Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:10 UTC

General

  • Target

    4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8.exe

  • Size

    984KB

  • MD5

    bf8b1d73a37f97278df6d25ee245e3a9

  • SHA1

    7ad5a5b889a0cbbcf81e69185764596578d0e0b4

  • SHA256

    4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8

  • SHA512

    5d351633f0575ab64b4e47073a0e689780c88d4ce9469f67c539b7946684ef6d54b859a31a7ae486f0ed11fb1939045988bfcd53a089ef4757b78f83148474a5

  • SSDEEP

    12288:zzZvuvewk/0pPPXA5q/TQ9+n95vV25gnwHexSDwbwvDxlpaS98IUNldnd65EgF1s:zzZvuGD2PvA5YxwmbZB6Uv

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 11 IoCs
  • Drops file in System32 directory 11 IoCs
  • Drops file in Program Files directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8.exe
    "C:\Users\Admin\AppData\Local\Temp\4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\J9hm3NTxxH.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1720
        • C:\Users\Admin\AppData\Local\Temp\4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8.exe
          "C:\Users\Admin\AppData\Local\Temp\4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:628
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aLHJMxr28n.bat"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1112
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              5⤵
                PID:1796
              • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe
                "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:444
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPC\OSPPSVC.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2828
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\setupugc\lsm.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2908
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\4fdfbb239de16fb7275a4246ee21f87a0193a6f2fbc4692a347e7e9248d1c1ca\4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2824
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppobjs-spp-plugin-manifest-signed\OSPPSVC.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2188
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8" /sc ONLOGON /tr "'C:\Recovery\8490d022-e5e1-11ef-8fd8-4a893fa2fe1c\4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2732
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\WinSync\spoolsv.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2964
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2868
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Recovery\8490d022-e5e1-11ef-8fd8-4a893fa2fe1c\OSPPSVC.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1452
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2132
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\de-DE\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2168
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\dxtrans\smss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:332

      Network

        No results found
      • 62.113.118.176:80
        WmiPrvSE.exe
        152 B
        120 B
        3
        3
      • 62.113.118.176:80
        WmiPrvSE.exe
        152 B
        120 B
        3
        3
      No results found

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\taskhost.exe

        Filesize

        984KB

        MD5

        5fe5c9b5b8c38f254ebf7fb3c38b1f2e

        SHA1

        56c9d7bd6165384193b332a04b7f5b18c5625bd5

        SHA256

        fd0f225f9d5d0645094aa9c0bb6812dc453ef15f25b32b344b3ec9c3f0e4674f

        SHA512

        7b18e03b6f0351fbc426d7cc78129a5c14f144e9c506caa45f9e5d3a5e6f308359b25b1ee7a10818676ecb4edc88d75c49c5588b1861136e3b7416eefd4978a5

      • C:\Recovery\8490d022-e5e1-11ef-8fd8-4a893fa2fe1c\4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8.exe

        Filesize

        984KB

        MD5

        bf8b1d73a37f97278df6d25ee245e3a9

        SHA1

        7ad5a5b889a0cbbcf81e69185764596578d0e0b4

        SHA256

        4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8

        SHA512

        5d351633f0575ab64b4e47073a0e689780c88d4ce9469f67c539b7946684ef6d54b859a31a7ae486f0ed11fb1939045988bfcd53a089ef4757b78f83148474a5

      • C:\Users\Admin\AppData\Local\Temp\J9hm3NTxxH.bat

        Filesize

        266B

        MD5

        f53511bd111ed26de8d12d1b403810f4

        SHA1

        91c10cc0b8ecd516abecff468dde91445e94f5ff

        SHA256

        66f0db63da0e7ff36fbb27bd553846fd8892aa66f7cdc4177b7aed924449a9ea

        SHA512

        8c33d6ca103f7a78d2e9ee06b0bac76491e87021dd0403f405aa6eb294945c63a849be4c01ba99cece424bdcfe8ed630d0ff23d9cc1418a43e62b10f3b35c7bb

      • C:\Users\Admin\AppData\Local\Temp\aLHJMxr28n.bat

        Filesize

        239B

        MD5

        9681312d8757db1b2eac7c3a21efb840

        SHA1

        a45e90e7a7de5311c666abc9b7dbe9d8ba4bf070

        SHA256

        b1442f569cabf73e27f31390f68ef84866e7838003302b953dc1fca3c24249d2

        SHA512

        555b87078db0ddc1ab12e8022886af08646dc5b8b2dc874bffa0ce636dea305e66fc4c3a035b0dc660c58ca2f5604830624bf0b9c63e416064df9359925e6969

      • memory/444-109-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

        Filesize

        72KB

      • memory/444-108-0x0000000000DA0000-0x0000000000E9C000-memory.dmp

        Filesize

        1008KB

      • memory/628-84-0x0000000000520000-0x0000000000532000-memory.dmp

        Filesize

        72KB

      • memory/628-83-0x0000000000340000-0x000000000043C000-memory.dmp

        Filesize

        1008KB

      • memory/2624-7-0x00000000005D0000-0x00000000005E0000-memory.dmp

        Filesize

        64KB

      • memory/2624-6-0x0000000000520000-0x0000000000528000-memory.dmp

        Filesize

        32KB

      • memory/2624-5-0x0000000000510000-0x0000000000520000-memory.dmp

        Filesize

        64KB

      • memory/2624-10-0x0000000000A80000-0x0000000000A8C000-memory.dmp

        Filesize

        48KB

      • memory/2624-8-0x0000000000530000-0x000000000053C000-memory.dmp

        Filesize

        48KB

      • memory/2624-81-0x000007FEF5670000-0x000007FEF605C000-memory.dmp

        Filesize

        9.9MB

      • memory/2624-9-0x0000000000540000-0x0000000000552000-memory.dmp

        Filesize

        72KB

      • memory/2624-0-0x000007FEF5673000-0x000007FEF5674000-memory.dmp

        Filesize

        4KB

      • memory/2624-4-0x00000000003D0000-0x00000000003E0000-memory.dmp

        Filesize

        64KB

      • memory/2624-3-0x00000000004F0000-0x000000000050C000-memory.dmp

        Filesize

        112KB

      • memory/2624-2-0x000007FEF5670000-0x000007FEF605C000-memory.dmp

        Filesize

        9.9MB

      • memory/2624-1-0x0000000000CF0000-0x0000000000DEC000-memory.dmp

        Filesize

        1008KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.