Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/05/2023, 04:21

General

  • Target

    3053cb488a47f0cfa652722c79486ff8.exe

  • Size

    2.3MB

  • MD5

    3053cb488a47f0cfa652722c79486ff8

  • SHA1

    59eeca2266169cab55c917755e5f0996b4866cf8

  • SHA256

    d4e0dbb934691a16f4c9fb7534e2c0f2940389e65e1799f6f231909edaf171a7

  • SHA512

    c346ac3d951e85371a237a0eef469331f756096a5d68f7b529cef9e48fa2ea2e8a4d6687f09fdad177c0b4eb4d70ca6fd3edeb13e38f9d91eecef5e92b730a4c

  • SSDEEP

    49152:AWZrpdaJJVoYNRFmujPP2TyqYOENC3tAaJWX/L2qU6A77DA7so8j8K:AWp8oYNquTkyPXw3yaJ0JUL7ah

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 24 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 24 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3053cb488a47f0cfa652722c79486ff8.exe
    "C:\Users\Admin\AppData\Local\Temp\3053cb488a47f0cfa652722c79486ff8.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4772
    • C:\Users\All Users\sihost.exe
      "C:\Users\All Users\sihost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:340
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\sihost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4252
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\sihost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1064
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\sihost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1460
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Windows\de-DE\backgroundTaskHost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2064
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\de-DE\backgroundTaskHost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2460
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Windows\de-DE\backgroundTaskHost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3904
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\odt\System.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3612
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\odt\System.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4172
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\odt\System.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3576
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\Public\csrss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2684
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Public\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3548
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Users\Public\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1664
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\csrss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4372
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3096
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2736
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\explorer.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:320
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\explorer.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:216
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\explorer.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2876
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\RuntimeBroker.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:404
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\RuntimeBroker.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4956
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\RuntimeBroker.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:5052
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\sihost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3828
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Users\All Users\sihost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4364
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\sihost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4796

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\csrss.exe

    Filesize

    2.3MB

    MD5

    3053cb488a47f0cfa652722c79486ff8

    SHA1

    59eeca2266169cab55c917755e5f0996b4866cf8

    SHA256

    d4e0dbb934691a16f4c9fb7534e2c0f2940389e65e1799f6f231909edaf171a7

    SHA512

    c346ac3d951e85371a237a0eef469331f756096a5d68f7b529cef9e48fa2ea2e8a4d6687f09fdad177c0b4eb4d70ca6fd3edeb13e38f9d91eecef5e92b730a4c

  • C:\ProgramData\sihost.exe

    Filesize

    2.3MB

    MD5

    3053cb488a47f0cfa652722c79486ff8

    SHA1

    59eeca2266169cab55c917755e5f0996b4866cf8

    SHA256

    d4e0dbb934691a16f4c9fb7534e2c0f2940389e65e1799f6f231909edaf171a7

    SHA512

    c346ac3d951e85371a237a0eef469331f756096a5d68f7b529cef9e48fa2ea2e8a4d6687f09fdad177c0b4eb4d70ca6fd3edeb13e38f9d91eecef5e92b730a4c

  • C:\Users\All Users\sihost.exe

    Filesize

    2.3MB

    MD5

    3053cb488a47f0cfa652722c79486ff8

    SHA1

    59eeca2266169cab55c917755e5f0996b4866cf8

    SHA256

    d4e0dbb934691a16f4c9fb7534e2c0f2940389e65e1799f6f231909edaf171a7

    SHA512

    c346ac3d951e85371a237a0eef469331f756096a5d68f7b529cef9e48fa2ea2e8a4d6687f09fdad177c0b4eb4d70ca6fd3edeb13e38f9d91eecef5e92b730a4c

  • memory/340-170-0x0000000001000000-0x00000000014F8000-memory.dmp

    Filesize

    5.0MB

  • memory/340-171-0x0000000001000000-0x00000000014F8000-memory.dmp

    Filesize

    5.0MB

  • memory/340-215-0x0000000005700000-0x0000000005710000-memory.dmp

    Filesize

    64KB

  • memory/340-176-0x0000000001000000-0x00000000014F8000-memory.dmp

    Filesize

    5.0MB

  • memory/340-174-0x0000000007FD0000-0x0000000008192000-memory.dmp

    Filesize

    1.8MB

  • memory/340-173-0x0000000005700000-0x0000000005710000-memory.dmp

    Filesize

    64KB

  • memory/340-172-0x0000000001000000-0x00000000014F8000-memory.dmp

    Filesize

    5.0MB

  • memory/4772-142-0x0000000007090000-0x00000000070F6000-memory.dmp

    Filesize

    408KB

  • memory/4772-169-0x0000000000820000-0x0000000000D18000-memory.dmp

    Filesize

    5.0MB

  • memory/4772-133-0x0000000000820000-0x0000000000D18000-memory.dmp

    Filesize

    5.0MB

  • memory/4772-134-0x0000000000820000-0x0000000000D18000-memory.dmp

    Filesize

    5.0MB

  • memory/4772-135-0x0000000006A20000-0x0000000006FC4000-memory.dmp

    Filesize

    5.6MB

  • memory/4772-136-0x0000000005FA0000-0x0000000005FB0000-memory.dmp

    Filesize

    64KB

  • memory/4772-137-0x0000000006670000-0x0000000006702000-memory.dmp

    Filesize

    584KB

  • memory/4772-139-0x0000000007500000-0x0000000007A2C000-memory.dmp

    Filesize

    5.2MB

  • memory/4772-138-0x0000000006620000-0x0000000006670000-memory.dmp

    Filesize

    320KB