Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
107282a7060d...a7.exe
windows7-x64
107282a7060d...a7.exe
windows10-2004-x64
107286d086dc...6f.exe
windows7-x64
107286d086dc...6f.exe
windows10-2004-x64
10729c059086...ed.exe
windows7-x64
10729c059086...ed.exe
windows10-2004-x64
1072f303c648...1a.exe
windows7-x64
772f303c648...1a.exe
windows10-2004-x64
772f4a85245...cc.exe
windows7-x64
1072f4a85245...cc.exe
windows10-2004-x64
1072ff89c7cd...9f.exe
windows7-x64
1072ff89c7cd...9f.exe
windows10-2004-x64
107307a761db...38.exe
windows7-x64
107307a761db...38.exe
windows10-2004-x64
107309f93555...28.exe
windows7-x64
37309f93555...28.exe
windows10-2004-x64
10730efb97bd...a1.exe
windows7-x64
7730efb97bd...a1.exe
windows10-2004-x64
7732ab0ac86...7a.exe
windows7-x64
10732ab0ac86...7a.exe
windows10-2004-x64
1073522a2d41...71.exe
windows7-x64
1073522a2d41...71.exe
windows10-2004-x64
87355fddf5e...6e.exe
windows7-x64
107355fddf5e...6e.exe
windows10-2004-x64
10736e4ed229...93.exe
windows7-x64
7736e4ed229...93.exe
windows10-2004-x64
1073bc8a93cd...07.exe
windows7-x64
1073bc8a93cd...07.exe
windows10-2004-x64
1073d6911ed2...07.exe
windows7-x64
1073d6911ed2...07.exe
windows10-2004-x64
1073eb32431f...ff.exe
windows7-x64
773eb32431f...ff.exe
windows10-2004-x64
10General
-
Target
archive_28.zip
-
Size
97.0MB
-
Sample
250322-gylfsayzhs
-
MD5
943aa1a744111aae97d70b5406cbd36f
-
SHA1
a04dc31d1927c79e1e8d8e3a2191e587c65a4ede
-
SHA256
56eaeb544a5b324a1b498dc1839a346277ea0ba6840f6d5ceb898b823f14d2d5
-
SHA512
af6e4051bd91c305d325ae0afc76dbb95fc3f3172a9e2697746fb7ca511db4caaaea0c90730503b4087f9865e7905f615affd910970f803b524f807356c29bf6
-
SSDEEP
1572864:vs1JUZ+dYMj9xQuC1LaShPMK5jW+dFJADWui0PM/jDq5QwZ11C95enHfn:01JU+d3ULaShPdFdFitiiZ11Cof
Behavioral task
behavioral1
Sample
7282a7060d25903b0e631d894251e21fb6c82756ff630ea2493f184bc3687ea7.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7282a7060d25903b0e631d894251e21fb6c82756ff630ea2493f184bc3687ea7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
7286d086dc442793539e770e59762d9c65e219c1f748ec7ce09684971954e16f.exe
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
7286d086dc442793539e770e59762d9c65e219c1f748ec7ce09684971954e16f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
729c059086bce232a39d74a0b680bfed.exe
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
729c059086bce232a39d74a0b680bfed.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
72f303c6485d038f4cfbf6150660f36e3de8818fe65d3451573dd1f8722ec11a.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
72f303c6485d038f4cfbf6150660f36e3de8818fe65d3451573dd1f8722ec11a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
72f4a85245337b0fcdb662a2cbf0b9a59edbf1208e4a2840c09c7d4fbb6012cc.exe
Resource
win7-20250207-en
Behavioral task
behavioral10
Sample
72f4a85245337b0fcdb662a2cbf0b9a59edbf1208e4a2840c09c7d4fbb6012cc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
72ff89c7cdaac70515ac184accbd4c9f.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
72ff89c7cdaac70515ac184accbd4c9f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
7307a761db7cdc6093352c9942350f8b7fa9836822750ab63efb80a3e58e6938.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
7307a761db7cdc6093352c9942350f8b7fa9836822750ab63efb80a3e58e6938.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
7309f9355589e2cc6fcc0b43174b8c28.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
7309f9355589e2cc6fcc0b43174b8c28.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
730efb97bdfa1760333c3ab9323de9a1.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
730efb97bdfa1760333c3ab9323de9a1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
732ab0ac86cc174dcf4d86a03d83e27a.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
732ab0ac86cc174dcf4d86a03d83e27a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
73522a2d4140ec446c401c39d07eec71.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
73522a2d4140ec446c401c39d07eec71.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
7355fddf5edf9713b4450982937bca6e.exe
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
7355fddf5edf9713b4450982937bca6e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
736e4ed2299f5ec127d8f98265dc5a93.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
736e4ed2299f5ec127d8f98265dc5a93.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
73bc8a93cdbba019a429afa403b8ab07.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
73bc8a93cdbba019a429afa403b8ab07.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
73d6911ed247a840f2f372a605a99407.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
73d6911ed247a840f2f372a605a99407.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
73eb32431f602f42759a38c5eab47eff.exe
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
73eb32431f602f42759a38c5eab47eff.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
xworm
127.0.0.1:4966
looking-page.gl.at.ply.gg:4966
27.ip.gl.ply.gg:3174
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
njrat
0.6.4
اسد الموصل
ssssss.ddns.net:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
127.0.0.1:29707
proposed-madagascar.gl.at.ply.gg:8848
proposed-madagascar.gl.at.ply.gg:29707
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
xworm
5.0
192.168.1.214:44060
127.0.0.1:44060
y49LqARGywqVhfPi
-
Install_directory
%AppData%
-
install_file
Xclient.exe
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Boy12345#
Extracted
nanocore
1.2.2.0
sysupdate24.ddns.net:45400
ae82ab7f-db07-49ee-9d2b-76075d76f37f
-
activate_away_mode
true
- backup_connection_host
- backup_dns_server
-
buffer_size
65535
-
build_time
2020-04-24T17:41:53.492468936Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
45400
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
ae82ab7f-db07-49ee-9d2b-76075d76f37f
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
sysupdate24.ddns.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
7282a7060d25903b0e631d894251e21fb6c82756ff630ea2493f184bc3687ea7.exe
-
Size
613KB
-
MD5
dd5a1f2078d15f32af4db9785a2e2386
-
SHA1
f26bafb7dea803ad4ab852f87c0c5b8e89db98c1
-
SHA256
7282a7060d25903b0e631d894251e21fb6c82756ff630ea2493f184bc3687ea7
-
SHA512
eed5bbd611dc02e05fb6a58d52ad85380f84d9df845f0356f1dc3f865e9e6f7e68c3699cc39d78fac27a6954cd5727bae48118799d56fa3db3e7f38ef1007a2f
-
SSDEEP
6144:GtT/Yq3v9Auky+4dusAIFB++velibxPyp/64wjOjn6cB3ri51:q6u7+487IFjvelQypyfy7i51
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
7286d086dc442793539e770e59762d9c65e219c1f748ec7ce09684971954e16f.exe
-
Size
3.3MB
-
MD5
eb76f554fb6b7b172e6042096d7a42c4
-
SHA1
54249e327afe53b67e76569f622100b532c3f794
-
SHA256
7286d086dc442793539e770e59762d9c65e219c1f748ec7ce09684971954e16f
-
SHA512
2a972d9b2237da9ac53140d5f32d18235a1a8e22a7c8c21f2b8472b5e9a00a2134f1db67231331f42b427925b760def2c9e54bf6d62bffaf06d509460154d063
-
SSDEEP
49152:7s51kZEsvhP4KUYTMb5C1JyWdLQqFxLCobXK45p4aE:7s5eaKhgKUFCo2LP15s
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
-
-
Target
729c059086bce232a39d74a0b680bfed.exe
-
Size
885KB
-
MD5
729c059086bce232a39d74a0b680bfed
-
SHA1
832281677409fc0e150bdf6132be849824a265ea
-
SHA256
7a7f0076056b3e2b93a330a8af8df9d43f43a83b50931f2888f0db411c8e2024
-
SHA512
ca3f47323cc5018608c1c466f4805569df73523a6dcc6367f77bfd6d6a36393937222c0f0dfa89a748dc0406f40fc385761cef432aac1a9cd8d41857b6136c0d
-
SSDEEP
12288:UlNE5VnZuh+ZIlXJBH5SP2I/lwvDT77/wOKsV42i3GULVaHeopyyx:UlNCv6XJ5BClaXfD9vUha+u
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
-
-
Target
72f303c6485d038f4cfbf6150660f36e3de8818fe65d3451573dd1f8722ec11a.exe
-
Size
68.0MB
-
MD5
301ab254348c4beb03c43663c51b8c8b
-
SHA1
e6c668de0c643232b01c86fd8060ea2caacfca99
-
SHA256
72f303c6485d038f4cfbf6150660f36e3de8818fe65d3451573dd1f8722ec11a
-
SHA512
8d8c39a1280683c1d05d71f8c49bd22679463ffa64ecbd60319832d3de6e209473d748d72a81e0cb2a5d71823ea70c9edd273afb488ab9a625222483914ad46b
-
SSDEEP
1572864:+1YnA7A8R7tqEwTDYKJbQ0JxcgjnrUBOO8CPOLJreZq+hhXcI:+10A7B+DYKJbndjnoH8MhhXcI
Score7/10-
Executes dropped EXE
-
-
-
Target
72f4a85245337b0fcdb662a2cbf0b9a59edbf1208e4a2840c09c7d4fbb6012cc.exe
-
Size
2.0MB
-
MD5
eddb08faf6a2faf503e3fadcc0179639
-
SHA1
e3654dd0665231e3c610b5f8d56c4fb60ef7fa3d
-
SHA256
72f4a85245337b0fcdb662a2cbf0b9a59edbf1208e4a2840c09c7d4fbb6012cc
-
SHA512
a9c0455ce5bbc68e13009c3c39b6c7f75d5ea57bc7652a4a8f297d286a25ba4b9d224ac713215f724c9b1b1fed9d485d5b4203c494baeb652b780b5196cb46b9
-
SSDEEP
49152:TrYU+Yy4J8jao9UVlWAOjhRzsiYHjo++xTN:TdxVJC9UqRzsu+8N
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
-
-
Target
72ff89c7cdaac70515ac184accbd4c9f.exe
-
Size
1.6MB
-
MD5
72ff89c7cdaac70515ac184accbd4c9f
-
SHA1
e6306a7c6d40ae9036ced594b938a12f8ab57b1c
-
SHA256
5db5b45d3fbb3a20e8fb589356e8c5ad9cfe79cbe2f9ba46a3d5c1d312f72504
-
SHA512
aacbc1a9ea04889d3d1552ccf9d4634eb0baaf57715dfc7686922058a485eedd868c0578cf8b438187cf8b3b2ebf3d32dcd963ef77ec1de278231ab19f584be4
-
SSDEEP
24576:6sm8JijftfWIqZpyh/X6bSmV2GKz1oncoiF9GFwUvpHk3tSfEybcswrJ4gOEGEk:6D8Jijt+xpS/ekYmLGdhEAf7bCcjE
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
-
-
Target
7307a761db7cdc6093352c9942350f8b7fa9836822750ab63efb80a3e58e6938.exe
-
Size
223KB
-
MD5
e86618c8518df150346cc07120f83b6d
-
SHA1
d37b644e11348c50f88d1d799330e1c5b60915c2
-
SHA256
7307a761db7cdc6093352c9942350f8b7fa9836822750ab63efb80a3e58e6938
-
SHA512
134dd15ec7f368269dcbac36878a5eea7c62afa38a5e90fb91440cd685b250a9e2c4f7cdaef57506060db6fdd082eb7b3527188a495afd5eccf71bfaf40e3150
-
SSDEEP
6144:y5KrTbFWewUhcX7elbKTua9bfF/H9d9n:y5KRWN3X3u+
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
-
-
Target
7309f9355589e2cc6fcc0b43174b8c28.exe
-
Size
565KB
-
MD5
7309f9355589e2cc6fcc0b43174b8c28
-
SHA1
a6078cd5f1315b13d098a55ca9d67c2474628056
-
SHA256
504fd67a1d270c15ef99af799be3905277ad14531858bb2ed0f67f4089185e44
-
SHA512
eb0501cced3bef09d1759baca40c97d9e551b01e73bf2cbde0ae802a7d89e7d73b22855c30eddb4ac6561f0b693a290a6044af6cb46fe6acb9520e1a9d2adf80
-
SSDEEP
12288:qmmO5pyJZghm45vQXy0kSHMg1pPDbFsEqID:qmj5pyIhm45v8y0TFhq0
Score10/10-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
730efb97bdfa1760333c3ab9323de9a1.exe
-
Size
2.1MB
-
MD5
730efb97bdfa1760333c3ab9323de9a1
-
SHA1
c5ebb5fbf59dd9d79d6e573fd493f72434372612
-
SHA256
4f4cde6b4437ff31686c3496b2f80e0402bf87ccdcbe1caca68d38f5034fb89d
-
SHA512
ce6dd9c0ec5c0c970750e97ba07ac79e9b09edad4e7ec1f00c01d0790d6bba07465227fcc3bcff124e7d3e7c0df35f7d5611a0090732d090e0bf671565358c3f
-
SSDEEP
49152:q/FBVWix5TC0/5ljAhscAWlMym/HXR1supwJ4Cf:
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
-
-
Target
732ab0ac86cc174dcf4d86a03d83e27a.exe
-
Size
281KB
-
MD5
732ab0ac86cc174dcf4d86a03d83e27a
-
SHA1
8f020cfa83b0e5887dc6ef8121adea54eebd36d2
-
SHA256
0584d41c371f1400ae92579fdfaac9f8603bde05ec05200d4ee5e53e3ec99664
-
SHA512
51a2adb0d9293a1cb6b7f153e5a21883fb7646020dea192796a36dbbc1e92575ca30efb7a5f71fd4235d9418a1649a878bee6d8f2090872a6998c88e75a02460
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fe:boSeGUA5YZazpXUmZhZ6m
-
Nanocore family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Suspicious use of SetThreadContext
-
-
-
Target
73522a2d4140ec446c401c39d07eec71.exe
-
Size
29KB
-
MD5
73522a2d4140ec446c401c39d07eec71
-
SHA1
7c2358aac3d7793ac5c524e8a85385d57e8c353b
-
SHA256
128f50594c4b548b4b0131a395d152ba7cc6edd8c5b2ee44162371956963b8dc
-
SHA512
c0ff298600074559e21208ee7a8ddb5c1b6bd71f8e8364cfdb9925baf48920b0687ca4dbc7f4e3e77dd5e71378d19241f1554899b56d8f54cdc0d8ec2fc43eec
-
SSDEEP
384:BmCftl7ndJoc8e9v55Do7mmmqDspHe4qGBsbh0w4wlAokw9OhgOL1vYRGOZzmyP+:PD7zoc86xi74q8HeoBKh0p29SgReyx0
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
7355fddf5edf9713b4450982937bca6e.exe
-
Size
762KB
-
MD5
7355fddf5edf9713b4450982937bca6e
-
SHA1
fd1fbc71728fd7adc310b7ee74fdde59577010f4
-
SHA256
4e844cff9da913e15f2d6346c97e9a6598cd512dde1e34d98b55f71e76e138a8
-
SHA512
73030b32969d3d87512b71a8e77ebf30ed29ff360d627b4770980da87a5ed664afa3d7855eb02e0ceffb45b9b1b24c7aba93db24b55b9a0b64360cc6f9bb9576
-
SSDEEP
12288:LiHyqAJB5a5P9Fie9OvbiaChmfwqQaXqoVYlZRFnx48KWc2SJCOaWGh4B9393Fm7:LMyDa5tEuzdq5GZRFx4ZWJSJiW5Bh2BM
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Modifies Windows Defender Real-time Protection settings
-
Modifies security service
-
Quasar family
-
Quasar payload
-
UAC bypass
-
Windows security bypass
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
736e4ed2299f5ec127d8f98265dc5a93.exe
-
Size
78KB
-
MD5
736e4ed2299f5ec127d8f98265dc5a93
-
SHA1
2874662d53902e4712fba6e70eb57b4989ad581a
-
SHA256
29f4e4c8d63c893a79a2136b7bd550e446d53f0f3295d686af51798bf1f985dd
-
SHA512
886db800a10586d6142f6d6cdbb64fb22109c65a42fe2c13b54cf96d3f5d777224deb1e9dfc94232ec25a4d63ceb741f2a973831231064fab2e16b46273f7068
-
SSDEEP
1536:gHFo6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtu9/p1X/:gHFo53Ln7N041Qqhgu9/j
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
-
-
Target
73bc8a93cdbba019a429afa403b8ab07.exe
-
Size
47KB
-
MD5
73bc8a93cdbba019a429afa403b8ab07
-
SHA1
a98f37cd190893cad2f6a436d36c9113166a46a9
-
SHA256
41744a3e6de2de39130b8a2f731392730e3f832444498bb59d9f66bdd8ee738e
-
SHA512
7fc13ba92ea2d34a17355a9ffcc51846b6e87a34f7214ec1678c85c748920cf7574c9cc4aa80f4ba081dc329fefa3a9acdf2e3ca95ebffd081906538be70e80e
-
SSDEEP
768:p9umxLiIL1CaS+DiMtelDSN+iV08YbygeOyBMRxpvEgK/JnZVc6KN:p9uAPWMtKDs4zb1juMRfnkJnZVclN
-
Asyncrat family
-
-
-
Target
73d6911ed247a840f2f372a605a99407.exe
-
Size
1.1MB
-
MD5
73d6911ed247a840f2f372a605a99407
-
SHA1
595953dd65ceb6ce48af99d0e4533ac711681733
-
SHA256
e1dacd883b37c7e481b4fc643b5628e061155f7c4f37874907ac2c8a5e66d7c0
-
SHA512
ba7b325ca5ff67273ebe485904d7981f8d70b3b2e9647c2f702bb0e6f3058faf35d4fab1351deaadf8fb126517595766d7039ee56b97c21fff36a43026696544
-
SSDEEP
12288:amc4TfAkdN7TPPl2Eh8Nv6L1FMCubuoGTeh46qTnnCPQeB89hNuD1hOp1i3l10gR:ah4TbLUEhZL/GspeYhkc9Soh2SfwJ
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Drops file in System32 directory
-
-
-
Target
73eb32431f602f42759a38c5eab47eff.exe
-
Size
220KB
-
MD5
73eb32431f602f42759a38c5eab47eff
-
SHA1
91a96c20d061045188cc0536ee698f58293dd314
-
SHA256
b81ac7df79d0575b92c6793db9ebab3e90ff09dabf6eef8c56ab3b6bd19fff9a
-
SHA512
f0be2833d56d671a6f51f1503ff2b70196c0a217c3913b23f2994b7f42a82fa3a5e45b525a575eceb5a260224781a756fcd6bb0f2b90ead7aa6082a6d1009dd5
-
SSDEEP
3072:YsXRmUIMitiMQose27vc+Eld+xZp2vPRL1tT06zJoxAWBcKpSP//dwRmh:ZR5IuMQoseGk7RZBGxAycKpSPX2q
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
5Windows Service
5Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
5Windows Service
5Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
8Disable or Modify System Firewall
1Disable or Modify Tools
6Indicator Removal
2File Deletion
2Modify Registry
12Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1