Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2023 19:40

General

  • Target

    948246c1a33831495f4166e1a4797ec5e20b8bbb4b723979baed6c8d9bbfb6fd.exe

  • Size

    365KB

  • MD5

    26aac416b405eb46f35b28dbab437670

  • SHA1

    dd2e2c39196d4a524f1b28c4f5bdf39105c97f81

  • SHA256

    948246c1a33831495f4166e1a4797ec5e20b8bbb4b723979baed6c8d9bbfb6fd

  • SHA512

    383b3bc7aad95d6f77f4671d74ae93d73072aea1a3e5d6e3da035ec3b5b60d35cd3558cd6da2f781f7854778cd5a148edbb065f750f30c92c303d235ceaa8411

  • SSDEEP

    6144:61g8VILtCndjKC4gHAAcVKzNJkjNo22iHQSgg9tkaHgHNHbNNHvJoHHNHgzF2N7v:6fndjHdcIiJ2iHQSgg9tkaHgHNHbNNHq

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\948246c1a33831495f4166e1a4797ec5e20b8bbb4b723979baed6c8d9bbfb6fd.exe
    "C:\Users\Admin\AppData\Local\Temp\948246c1a33831495f4166e1a4797ec5e20b8bbb4b723979baed6c8d9bbfb6fd.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\Vss\Writers\Application\taskhostw.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:4932
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "upfc" /sc ONLOGON /tr "'C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AppxMetadata\upfc.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:3376
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "wininit" /sc ONLOGON /tr "'C:\Documents and Settings\wininit.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:444
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\fr-FR\wininit.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:840
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Documents and Settings\fontdrvhost.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:5092
    • C:\Documents and Settings\fontdrvhost.exe
      "C:\Documents and Settings\fontdrvhost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1412

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings\fontdrvhost.exe
    Filesize

    365KB

    MD5

    26aac416b405eb46f35b28dbab437670

    SHA1

    dd2e2c39196d4a524f1b28c4f5bdf39105c97f81

    SHA256

    948246c1a33831495f4166e1a4797ec5e20b8bbb4b723979baed6c8d9bbfb6fd

    SHA512

    383b3bc7aad95d6f77f4671d74ae93d73072aea1a3e5d6e3da035ec3b5b60d35cd3558cd6da2f781f7854778cd5a148edbb065f750f30c92c303d235ceaa8411

  • C:\Users\fontdrvhost.exe
    Filesize

    365KB

    MD5

    26aac416b405eb46f35b28dbab437670

    SHA1

    dd2e2c39196d4a524f1b28c4f5bdf39105c97f81

    SHA256

    948246c1a33831495f4166e1a4797ec5e20b8bbb4b723979baed6c8d9bbfb6fd

    SHA512

    383b3bc7aad95d6f77f4671d74ae93d73072aea1a3e5d6e3da035ec3b5b60d35cd3558cd6da2f781f7854778cd5a148edbb065f750f30c92c303d235ceaa8411

  • memory/444-137-0x0000000000000000-mapping.dmp
  • memory/840-138-0x0000000000000000-mapping.dmp
  • memory/1412-140-0x0000000000000000-mapping.dmp
  • memory/1412-144-0x00007FFEB0DB0000-0x00007FFEB1871000-memory.dmp
    Filesize

    10.8MB

  • memory/1412-145-0x00007FFEB0DB0000-0x00007FFEB1871000-memory.dmp
    Filesize

    10.8MB

  • memory/1412-146-0x00007FFEB0DB0000-0x00007FFEB1871000-memory.dmp
    Filesize

    10.8MB

  • memory/3376-136-0x0000000000000000-mapping.dmp
  • memory/4300-132-0x000001E9E3B10000-0x000001E9E3B74000-memory.dmp
    Filesize

    400KB

  • memory/4300-134-0x00007FFEB0DB0000-0x00007FFEB1871000-memory.dmp
    Filesize

    10.8MB

  • memory/4300-133-0x00007FFEB0DB0000-0x00007FFEB1871000-memory.dmp
    Filesize

    10.8MB

  • memory/4300-143-0x00007FFEB0DB0000-0x00007FFEB1871000-memory.dmp
    Filesize

    10.8MB

  • memory/4932-135-0x0000000000000000-mapping.dmp
  • memory/5092-139-0x0000000000000000-mapping.dmp