Analysis

  • max time kernel
    168s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2023 21:26

General

  • Target

    d30d5939d105337a5c6f56e3a97fc0cf92cf782775d0f2bae317cf5c4562eb22.exe

  • Size

    365KB

  • MD5

    1a67c22d93c15bdc6333358e2cdd29e7

  • SHA1

    4b1824a168c97e13006fcc9b823f81d12cde9eca

  • SHA256

    d30d5939d105337a5c6f56e3a97fc0cf92cf782775d0f2bae317cf5c4562eb22

  • SHA512

    5bc1daf91b4a52b0f5e26d4c4f5ff4396e4fe090c6f383345487893bfb3a04ba424441a4f59d74ea0801e99f4a9b794d568caab967178dab1ce9738b9034143c

  • SSDEEP

    6144:Mhg8RILtEndj8KoOnBCuHzNII/JeM5k7IBe5oXWM6BPuqqDL:MpndjJIuII/J5k7IBe506BTqn

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d30d5939d105337a5c6f56e3a97fc0cf92cf782775d0f2bae317cf5c4562eb22.exe
    "C:\Users\Admin\AppData\Local\Temp\d30d5939d105337a5c6f56e3a97fc0cf92cf782775d0f2bae317cf5c4562eb22.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\odt\fontdrvhost.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1704
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Default User\lsass.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:3200
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default\Documents\My Videos\dllhost.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:5080
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "Idle" /sc ONLOGON /tr "'C:\PerfLogs\Idle.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:4656
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1368
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1900
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "d30d5939d105337a5c6f56e3a97fc0cf92cf782775d0f2bae317cf5c4562eb22" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\d30d5939d105337a5c6f56e3a97fc0cf92cf782775d0f2bae317cf5c4562eb22.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:3620
    • C:\Program Files\Windows Mail\d30d5939d105337a5c6f56e3a97fc0cf92cf782775d0f2bae317cf5c4562eb22.exe
      "C:\Program Files\Windows Mail\d30d5939d105337a5c6f56e3a97fc0cf92cf782775d0f2bae317cf5c4562eb22.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3092

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Mail\d30d5939d105337a5c6f56e3a97fc0cf92cf782775d0f2bae317cf5c4562eb22.exe
    Filesize

    365KB

    MD5

    1a67c22d93c15bdc6333358e2cdd29e7

    SHA1

    4b1824a168c97e13006fcc9b823f81d12cde9eca

    SHA256

    d30d5939d105337a5c6f56e3a97fc0cf92cf782775d0f2bae317cf5c4562eb22

    SHA512

    5bc1daf91b4a52b0f5e26d4c4f5ff4396e4fe090c6f383345487893bfb3a04ba424441a4f59d74ea0801e99f4a9b794d568caab967178dab1ce9738b9034143c

  • C:\Program Files\Windows Mail\d30d5939d105337a5c6f56e3a97fc0cf92cf782775d0f2bae317cf5c4562eb22.exe
    Filesize

    365KB

    MD5

    1a67c22d93c15bdc6333358e2cdd29e7

    SHA1

    4b1824a168c97e13006fcc9b823f81d12cde9eca

    SHA256

    d30d5939d105337a5c6f56e3a97fc0cf92cf782775d0f2bae317cf5c4562eb22

    SHA512

    5bc1daf91b4a52b0f5e26d4c4f5ff4396e4fe090c6f383345487893bfb3a04ba424441a4f59d74ea0801e99f4a9b794d568caab967178dab1ce9738b9034143c

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\d30d5939d105337a5c6f56e3a97fc0cf92cf782775d0f2bae317cf5c4562eb22.exe.log
    Filesize

    1KB

    MD5

    e8d8201859f0733371b04a69e90297ae

    SHA1

    8222cd86cf6633bdab806efb6cd8f336e2d0187b

    SHA256

    7f70c61beb86a5573a1c9f37136d60aa88ab65f11bd94e5303c4e2e8d11f8f9f

    SHA512

    63ba5c2778f02f62a2570d35ec6eb002c94093b94098315ac991b3c70a9d14ba8f3904067cf737df32a3f2e1924b29d7f722613024c2fdb11cf63d46b1bdb627

  • memory/1368-139-0x0000000000000000-mapping.dmp
  • memory/1704-135-0x0000000000000000-mapping.dmp
  • memory/1900-140-0x0000000000000000-mapping.dmp
  • memory/2424-132-0x0000022B2F0C0000-0x0000022B2F124000-memory.dmp
    Filesize

    400KB

  • memory/2424-134-0x00007FFB7FA60000-0x00007FFB80521000-memory.dmp
    Filesize

    10.8MB

  • memory/2424-133-0x00007FFB7FA60000-0x00007FFB80521000-memory.dmp
    Filesize

    10.8MB

  • memory/2424-146-0x00007FFB7FA60000-0x00007FFB80521000-memory.dmp
    Filesize

    10.8MB

  • memory/3092-142-0x0000000000000000-mapping.dmp
  • memory/3092-147-0x00007FFB7FA60000-0x00007FFB80521000-memory.dmp
    Filesize

    10.8MB

  • memory/3092-148-0x00007FFB7FA60000-0x00007FFB80521000-memory.dmp
    Filesize

    10.8MB

  • memory/3092-149-0x00007FFB7FA60000-0x00007FFB80521000-memory.dmp
    Filesize

    10.8MB

  • memory/3200-136-0x0000000000000000-mapping.dmp
  • memory/3620-141-0x0000000000000000-mapping.dmp
  • memory/4656-138-0x0000000000000000-mapping.dmp
  • memory/5080-137-0x0000000000000000-mapping.dmp