Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    12/06/2023, 15:18

General

  • Target

    CHEAT and Bypass Matrix.exe

  • Size

    2.8MB

  • MD5

    642032685b8048204bf59668a7ed48c9

  • SHA1

    910555e0aa8b52cc5210f6523bde469f0f3e90fc

  • SHA256

    5ad5e035ba717e1db0bf6b1dde36d4da4a25d6156c3f51ca8c44ed075b57c043

  • SHA512

    91cc4c1c41dab2442b9b73b4e3196c780738aca8d2a186c4d6c3e7b63c7d9bfafce56962ffb395d070c1b7ec1e3b709bcb59c14fb9f513d5106310f6bd77b20c

  • SSDEEP

    49152:UbA30J2bjYDwitkxyOO1dHyWOdewRrirxMjvQI7OAax3Bd:UbNgjMJ2dyrybQI7Qzd

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 12 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\CHEAT and Bypass Matrix.exe
    "C:\Users\Admin\AppData\Local\Temp\CHEAT and Bypass Matrix.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\Q2YeCqE8qxd61K1ktFeXh5Nj.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\L2kmnRelizDcO70ipFvI.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1000
        • C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe
          "C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:512
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\b3D0ZldFac.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1468
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:1988
              • C:\Program Files\VideoLAN\VLC\skins\WMIADAP.exe
                "C:\Program Files\VideoLAN\VLC\skins\WMIADAP.exe"
                6⤵
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1472
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\file.vbs"
        2⤵
          PID:1752
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\cmd.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1036
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\cmd.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1496
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\cmd.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1948
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Windows\inf\conhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:668
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\inf\conhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1776
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Windows\inf\conhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:836
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Windows\PCHEALTH\ERRORREP\QSIGNOFF\Idle.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1240
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Windows\PCHEALTH\ERRORREP\QSIGNOFF\Idle.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1500
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Windows\PCHEALTH\ERRORREP\QSIGNOFF\Idle.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1824
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\taskhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1764
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\taskhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:840
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 5 /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\taskhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1968
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 11 /tr "'C:\Program Files\VideoLAN\VLC\skins\WMIADAP.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1700
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\skins\WMIADAP.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1616
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 6 /tr "'C:\Program Files\VideoLAN\VLC\skins\WMIADAP.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1612
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\csrss.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:756
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1960
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:676

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\VideoLAN\VLC\skins\WMIADAP.exe

        Filesize

        2.5MB

        MD5

        75136c00a06c6ee8c30e8a969fac27a9

        SHA1

        d4d02785c465a544573f6d113849d48f2ad35fed

        SHA256

        28c79c3f0bd6ee03025e4e4f61a2d25a00bebc0b1d3776bfabc824fc49013fcf

        SHA512

        187385d74f340932ba2b46970846e72f0da058a29f49a50879edde3aef17dc910ca49fb0ae24cc2d49745cd1f21c4450aa4f3d258b8a129918a51b217506af2d

      • C:\Program Files\VideoLAN\VLC\skins\WMIADAP.exe

        Filesize

        2.5MB

        MD5

        75136c00a06c6ee8c30e8a969fac27a9

        SHA1

        d4d02785c465a544573f6d113849d48f2ad35fed

        SHA256

        28c79c3f0bd6ee03025e4e4f61a2d25a00bebc0b1d3776bfabc824fc49013fcf

        SHA512

        187385d74f340932ba2b46970846e72f0da058a29f49a50879edde3aef17dc910ca49fb0ae24cc2d49745cd1f21c4450aa4f3d258b8a129918a51b217506af2d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        62KB

        MD5

        3ac860860707baaf32469fa7cc7c0192

        SHA1

        c33c2acdaba0e6fa41fd2f00f186804722477639

        SHA256

        d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

        SHA512

        d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        304B

        MD5

        8f9841e4ea896de79ef81e1e84ad38a2

        SHA1

        e84fabf6ec34b8416d83cdbf409e7ef52f41f51c

        SHA256

        6277e433f45f5aa4fc394629ef9419891188d68d1a2a2c60579778b64c9ee26f

        SHA512

        61bdfe322e847d4d1ae0c1c6469d0968bf46b5a4e1935b7d673e7ff9608e1eb865c4eb44baa4017ef02081efce3a5a1aa0f2f933c8c50c728d3f120f4cc56692

      • C:\Users\Admin\AppData\Local\Temp\CabD6E2.tmp

        Filesize

        61KB

        MD5

        fc4666cbca561e864e7fdf883a9e6661

        SHA1

        2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

        SHA256

        10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

        SHA512

        c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

      • C:\Users\Admin\AppData\Local\Temp\TarD7F2.tmp

        Filesize

        164KB

        MD5

        4ff65ad929cd9a367680e0e5b1c08166

        SHA1

        c0af0d4396bd1f15c45f39d3b849ba444233b3a2

        SHA256

        c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

        SHA512

        f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

      • C:\Users\Admin\AppData\Local\Temp\b3D0ZldFac.bat

        Filesize

        212B

        MD5

        37a315ea1eca4de3cad97d971e92867e

        SHA1

        dc6b435b02b02389188fbdc378b0e1dd8085695a

        SHA256

        099afa2659b7b6e67fd116403e8cf246c13b837299bf47e18d72c597e95b824d

        SHA512

        348c3ec2bf7701d4f0a37f729951b505acf83eae93cc45db5618cb3bd45defa116d756c9a9811d238cf7a7b65d130311452c394f0407fa9b51c6c397824fe237

      • C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\L2kmnRelizDcO70ipFvI.bat

        Filesize

        60B

        MD5

        b6624ab28db92e8454896ba35912ab2f

        SHA1

        feeea3355fb8843473929109d7dd3e5086760e7e

        SHA256

        d67eb0c7b4677ac9994f1fdd1bac8f93f36118edade88f1621cdc5cf4cbc87b7

        SHA512

        49bdd3c3dd062b0c883d9df6cf3a91ad760fd2af7c27ddf17fd85b4deac749a61c98153ce17571c0edaad006a6ac3722a942cc11a34179360a9f0002776aa743

      • C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\Q2YeCqE8qxd61K1ktFeXh5Nj.vbe

        Filesize

        233B

        MD5

        9719764b189e753dd43947095a6f02b7

        SHA1

        33e872f83f5370d00a3a462df8c273d23c11ccb0

        SHA256

        0dff1318f84f87d552e7e01a08de8da13ef87f048aa58ef6d5ce5d8fd3bc52d9

        SHA512

        7fd88d9f96bc9c26ef007c872f4221b2b2a0a04db505fbaaa89148be8720d65fc6edd7a5ffc411db58bb218f098158889874a1e19f0ba9b7511107220c512e03

      • C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\file.vbs

        Filesize

        34B

        MD5

        677cc4360477c72cb0ce00406a949c61

        SHA1

        b679e8c3427f6c5fc47c8ac46cd0e56c9424de05

        SHA256

        f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b

        SHA512

        7cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a

      • C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe

        Filesize

        2.5MB

        MD5

        75136c00a06c6ee8c30e8a969fac27a9

        SHA1

        d4d02785c465a544573f6d113849d48f2ad35fed

        SHA256

        28c79c3f0bd6ee03025e4e4f61a2d25a00bebc0b1d3776bfabc824fc49013fcf

        SHA512

        187385d74f340932ba2b46970846e72f0da058a29f49a50879edde3aef17dc910ca49fb0ae24cc2d49745cd1f21c4450aa4f3d258b8a129918a51b217506af2d

      • C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe

        Filesize

        2.5MB

        MD5

        75136c00a06c6ee8c30e8a969fac27a9

        SHA1

        d4d02785c465a544573f6d113849d48f2ad35fed

        SHA256

        28c79c3f0bd6ee03025e4e4f61a2d25a00bebc0b1d3776bfabc824fc49013fcf

        SHA512

        187385d74f340932ba2b46970846e72f0da058a29f49a50879edde3aef17dc910ca49fb0ae24cc2d49745cd1f21c4450aa4f3d258b8a129918a51b217506af2d

      • C:\Windows\PCHEALTH\ERRORREP\QSIGNOFF\Idle.exe

        Filesize

        2.5MB

        MD5

        75136c00a06c6ee8c30e8a969fac27a9

        SHA1

        d4d02785c465a544573f6d113849d48f2ad35fed

        SHA256

        28c79c3f0bd6ee03025e4e4f61a2d25a00bebc0b1d3776bfabc824fc49013fcf

        SHA512

        187385d74f340932ba2b46970846e72f0da058a29f49a50879edde3aef17dc910ca49fb0ae24cc2d49745cd1f21c4450aa4f3d258b8a129918a51b217506af2d

      • \Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe

        Filesize

        2.5MB

        MD5

        75136c00a06c6ee8c30e8a969fac27a9

        SHA1

        d4d02785c465a544573f6d113849d48f2ad35fed

        SHA256

        28c79c3f0bd6ee03025e4e4f61a2d25a00bebc0b1d3776bfabc824fc49013fcf

        SHA512

        187385d74f340932ba2b46970846e72f0da058a29f49a50879edde3aef17dc910ca49fb0ae24cc2d49745cd1f21c4450aa4f3d258b8a129918a51b217506af2d

      • \Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe

        Filesize

        2.5MB

        MD5

        75136c00a06c6ee8c30e8a969fac27a9

        SHA1

        d4d02785c465a544573f6d113849d48f2ad35fed

        SHA256

        28c79c3f0bd6ee03025e4e4f61a2d25a00bebc0b1d3776bfabc824fc49013fcf

        SHA512

        187385d74f340932ba2b46970846e72f0da058a29f49a50879edde3aef17dc910ca49fb0ae24cc2d49745cd1f21c4450aa4f3d258b8a129918a51b217506af2d

      • memory/512-81-0x00000000003C0000-0x00000000003CE000-memory.dmp

        Filesize

        56KB

      • memory/512-74-0x00000000001C0000-0x00000000001DC000-memory.dmp

        Filesize

        112KB

      • memory/512-82-0x0000000000650000-0x0000000000658000-memory.dmp

        Filesize

        32KB

      • memory/512-84-0x0000000000670000-0x000000000067A000-memory.dmp

        Filesize

        40KB

      • memory/512-83-0x0000000000660000-0x0000000000668000-memory.dmp

        Filesize

        32KB

      • memory/512-79-0x0000000000390000-0x00000000003A2000-memory.dmp

        Filesize

        72KB

      • memory/512-78-0x0000000000380000-0x000000000038C000-memory.dmp

        Filesize

        48KB

      • memory/512-77-0x00000000005E0000-0x0000000000636000-memory.dmp

        Filesize

        344KB

      • memory/512-76-0x0000000000370000-0x0000000000380000-memory.dmp

        Filesize

        64KB

      • memory/512-72-0x00000000012A0000-0x0000000001530000-memory.dmp

        Filesize

        2.6MB

      • memory/512-73-0x000000001B220000-0x000000001B2A0000-memory.dmp

        Filesize

        512KB

      • memory/512-80-0x00000000003A0000-0x00000000003AE000-memory.dmp

        Filesize

        56KB

      • memory/512-75-0x00000000001E0000-0x00000000001F6000-memory.dmp

        Filesize

        88KB

      • memory/1472-106-0x000000001B260000-0x000000001B2E0000-memory.dmp

        Filesize

        512KB

      • memory/1472-105-0x000000001B260000-0x000000001B2E0000-memory.dmp

        Filesize

        512KB

      • memory/1472-104-0x0000000000DD0000-0x0000000001060000-memory.dmp

        Filesize

        2.6MB

      • memory/1472-173-0x000000001B260000-0x000000001B2E0000-memory.dmp

        Filesize

        512KB

      • memory/1472-182-0x000000001B260000-0x000000001B2E0000-memory.dmp

        Filesize

        512KB

      • memory/1472-204-0x000000001B260000-0x000000001B2E0000-memory.dmp

        Filesize

        512KB

      • memory/1472-205-0x000000001B260000-0x000000001B2E0000-memory.dmp

        Filesize

        512KB