Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10b4d16a23c4...cd.exe
windows7-x64
10b4d16a23c4...cd.exe
windows10-2004-x64
10b4eca0b762...e1.exe
windows7-x64
1b4eca0b762...e1.exe
windows10-2004-x64
1b4f9f36ada...07.exe
windows7-x64
10b4f9f36ada...07.exe
windows10-2004-x64
10b5002c08a1...bc.exe
windows7-x64
10b5002c08a1...bc.exe
windows10-2004-x64
10b55e92f4a2...a6.exe
windows7-x64
10b55e92f4a2...a6.exe
windows10-2004-x64
10b5687bfac8...82.exe
windows7-x64
10b5687bfac8...82.exe
windows10-2004-x64
10b580ffe62d...98.exe
windows7-x64
7b580ffe62d...98.exe
windows10-2004-x64
7b599b9b1d6...6f.exe
windows7-x64
7b599b9b1d6...6f.exe
windows10-2004-x64
10b5ac1858b7...1a.exe
windows7-x64
5b5ac1858b7...1a.exe
windows10-2004-x64
5b65e1ac2a1...74.exe
windows7-x64
10b65e1ac2a1...74.exe
windows10-2004-x64
10b67576c827...e2.exe
windows7-x64
10b67576c827...e2.exe
windows10-2004-x64
10b68768d198...a8.exe
windows7-x64
7b68768d198...a8.exe
windows10-2004-x64
7b6982d011a...3b.exe
windows7-x64
10b6982d011a...3b.exe
windows10-2004-x64
10b6b7f4db83...cc.exe
windows7-x64
3b6b7f4db83...cc.exe
windows10-2004-x64
3b6baedc86e...7b.exe
windows7-x64
10b6baedc86e...7b.exe
windows10-2004-x64
10b6cd4cbecb...e2.exe
windows7-x64
10b6cd4cbecb...e2.exe
windows10-2004-x64
10Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:15
Behavioral task
behavioral1
Sample
b4d16a23c4f84119b08271727b504dc277cc03929f4437c01640b9fe610474cd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4d16a23c4f84119b08271727b504dc277cc03929f4437c01640b9fe610474cd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
b4eca0b7629d60f6cf396e664ca50add98b7376955d993c98d1399bab2da9ae1.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
b4eca0b7629d60f6cf396e664ca50add98b7376955d993c98d1399bab2da9ae1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
b4f9f36ada3d9d3cf8af85679ea3a007.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
b4f9f36ada3d9d3cf8af85679ea3a007.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
b55e92f4a25bac9a1f90a8cf3d7ef9c91d1649598d692eb497d8fed1f20a97a6.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
b55e92f4a25bac9a1f90a8cf3d7ef9c91d1649598d692eb497d8fed1f20a97a6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
b5687bfac89811969dd02dad17352b82.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
b5687bfac89811969dd02dad17352b82.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
b580ffe62d19e702d07e69a2f421a298.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
b580ffe62d19e702d07e69a2f421a298.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
b599b9b1d6311136ef7c416782fdd16f.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
b599b9b1d6311136ef7c416782fdd16f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
b5ac1858b7313eca6ad65f6506620f1a.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
b5ac1858b7313eca6ad65f6506620f1a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
b65e1ac2a1c32fcf66f67031ebe907e9ca4e1a7cbae7589979b1eba091b6e174.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
b65e1ac2a1c32fcf66f67031ebe907e9ca4e1a7cbae7589979b1eba091b6e174.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
b67576c827f1d682c6863ee2e1b096afb845073be33737653fa7754565634ce2.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
b67576c827f1d682c6863ee2e1b096afb845073be33737653fa7754565634ce2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
b68768d198b634640052e1541b761c4940795292cb1bc0cd4349a7c9d1292da8.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
b68768d198b634640052e1541b761c4940795292cb1bc0cd4349a7c9d1292da8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
b6982d011a327e88728cfc8b6305503b.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
b6982d011a327e88728cfc8b6305503b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
b6b7f4db83367b212cbd15bcfaa2eacc.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
b6b7f4db83367b212cbd15bcfaa2eacc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
b6baedc86ebdd4c9c3cc812f509f777b.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
b6baedc86ebdd4c9c3cc812f509f777b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
b6cd4cbecbd20d06768408f952a13721fb22fdbeca097913deeebe41a41b3ae2.exe
Resource
win7-20240903-en
General
-
Target
b6baedc86ebdd4c9c3cc812f509f777b.exe
-
Size
999KB
-
MD5
b6baedc86ebdd4c9c3cc812f509f777b
-
SHA1
1dfd321978faba568b114ef07a663e799899b0c4
-
SHA256
7197f07c5612e994e7f66a40975e6ebc328847ab957ba0c84625e1c9f4543c69
-
SHA512
6b292e829209cfc6e2f7c7cd2c4afc4ce77cd36042e9af9494ad934f1ff840f7050511c09a54fcf9b4e2fafd27492ae7ba295bf8783e4158ed369b4c20440aa1
-
SSDEEP
12288:H9pLLk45WSSY1BX6f4bIS7rMNetPfC9Vs6IFGs0jxAqXj9xPSI0dzNgCoD7WX+Iu:H9pP5WS3lrMNyC9TJPCXBi
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\Application Data\\lsm.exe\", \"C:\\Users\\Admin\\Searches\\OSPPSVC.exe\"" b6baedc86ebdd4c9c3cc812f509f777b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\Application Data\\lsm.exe\", \"C:\\Users\\Admin\\Searches\\OSPPSVC.exe\", \"C:\\ProgramData\\Documents\\Idle.exe\"" b6baedc86ebdd4c9c3cc812f509f777b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\Application Data\\lsm.exe\", \"C:\\Users\\Admin\\Searches\\OSPPSVC.exe\", \"C:\\ProgramData\\Documents\\Idle.exe\", \"C:\\Users\\Default\\Videos\\sppsvc.exe\"" b6baedc86ebdd4c9c3cc812f509f777b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\Application Data\\lsm.exe\"" b6baedc86ebdd4c9c3cc812f509f777b.exe -
Process spawned unexpected child process 16 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2712 2900 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1916 2900 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3016 2900 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 2900 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2840 2900 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2744 2900 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 856 2900 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2020 2900 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2376 2900 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2168 2900 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2060 2900 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2764 2900 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2560 2900 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2288 2900 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 308 2900 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1236 2900 schtasks.exe 30 -
Executes dropped EXE 1 IoCs
pid Process 696 lsm.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\ProgramData\\Application Data\\lsm.exe\"" b6baedc86ebdd4c9c3cc812f509f777b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Users\\Admin\\Searches\\OSPPSVC.exe\"" b6baedc86ebdd4c9c3cc812f509f777b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\ProgramData\\Documents\\Idle.exe\"" b6baedc86ebdd4c9c3cc812f509f777b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Users\\Default\\Videos\\sppsvc.exe\"" b6baedc86ebdd4c9c3cc812f509f777b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2020 schtasks.exe 2060 schtasks.exe 2744 schtasks.exe 2560 schtasks.exe 2288 schtasks.exe 308 schtasks.exe 2376 schtasks.exe 2712 schtasks.exe 2840 schtasks.exe 856 schtasks.exe 2168 schtasks.exe 2764 schtasks.exe 1236 schtasks.exe 1916 schtasks.exe 3016 schtasks.exe 2616 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2732 b6baedc86ebdd4c9c3cc812f509f777b.exe 2732 b6baedc86ebdd4c9c3cc812f509f777b.exe 2732 b6baedc86ebdd4c9c3cc812f509f777b.exe 2732 b6baedc86ebdd4c9c3cc812f509f777b.exe 2732 b6baedc86ebdd4c9c3cc812f509f777b.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2732 b6baedc86ebdd4c9c3cc812f509f777b.exe Token: SeDebugPrivilege 696 lsm.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2732 wrote to memory of 696 2732 b6baedc86ebdd4c9c3cc812f509f777b.exe 47 PID 2732 wrote to memory of 696 2732 b6baedc86ebdd4c9c3cc812f509f777b.exe 47 PID 2732 wrote to memory of 696 2732 b6baedc86ebdd4c9c3cc812f509f777b.exe 47 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6baedc86ebdd4c9c3cc812f509f777b.exe"C:\Users\Admin\AppData\Local\Temp\b6baedc86ebdd4c9c3cc812f509f777b.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\ProgramData\Application Data\lsm.exe"C:\ProgramData\Application Data\lsm.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc MINUTE /mo 5 /tr "'C:\ProgramData\Application Data\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\ProgramData\Application Data\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONSTART /tr "'C:\ProgramData\Application Data\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\ProgramData\Application Data\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Searches\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Users\Admin\Searches\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONSTART /tr "'C:\Users\Admin\Searches\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Searches\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc MINUTE /mo 9 /tr "'C:\ProgramData\Documents\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\ProgramData\Documents\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONSTART /tr "'C:\ProgramData\Documents\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\ProgramData\Documents\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Videos\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\Videos\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONSTART /tr "'C:\Users\Default\Videos\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Videos\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2560
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
999KB
MD5b6baedc86ebdd4c9c3cc812f509f777b
SHA11dfd321978faba568b114ef07a663e799899b0c4
SHA2567197f07c5612e994e7f66a40975e6ebc328847ab957ba0c84625e1c9f4543c69
SHA5126b292e829209cfc6e2f7c7cd2c4afc4ce77cd36042e9af9494ad934f1ff840f7050511c09a54fcf9b4e2fafd27492ae7ba295bf8783e4158ed369b4c20440aa1
-
Filesize
999KB
MD5704687bde4d1946d607c1a6f4e7873f6
SHA178f966934ec1e62ab8676dfb2ec09aae02cafb08
SHA2561eddff1c9743d9dfda5dd76e00176cec609d76c43bd7c65cd6060ae983ee08b9
SHA5122659a3e6cb9261fbeb3acb17ab8056bc9cac2dfb3d2c2767cd3fb9ac4ecd1ba9b3599e8cf8d70ea321735158396ff18f7682e90a7ca9d0286918434281b49889