Analysis

  • max time kernel
    61s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08-06-2023 09:02

General

  • Target

    231efb7ab5b36cda91e06456480228c1.exe

  • Size

    1.3MB

  • MD5

    231efb7ab5b36cda91e06456480228c1

  • SHA1

    11edb782a254ead91bef459fb4dac0ca393ffeaf

  • SHA256

    5d876dee883aabe22c89e9332d18d41580e7dc5c5030be843538b5a11c053a1d

  • SHA512

    c51446bf048412031b5ea5c09b55b8c1ba8d3319eaf84cda647c0048f919a9f408220200ae1d405acd54557af9626a91e03789573a556ccafea9b7bfbcec2017

  • SSDEEP

    24576:9urfikuV13mFFkwIuKOaZDIpw6P/KlBrJ/GB+8xNEJn:eiku13qF1jtpwG/KR/YxNEJ

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 9 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\231efb7ab5b36cda91e06456480228c1.exe
    "C:\Users\Admin\AppData\Local\Temp\231efb7ab5b36cda91e06456480228c1.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1084
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\231efb7ab5b36cda91e06456480228c1.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1940
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\lsm.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1944
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Reference Assemblies\Microsoft\Framework\lsm.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1956
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\taskhost.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1932
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\17OcEwNUD6.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1404
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1704
        • C:\MSOCache\All Users\taskhost.exe
          "C:\MSOCache\All Users\taskhost.exe"
          3⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1512
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Users\Default\lsm.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1016
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Users\Default\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:332
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsml" /sc MINUTE /mo 14 /tr "'C:\Users\Default\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1456
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\lsm.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1276
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:240
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsml" /sc MINUTE /mo 6 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1536
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\taskhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:944
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2036
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1012

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\All Users\taskhost.exe
      Filesize

      1.3MB

      MD5

      231efb7ab5b36cda91e06456480228c1

      SHA1

      11edb782a254ead91bef459fb4dac0ca393ffeaf

      SHA256

      5d876dee883aabe22c89e9332d18d41580e7dc5c5030be843538b5a11c053a1d

      SHA512

      c51446bf048412031b5ea5c09b55b8c1ba8d3319eaf84cda647c0048f919a9f408220200ae1d405acd54557af9626a91e03789573a556ccafea9b7bfbcec2017

    • C:\MSOCache\All Users\taskhost.exe
      Filesize

      1.3MB

      MD5

      231efb7ab5b36cda91e06456480228c1

      SHA1

      11edb782a254ead91bef459fb4dac0ca393ffeaf

      SHA256

      5d876dee883aabe22c89e9332d18d41580e7dc5c5030be843538b5a11c053a1d

      SHA512

      c51446bf048412031b5ea5c09b55b8c1ba8d3319eaf84cda647c0048f919a9f408220200ae1d405acd54557af9626a91e03789573a556ccafea9b7bfbcec2017

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ce1c896f095a610a8fa75364f073887c

      SHA1

      3c9bf3c050052c506e6cffdcd90c6d45aaa746b1

      SHA256

      ed88ba12f5521841931e53fc9ecdcfc4ab0e1c010db20630cebc171307c6bfbc

      SHA512

      8b2ab03557af5fba4236676a63b2e16ac9f7f83260bcc80dd30e041e7e7aa581995418ad667a4519cc5795292b2b70eaa54b959ace06324b1fa7d933bfe43dcb

    • C:\Users\Admin\AppData\Local\Temp\17OcEwNUD6.bat
      Filesize

      199B

      MD5

      4748d2d1ea0d3fca3ad457d8f0c97c27

      SHA1

      3908561b204e76395fd0d11f0a2f290bc4d6151d

      SHA256

      f7d08439a1219c66ea817df22b23c9a55e5f207d1fe93903ed17d995f6ab9042

      SHA512

      94b0fb8ee5e71e49a8fb71ebc2ac4aee3ec3e57820e4266f6df284b7c8f7f7d3f981671fb8daed48ef694ddbe8872b7701fee179d070b282fc478e44cfa2714f

    • C:\Users\Admin\AppData\Local\Temp\CabE7A4.tmp
      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\TarEAB7.tmp
      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      54c98749b6d3dfc1a752b1e0be1ab9cd

      SHA1

      34fc6720215a58ee3be350e60009590b2ab1c839

      SHA256

      ad843ff4d5447309e52cfbec9715800657488b91134efd56be025f7bbfb13a68

      SHA512

      ad1b9b31857acc6ac20b215433f06adee37bb2a79f7e5aaabdf16cd6770fd5fd466006e7ebb2a7d4e19097ba09d81985d9df9a36bb0a7663a55854f52dd5c03a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      54c98749b6d3dfc1a752b1e0be1ab9cd

      SHA1

      34fc6720215a58ee3be350e60009590b2ab1c839

      SHA256

      ad843ff4d5447309e52cfbec9715800657488b91134efd56be025f7bbfb13a68

      SHA512

      ad1b9b31857acc6ac20b215433f06adee37bb2a79f7e5aaabdf16cd6770fd5fd466006e7ebb2a7d4e19097ba09d81985d9df9a36bb0a7663a55854f52dd5c03a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5DRBYQF7478GG66152HK.temp
      Filesize

      7KB

      MD5

      54c98749b6d3dfc1a752b1e0be1ab9cd

      SHA1

      34fc6720215a58ee3be350e60009590b2ab1c839

      SHA256

      ad843ff4d5447309e52cfbec9715800657488b91134efd56be025f7bbfb13a68

      SHA512

      ad1b9b31857acc6ac20b215433f06adee37bb2a79f7e5aaabdf16cd6770fd5fd466006e7ebb2a7d4e19097ba09d81985d9df9a36bb0a7663a55854f52dd5c03a

    • memory/1084-59-0x0000000000490000-0x000000000049E000-memory.dmp
      Filesize

      56KB

    • memory/1084-54-0x0000000000E50000-0x0000000000FA4000-memory.dmp
      Filesize

      1.3MB

    • memory/1084-60-0x00000000004A0000-0x00000000004AC000-memory.dmp
      Filesize

      48KB

    • memory/1084-58-0x0000000000480000-0x000000000048E000-memory.dmp
      Filesize

      56KB

    • memory/1084-57-0x00000000001F0000-0x0000000000206000-memory.dmp
      Filesize

      88KB

    • memory/1084-56-0x00000000001D0000-0x00000000001EC000-memory.dmp
      Filesize

      112KB

    • memory/1084-55-0x000000001B080000-0x000000001B100000-memory.dmp
      Filesize

      512KB

    • memory/1512-105-0x0000000000210000-0x0000000000364000-memory.dmp
      Filesize

      1.3MB

    • memory/1512-199-0x000000001B080000-0x000000001B100000-memory.dmp
      Filesize

      512KB

    • memory/1512-180-0x000000001B080000-0x000000001B100000-memory.dmp
      Filesize

      512KB

    • memory/1512-107-0x000000001B080000-0x000000001B100000-memory.dmp
      Filesize

      512KB

    • memory/1512-108-0x000000001B080000-0x000000001B100000-memory.dmp
      Filesize

      512KB

    • memory/1932-81-0x000000001B2A0000-0x000000001B582000-memory.dmp
      Filesize

      2.9MB

    • memory/1932-95-0x00000000028CB000-0x0000000002902000-memory.dmp
      Filesize

      220KB

    • memory/1932-94-0x00000000028C4000-0x00000000028C7000-memory.dmp
      Filesize

      12KB

    • memory/1940-82-0x0000000001FD0000-0x0000000001FD8000-memory.dmp
      Filesize

      32KB

    • memory/1940-106-0x00000000025DB000-0x0000000002612000-memory.dmp
      Filesize

      220KB

    • memory/1940-97-0x00000000025D0000-0x0000000002650000-memory.dmp
      Filesize

      512KB

    • memory/1940-96-0x00000000025D0000-0x0000000002650000-memory.dmp
      Filesize

      512KB

    • memory/1944-102-0x00000000023CB000-0x0000000002402000-memory.dmp
      Filesize

      220KB

    • memory/1944-100-0x00000000023C0000-0x0000000002440000-memory.dmp
      Filesize

      512KB

    • memory/1956-101-0x000000000292B000-0x0000000002962000-memory.dmp
      Filesize

      220KB

    • memory/1956-93-0x0000000002920000-0x00000000029A0000-memory.dmp
      Filesize

      512KB

    • memory/1956-99-0x0000000002920000-0x00000000029A0000-memory.dmp
      Filesize

      512KB

    • memory/1956-98-0x0000000002920000-0x00000000029A0000-memory.dmp
      Filesize

      512KB