Analysis

  • max time kernel
    44s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    24-03-2023 01:43

General

  • Target

    DCRawwwftBuild.exe

  • Size

    1.1MB

  • MD5

    fc1382653001e36943a5a487aa04083e

  • SHA1

    48e471cccc1894f6581d7a19daaf46ac9c219995

  • SHA256

    d2e73b6112b25f6d4aac7ab6fbebecddbe4042cbad85f3926dc298c871c017e2

  • SHA512

    d0d6740d5cb26876ee0f89d9bab8ee7dddaa18ae8899db236a48ab577f7d41b09a5418801fc1ee26bcf90af37116d5dc0a3254dc79e33871fe03192ab54774d8

  • SSDEEP

    24576:U2G/nvxW3Ww0tRCSZnPWLTNL6sHH6Jr3W2QGJqE+s:UbA30RCcGNT6JTW9c

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 11 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\DCRawwwftBuild.exe
    "C:\Users\Admin\AppData\Local\Temp\DCRawwwftBuild.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\bridgeMsPerfcrt\lHsGbUd.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:852
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\bridgeMsPerfcrt\eTvovo7nc.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1424
        • C:\bridgeMsPerfcrt\agentDhcp.exe
          "C:\bridgeMsPerfcrt\agentDhcp.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1312
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cWkBSqzw3R.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1180
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:2036
              • C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\dwm.exe
                "C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\dwm.exe"
                6⤵
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:816
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\spoolsv.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1624
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1524
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:896
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Templates\wininit.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1080
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Admin\Templates\wininit.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1800
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Templates\wininit.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:808
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\Idle.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:844
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1512
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1612
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office\Office14\1033\csrss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1968
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office14\1033\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1956
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files\Microsoft Office\Office14\1033\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1220
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\dwm.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:292
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1724
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1596
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\cmd.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:912
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\cmd.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1696
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\cmd.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:668

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\dwm.exe

      Filesize

      828KB

      MD5

      bfb3525f361dd6480d70a49dadfe4b87

      SHA1

      0c16b38c1cb4ebc776780ee8a63682404f89a736

      SHA256

      2c55a7859a58f35cd4c52fb1c9ad9fc93dc61c3242a5751399f6d4d911a3372c

      SHA512

      5200e7632112ccef4acc90b524d7c15c2d55c133dea6451eddc0eb381c18d72d6fe10ad17617eed6f2d8927d2657a7891d6ab555a96f131644af0a23fdc7e2d2

    • C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\dwm.exe

      Filesize

      828KB

      MD5

      bfb3525f361dd6480d70a49dadfe4b87

      SHA1

      0c16b38c1cb4ebc776780ee8a63682404f89a736

      SHA256

      2c55a7859a58f35cd4c52fb1c9ad9fc93dc61c3242a5751399f6d4d911a3372c

      SHA512

      5200e7632112ccef4acc90b524d7c15c2d55c133dea6451eddc0eb381c18d72d6fe10ad17617eed6f2d8927d2657a7891d6ab555a96f131644af0a23fdc7e2d2

    • C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\Idle.exe

      Filesize

      828KB

      MD5

      bfb3525f361dd6480d70a49dadfe4b87

      SHA1

      0c16b38c1cb4ebc776780ee8a63682404f89a736

      SHA256

      2c55a7859a58f35cd4c52fb1c9ad9fc93dc61c3242a5751399f6d4d911a3372c

      SHA512

      5200e7632112ccef4acc90b524d7c15c2d55c133dea6451eddc0eb381c18d72d6fe10ad17617eed6f2d8927d2657a7891d6ab555a96f131644af0a23fdc7e2d2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      e71c8443ae0bc2e282c73faead0a6dd3

      SHA1

      0c110c1b01e68edfacaeae64781a37b1995fa94b

      SHA256

      95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

      SHA512

      b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d93c242174aad81bfbf1148828a508c7

      SHA1

      856921e418134cb781b4d7144b186740be1afecd

      SHA256

      0a0c7fd6d02ba396cfffb937c036b5b8c76218cc8194a52886976c503038eafb

      SHA512

      db1debf29db52f03e74e594c3be04f75a46833689bec1811758cdddc8fed979b2841399450a6633207358b5d02cbad47891288301da8bcbb143afafa6bb462bf

    • C:\Users\Admin\AppData\Local\Temp\CabA660.tmp

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\TarA9A2.tmp

      Filesize

      161KB

      MD5

      be2bec6e8c5653136d3e72fe53c98aa3

      SHA1

      a8182d6db17c14671c3d5766c72e58d87c0810de

      SHA256

      1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

      SHA512

      0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

    • C:\Users\Admin\AppData\Local\Temp\cWkBSqzw3R.bat

      Filesize

      246B

      MD5

      cd0a32863e20bf4e992852fa17b6dd48

      SHA1

      1aefe30bb72800ba59783b40604e51e82d2ab577

      SHA256

      ed22aa1c76987e6f40f2a1b99c7d17057ba57e5584089472a0a72f9afb9dd282

      SHA512

      e5696fe1330a7733b128088e16a426da548a22e734154af3d8eca70d6f657940896b97421f5719a0e6c85499b3eb56dac5911e94d16c33ab787b4e8b3a35fcf2

    • C:\bridgeMsPerfcrt\agentDhcp.exe

      Filesize

      828KB

      MD5

      bfb3525f361dd6480d70a49dadfe4b87

      SHA1

      0c16b38c1cb4ebc776780ee8a63682404f89a736

      SHA256

      2c55a7859a58f35cd4c52fb1c9ad9fc93dc61c3242a5751399f6d4d911a3372c

      SHA512

      5200e7632112ccef4acc90b524d7c15c2d55c133dea6451eddc0eb381c18d72d6fe10ad17617eed6f2d8927d2657a7891d6ab555a96f131644af0a23fdc7e2d2

    • C:\bridgeMsPerfcrt\agentDhcp.exe

      Filesize

      828KB

      MD5

      bfb3525f361dd6480d70a49dadfe4b87

      SHA1

      0c16b38c1cb4ebc776780ee8a63682404f89a736

      SHA256

      2c55a7859a58f35cd4c52fb1c9ad9fc93dc61c3242a5751399f6d4d911a3372c

      SHA512

      5200e7632112ccef4acc90b524d7c15c2d55c133dea6451eddc0eb381c18d72d6fe10ad17617eed6f2d8927d2657a7891d6ab555a96f131644af0a23fdc7e2d2

    • C:\bridgeMsPerfcrt\eTvovo7nc.bat

      Filesize

      34B

      MD5

      f61f3afffe07a890977d360b99f061ca

      SHA1

      fbca8ef86b50065fc88e321262970b73241fa0ee

      SHA256

      4c90ec3fb0e42dbfb4185938ce2eae6827e1372353a074c15d07be49b0978399

      SHA512

      9d642fb439f9ba6d3163e708dfa2e7f5e1b03b52441abfb985c3811d5d63a5397f319ec5e764ee5ab39648ba4b82ca963b1d067a47eee9f5b421f790be1be06a

    • C:\bridgeMsPerfcrt\lHsGbUd.vbe

      Filesize

      201B

      MD5

      927e9bc687e4c3946aa0e2a9b15f78cf

      SHA1

      b72aff1ba6dfe509bcef4a8f6ef83ec89128ed01

      SHA256

      6c02a45cb224d627e67dfcb194cda3ed037a334b14c7b52c3d350c642ac79937

      SHA512

      2adf5d0d58719d8c653fdc35245ec4f00c93d8940a94ac34965b32cbce04fd5bd5fc21618e9cca2ba4474113166c6161408a5bc6e09b7c478c33a02f630869c7

    • \bridgeMsPerfcrt\agentDhcp.exe

      Filesize

      828KB

      MD5

      bfb3525f361dd6480d70a49dadfe4b87

      SHA1

      0c16b38c1cb4ebc776780ee8a63682404f89a736

      SHA256

      2c55a7859a58f35cd4c52fb1c9ad9fc93dc61c3242a5751399f6d4d911a3372c

      SHA512

      5200e7632112ccef4acc90b524d7c15c2d55c133dea6451eddc0eb381c18d72d6fe10ad17617eed6f2d8927d2657a7891d6ab555a96f131644af0a23fdc7e2d2

    • \bridgeMsPerfcrt\agentDhcp.exe

      Filesize

      828KB

      MD5

      bfb3525f361dd6480d70a49dadfe4b87

      SHA1

      0c16b38c1cb4ebc776780ee8a63682404f89a736

      SHA256

      2c55a7859a58f35cd4c52fb1c9ad9fc93dc61c3242a5751399f6d4d911a3372c

      SHA512

      5200e7632112ccef4acc90b524d7c15c2d55c133dea6451eddc0eb381c18d72d6fe10ad17617eed6f2d8927d2657a7891d6ab555a96f131644af0a23fdc7e2d2

    • memory/816-88-0x0000000000DC0000-0x0000000000E96000-memory.dmp

      Filesize

      856KB

    • memory/816-89-0x000000001B050000-0x000000001B0D0000-memory.dmp

      Filesize

      512KB

    • memory/816-90-0x000000001B050000-0x000000001B0D0000-memory.dmp

      Filesize

      512KB

    • memory/1312-72-0x000000001B150000-0x000000001B1D0000-memory.dmp

      Filesize

      512KB

    • memory/1312-67-0x0000000001260000-0x0000000001336000-memory.dmp

      Filesize

      856KB