Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1090ed1454b8...38.exe
windows7-x64
1090ed1454b8...38.exe
windows10-2004-x64
1091570920da...cf.exe
windows7-x64
1091570920da...cf.exe
windows10-2004-x64
7915c452bf2...b6.exe
windows7-x64
10915c452bf2...b6.exe
windows10-2004-x64
10916cd92d3a...38.exe
windows7-x64
10916cd92d3a...38.exe
windows10-2004-x64
10916fbe67a7...e3.exe
windows7-x64
10916fbe67a7...e3.exe
windows10-2004-x64
1091cce1a9f4...6a.exe
windows7-x64
1091cce1a9f4...6a.exe
windows10-2004-x64
1091d2e3f758...f6.exe
windows7-x64
1091d2e3f758...f6.exe
windows10-2004-x64
1091d7fa8d89...52.exe
windows7-x64
1091d7fa8d89...52.exe
windows10-2004-x64
1091e6d47bd8...cc.exe
windows7-x64
791e6d47bd8...cc.exe
windows10-2004-x64
792105c7a3b...24.exe
windows7-x64
792105c7a3b...24.exe
windows10-2004-x64
7921421b7f5...09.exe
windows7-x64
10921421b7f5...09.exe
windows10-2004-x64
109221b9eea3...3c.exe
windows7-x64
19221b9eea3...3c.exe
windows10-2004-x64
1092324d5776...05.exe
windows7-x64
192324d5776...05.exe
windows10-2004-x64
1927cd0bd1a...b8.exe
windows7-x64
3927cd0bd1a...b8.exe
windows10-2004-x64
392efd55895...78.exe
windows7-x64
1092efd55895...78.exe
windows10-2004-x64
10932a9096cd...eb.exe
windows7-x64
10932a9096cd...eb.exe
windows10-2004-x64
10General
-
Target
archive_36.zip
-
Size
43.5MB
-
Sample
250322-gzcv2ay1a1
-
MD5
052f3f0f8dc33f830c33c669f501eb89
-
SHA1
4798b5d67f11066ae072b4697838ca7fa5f10c6e
-
SHA256
5307ce2390d7c4bfba56c3f519dfcf29d7a5e1752150847c43b6d94d5a9e0ffb
-
SHA512
ff44a445bcc47eecf7605b71f004e1ccf27c5c241fbc5cdec0de0f9dba8844f212fe7819ee4ba2642df392e0ef9d449661171480ef58bcfb7e28100519e61161
-
SSDEEP
786432:NayQ37eoEMsjaOAU8EfZlg//yxNrPal07//yxNKyfHd+54J2U/i:HQrEtjoU8DaHVrazK
Behavioral task
behavioral1
Sample
90ed1454b881cba4ecd9b651325d4638.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
90ed1454b881cba4ecd9b651325d4638.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
91570920daa6ee3c5d03da7664cb620ac5be5038ac64a295811ed8349b5d3dcf.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
91570920daa6ee3c5d03da7664cb620ac5be5038ac64a295811ed8349b5d3dcf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
915c452bf258459048ef8813fe2586a7b3c85ae7438fcd9bfa6da3a4017a08b6.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
915c452bf258459048ef8813fe2586a7b3c85ae7438fcd9bfa6da3a4017a08b6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
916cd92d3ac28dded1335ac06764e138.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
916cd92d3ac28dded1335ac06764e138.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
916fbe67a7968d2b65d54ae3ce72f3e3.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
916fbe67a7968d2b65d54ae3ce72f3e3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
91cce1a9f4562b0cd73d60203cebb76a.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
91cce1a9f4562b0cd73d60203cebb76a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
91d2e3f758fbb2c6c8e7b069bd3ac7a4d68e4f9dea0e71ff60bdbcd2ac9dd4f6.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
91d2e3f758fbb2c6c8e7b069bd3ac7a4d68e4f9dea0e71ff60bdbcd2ac9dd4f6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
91d7fa8d891f603b35c77da7fcc4c552.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
91d7fa8d891f603b35c77da7fcc4c552.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
91e6d47bd804e58a4e160993dfdfc3cc.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
91e6d47bd804e58a4e160993dfdfc3cc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
92105c7a3b72655063939b49b38e6567d6703ed95f694cab2247bd9832706524.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
92105c7a3b72655063939b49b38e6567d6703ed95f694cab2247bd9832706524.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
921421b7f5be88eb661517835c090cd8a2fdcdfc69154d129c70ffa36da54809.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
921421b7f5be88eb661517835c090cd8a2fdcdfc69154d129c70ffa36da54809.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
9221b9eea367a2434dacd850f7b30b3c.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
9221b9eea367a2434dacd850f7b30b3c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
92324d5776518f262a2ce8bfd8c6856500a9c454b9a8b688810f604111532e05.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
92324d5776518f262a2ce8bfd8c6856500a9c454b9a8b688810f604111532e05.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
927cd0bd1a26a2158a18e48e682ba3b8.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
927cd0bd1a26a2158a18e48e682ba3b8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
92efd55895cd60b5057f3fb06ad84c78.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
92efd55895cd60b5057f3fb06ad84c78.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
932a9096cd16630970f2bdc5e6cb9aeb.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
932a9096cd16630970f2bdc5e6cb9aeb.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
xworm
5.0
design-shipped.gl.at.ply.gg:2938
v6oCqftosMfufC9R
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4444
wexjwwmjkm
-
delay
1
-
install
true
-
install_file
g.exe
-
install_folder
%AppData%
Extracted
xworm
3.0
Cr8HKuApCXnXgH6p
-
Install_directory
%Public%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/jV6dpDfD
Extracted
njrat
0.7d
HacKed
192.168.1.3:1177
hakim32.ddns.net:2000
127.0.0.1:7777
d2dc16a9135398a3915a035274a224da
-
reg_key
d2dc16a9135398a3915a035274a224da
-
splitter
|'|'|
Extracted
xworm
127.0.0.1:2980
consider-sensors.gl.at.ply.gg:2980
-
Install_directory
%Userprofile%
-
install_file
svhost.exe
Extracted
limerat
-
aes_key
1234
-
antivm
true
-
c2_url
https://pastebin.com/raw/euvvTAtq
-
delay
6
-
download_payload
false
-
install
true
-
install_name
csrss.exe
-
main_folder
Temp
-
pin_spread
true
-
sub_folder
\
-
usb_spread
true
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Boy12345#
Targets
-
-
Target
90ed1454b881cba4ecd9b651325d4638.exe
-
Size
78KB
-
MD5
90ed1454b881cba4ecd9b651325d4638
-
SHA1
26bbba7eac5362ddc6298af80061c885f1c9b2e7
-
SHA256
62ac8026e108b28ce691b285d53374e0434ae08dea0fd8837f239c6858b40be0
-
SHA512
bad4b9e2b79f8894c5ffdf943d2bbee79e42b25bcb42515bd50c7fd46d7de8c129571f285a5c0823399b85d1edf99966e775aad82c71c20be7406198823a845b
-
SSDEEP
1536:i5jS6dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtN6e9/Hp13l:i5jS1n7N041Qqhgl9/H5
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
-
-
Target
91570920daa6ee3c5d03da7664cb620ac5be5038ac64a295811ed8349b5d3dcf.exe
-
Size
579KB
-
MD5
38f3e0dd8421dbfd12de577c02ae99f3
-
SHA1
5b35e3629e60e952e9ec4910a9ced8bf24d3f06e
-
SHA256
91570920daa6ee3c5d03da7664cb620ac5be5038ac64a295811ed8349b5d3dcf
-
SHA512
efc2829b526f19600a3153297ef204b2820ba3117391a8b33760f39e180c5782b94c6b2dfbb16a9ca0416cb9b91302176f0f0c6f5f184be9584308f62c54dfd8
-
SSDEEP
12288:YbD5arFJwK6hMJ6ZzHFZfc28beMGTfZuqb7M:rBJwdhMJ6ZzHrfcsMGTfZ5PM
Score10/10-
Imminent family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
915c452bf258459048ef8813fe2586a7b3c85ae7438fcd9bfa6da3a4017a08b6.exe
-
Size
2.0MB
-
MD5
36d39f96697aecd3fc5a465d4db663b8
-
SHA1
2a2201725368c253784a4d05f6e676ac5c10aa9e
-
SHA256
915c452bf258459048ef8813fe2586a7b3c85ae7438fcd9bfa6da3a4017a08b6
-
SHA512
75b6de4d9d2461821f2e313572f28163254ce9eb6456d5c4cac91efc7ca96ba60087bbcd69dfe8ba382f4c2fd3d25a567309a4881890e781bd9867dc6006b309
-
SSDEEP
49152:jrYU+Yy4J8jao9UVlWAOjhRzsiYHjo++xTN:jdxVJC9UqRzsu+8N
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
-
-
Target
916cd92d3ac28dded1335ac06764e138.exe
-
Size
39KB
-
MD5
916cd92d3ac28dded1335ac06764e138
-
SHA1
723a0815fe64380ccb2d5b3cc8dd4715cd0167cd
-
SHA256
328d960f3c75b7870f97ade069315809dd1649966cce248d85d64f191147da96
-
SHA512
349bee4b9192224122943633908dab1478ef8014202155b1be53115c291b480d3021af69f16623a8683b09bb3b680548b4ee751f90e90330b2baf8f9acd53195
-
SSDEEP
768:3F0D8dYqSKMY69IUGBhOq2MGoi4QX6U0XkdIyFZ89slrXJ6KOhhbu2:3Fw8dYqkY69IU4h4b8Q6U0XUFq9s5Z6D
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
916fbe67a7968d2b65d54ae3ce72f3e3.exe
-
Size
78KB
-
MD5
916fbe67a7968d2b65d54ae3ce72f3e3
-
SHA1
c27a2635f22db2401953554e9b958499c850ab23
-
SHA256
720b0f321e77a1ab8e5bec4f33644e9cdd97f571a3bc2468b327ee85d4bca09b
-
SHA512
a1db5956ecaf3ea4550e890a604753d04587761d09de54d3682cc5f79433dfb29d49f499d85904c7c14a20650d7443385ee8d7c2ddfbc0ffeab0936a34247444
-
SSDEEP
1536:+Ry5jEdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtN6HM9/O1Gl:+Ry5jzn7N041QqhgUM9/9
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
-
-
Target
91cce1a9f4562b0cd73d60203cebb76a.exe
-
Size
74KB
-
MD5
91cce1a9f4562b0cd73d60203cebb76a
-
SHA1
7c292b693357b1e6d33754b2ffb2130d9dbc7941
-
SHA256
b529dd5db79c9860acbf6e87056e8e8f9fbc298b66e2b4cb8d4e495d9c61178a
-
SHA512
72bd1d4dd8f5512110afab35782915b9b99fcbd80c254fe5034fc724001a12e29e88313d9eb8cdc458931676123119f886d3afbcfc401027e6af21892639768b
-
SSDEEP
1536:aUNccxRFxCSjPMVGDvUWMI/H1bX/tQsCYV1QzcaLVclN:aUOcxR39jPMVGDvzH1bXv1QLBY
-
Asyncrat family
-
-
-
Target
91d2e3f758fbb2c6c8e7b069bd3ac7a4d68e4f9dea0e71ff60bdbcd2ac9dd4f6.exe
-
Size
1.9MB
-
MD5
98666af3ef6ab2bcc4a5b3153a2e8d78
-
SHA1
b936c266aa4b4b85c113321fead31164955b8fa9
-
SHA256
91d2e3f758fbb2c6c8e7b069bd3ac7a4d68e4f9dea0e71ff60bdbcd2ac9dd4f6
-
SHA512
29ac1f9ad8331924e8fc7cb964b5e417d957b7597347103196739b520dd7523c2f5836830cb98976ccd1af298809bf1a5529c46f879f4dd563a91d215d67d238
-
SSDEEP
24576:kz4T3bMX0/0ZqSEaa3OVFu8VQTo8Ia29MSVyAXmFPf87ptY60/YYhdbh7JRj:kOMX0/08SVYTcxMXPxthD
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
-
-
Target
91d7fa8d891f603b35c77da7fcc4c552.exe
-
Size
1.1MB
-
MD5
91d7fa8d891f603b35c77da7fcc4c552
-
SHA1
1b241b597c2d0b386e42f25e1e22372265ff06c6
-
SHA256
2ff54b9f6860a5d362ef776360ed7a7f3c4da0f1dfce7493caa631e50c87722c
-
SHA512
27cb44233fed4fd6aadd8f1100501ced417614a80a3e74bec5e3ff6d9c73bb7ed85b1885dc129a4f633738e489a85aac980b7238abef0ea10bdcb0df59d0a735
-
SSDEEP
12288:Z49I/nL8TnKZPVHR3E/bS2vkRNJLXseJQdErvNKj6SKm+eAIhu181d6rsPH:ZngTKZ5RU/xG7zsEyEve6SZ+dIe8usv
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Drops file in System32 directory
-
-
-
Target
91e6d47bd804e58a4e160993dfdfc3cc.exe
-
Size
7.9MB
-
MD5
91e6d47bd804e58a4e160993dfdfc3cc
-
SHA1
c273d38db777c882addc54c595e392b587aaa980
-
SHA256
7480338642edf06769bc62a28e084eb5cd9487868f95543337ebe8a9c32c7093
-
SHA512
ae0663df09766e33194f844d101f072ecf8af8af4081897256dea24bbce1b3ff38473dbf80d23e7eaf74930f0d42a6b45a80930425cbd43e3e8daade219a2a62
-
SSDEEP
196608:G9sGLbd7rEWWn87E3QeotSqrG8YqcIXcZZB2:GmqbhrEbn87eZsFmq+6
Score7/10-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
92105c7a3b72655063939b49b38e6567d6703ed95f694cab2247bd9832706524.exe
-
Size
580KB
-
MD5
14a1d1d1f278cf5a9328b85042a7b53e
-
SHA1
02f07febcec2e624af7fd716163cc2575390487b
-
SHA256
92105c7a3b72655063939b49b38e6567d6703ed95f694cab2247bd9832706524
-
SHA512
1dbaa9036168f7438a146323b4e481eb52d922de35e61c1c1366cdd6ba39a67e5abd0fc1a7c6161e77c559ba3b6f5c6ea8656e51c8b2812e20f49bb203a17e33
-
SSDEEP
12288:YbD5arFJwK6hMJ6ZzHFZfc28beMGTfZuqb7Aj:rBJwdhMJ6ZzHrfcsMGTfZ5PAj
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
921421b7f5be88eb661517835c090cd8a2fdcdfc69154d129c70ffa36da54809.exe
-
Size
760KB
-
MD5
053986350cb339771876565d97721fbc
-
SHA1
cb7f1385290a6d61cf998aa54e04ebec91d6632f
-
SHA256
921421b7f5be88eb661517835c090cd8a2fdcdfc69154d129c70ffa36da54809
-
SHA512
b9cd9a3b32f6484fdfb488625fc5c16ce44df1addccda372cfd91eaa3e6f3be920866df8572985ce14c8e4e5768bdb7467a1b206c3c22379b82c109e32622c9f
-
SSDEEP
6144:3tT/Yq3v9Auky+4dusAIFB++velibxPyp/64wjOjn6cB3rcnKHe7:R6u7+487IFjvelQypyfy7cnKHe7
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
9221b9eea367a2434dacd850f7b30b3c.exe
-
Size
44KB
-
MD5
9221b9eea367a2434dacd850f7b30b3c
-
SHA1
27e3744c79b246b4fe2cf9c360bc47673c069603
-
SHA256
753d2498922e1be3c44270f548307720c6b645a74a8c40a801ce789493cd8684
-
SHA512
628295449f91fbd4eb478336f16eb5d999899ef1709b67d71873c8d95f35e2dfa088d04050786e80a7d65c4d644f91986deecaa516ff43d5b7e067073c196974
-
SSDEEP
768:dX1g7W5yeUxFjFUCRvTUQBj0FbC1+wA0NChqaw5:dXKWo9xFpUIwFbq5A0Q3w5
-
Limerat family
-
-
-
Target
92324d5776518f262a2ce8bfd8c6856500a9c454b9a8b688810f604111532e05.exe
-
Size
349KB
-
MD5
85757ffee213bc22964e3e7892e3bb66
-
SHA1
72e5d7570a5a3490f7d04a0f350bdbedc20ab66e
-
SHA256
92324d5776518f262a2ce8bfd8c6856500a9c454b9a8b688810f604111532e05
-
SHA512
0dc3ed25fb61352d5f66611b410ff56ebac5172233419ab2f16c0052713e0ccc61fcf877f77f2db9078ad0e888dee559dcef55cc42361e0056e6ed48c068e6c3
-
SSDEEP
6144:UOa9ozD9wI5fEae6VlWT8b9cMwaDeiXpXbqog4uV:baazZw8bPVle8W1iXp6V
Score1/10 -
-
-
Target
927cd0bd1a26a2158a18e48e682ba3b8.exe
-
Size
3.8MB
-
MD5
927cd0bd1a26a2158a18e48e682ba3b8
-
SHA1
72be67b2403ae98b1ac7e497440bef17adcae955
-
SHA256
e2ec608c43888cca3cf32dce6e0d04790216b6c3f728cee20f4dff84d6ea5752
-
SHA512
647d81651cd008929b4a6e5ce01929d813979625b21c84fe8ddbbb43dd3c1777cfc2c0c9a0bf658d1a2236b7de948fd5e60bfafd49305483097557f948291589
-
SSDEEP
49152:8X+FX+FX+FX+FX+FX+FX+FX+FX+FX+FX+FX+FX+FX+FX+FX+FX+FX+FX+FX+FX+:866666666666666666666
Score3/10 -
-
-
Target
92efd55895cd60b5057f3fb06ad84c78.exe
-
Size
1.6MB
-
MD5
92efd55895cd60b5057f3fb06ad84c78
-
SHA1
b3217c713b801276d98065e1eca81868545ebd02
-
SHA256
fd4af6cd1bb01129d61f2bb85c6f0e5dcb3c9cac02229988589ff93666be273c
-
SHA512
5cf3918370d98a5492496f82e69bef529fb426879e3293808ead5bb2f97e0bdcd30d288b25438a8b2009f58fd8eee522d0f1bb46ce359518a09a50a47794ae5c
-
SSDEEP
24576:6sm8JijftfWIqZpyh/X6bSmV2GKz1oncoiF9GFwUvpHk3tSfEybcswrJ4gOEGEk:6D8Jijt+xpS/ekYmLGdhEAf7bCcjE
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
-
-
Target
932a9096cd16630970f2bdc5e6cb9aeb.exe
-
Size
5.9MB
-
MD5
932a9096cd16630970f2bdc5e6cb9aeb
-
SHA1
52d4a032ac5cbdbb8bed5b401283c1b49201ca92
-
SHA256
79edf19412f95a9de108ec3ccdbaa450eab559c421768ff53a184da9563fc190
-
SHA512
5fd9f0de72eb989d27c3a46a6ff1e79a61576bf24089437d73e0c2eead05f3a14a326966d9176a993f2b7289bbfe70206ea001742517e24e23e108577694aaeb
-
SSDEEP
98304:xyeUxPQ0JMLyWIvqrhH05I8TderKjHDFUh9HkEXJfw4y:xyeU11Rvqmu8TWKnF6N/1wX
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1