcf9b4e2fafd27492ae7ba295bf8783e4158ed369b4c20440aa1

  • SSDEEP

    12288:H9pLLk45WSSY1BX6f4bIS7rMNetPfC9Vs6IFGs0jxAqXj9xPSI0dzNgCoD7WX+Iu:H9pP5WS3lrMNyC9TJPCXBi

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • Process spawned unexpected child process 16 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6baedc86ebdd4c9c3cc812f509f777b.exe
    "C:\Users\Admin\AppData\Local\Temp\b6baedc86ebdd4c9c3cc812f509f777b.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\ProgramData\Application Data\lsm.exe
      "C:\ProgramData\Application Data\lsm.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:696
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsm" /sc MINUTE /mo 5 /tr "'C:\ProgramData\Application Data\lsm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2712
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\ProgramData\Application Data\lsm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2744
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsm" /sc ONSTART /tr "'C:\ProgramData\Application Data\lsm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2840
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\ProgramData\Application Data\lsm.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2616
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OSPPSVC" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Searches\OSPPSVC.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3016
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Users\Admin\Searches\OSPPSVC.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1916
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OSPPSVC" /sc ONSTART /tr "'C:\Users\Admin\Searches\OSPPSVC.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:856
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Searches\OSPPSVC.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2020
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Idle" /sc MINUTE /mo 9 /tr "'C:\ProgramData\Documents\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2764
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\ProgramData\Documents\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2060
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Idle" /sc ONSTART /tr "'C:\ProgramData\Documents\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2168
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\ProgramData\Documents\Idle.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2376
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Videos\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1236
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\Videos\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:308
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONSTART /tr "'C:\Users\Default\Videos\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2288
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Videos\sppsvc.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RCX35FF.tmp

    Filesize

    999KB

    MD5

    b6baedc86ebdd4c9c3cc812f509f777b

    SHA1

    1dfd321978faba568b114ef07a663e799899b0c4

    SHA256

    7197f07c5612e994e7f66a40975e6ebc328847ab957ba0c84625e1c9f4543c69

    SHA512

    6b292e829209cfc6e2f7c7cd2c4afc4ce77cd36042e9af9494ad934f1ff840f7050511c09a54fcf9b4e2fafd27492ae7ba295bf8783e4158ed369b4c20440aa1

  • C:\Users\Public\Documents\Idle.exe

    Filesize

    999KB

    MD5

    704687bde4d1946d607c1a6f4e7873f6

    SHA1

    78f966934ec1e62ab8676dfb2ec09aae02cafb08

    SHA256

    1eddff1c9743d9dfda5dd76e00176cec609d76c43bd7c65cd6060ae983ee08b9

    SHA512

    2659a3e6cb9261fbeb3acb17ab8056bc9cac2dfb3d2c2767cd3fb9ac4ecd1ba9b3599e8cf8d70ea321735158396ff18f7682e90a7ca9d0286918434281b49889

  • memory/696-78-0x0000000001260000-0x0000000001360000-memory.dmp

    Filesize

    1024KB

  • memory/2732-8-0x0000000000690000-0x000000000069E000-memory.dmp

    Filesize

    56KB

  • memory/2732-3-0x00000000004B0000-0x00000000004CC000-memory.dmp

    Filesize

    112KB

  • memory/2732-7-0x0000000000680000-0x000000000068C000-memory.dmp

    Filesize

    48KB

  • memory/2732-0-0x000007FEF5D33000-0x000007FEF5D34000-memory.dmp

    Filesize

    4KB

  • memory/2732-6-0x0000000000670000-0x0000000000680000-memory.dmp

    Filesize

    64KB

  • memory/2732-9-0x00000000006A0000-0x00000000006AC000-memory.dmp

    Filesize

    48KB

  • memory/2732-5-0x0000000000660000-0x0000000000670000-memory.dmp

    Filesize

    64KB

  • memory/2732-10-0x00000000006B0000-0x00000000006BC000-memory.dmp

    Filesize

    48KB

  • memory/2732-4-0x00000000004D0000-0x00000000004E0000-memory.dmp

    Filesize

    64KB

  • memory/2732-2-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

    Filesize

    9.9MB

  • memory/2732-77-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

    Filesize

    9.9MB

  • memory/2732-1-0x00000000000F0000-0x00000000001F0000-memory.dmp

    Filesize

    1024KB