Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-06-2023 09:46

General

  • Target

    0edf51664b0a45acdce457d9a8cdc386.exe

  • Size

    8.5MB

  • MD5

    0edf51664b0a45acdce457d9a8cdc386

  • SHA1

    d7b0fbca408089089dc4cbf6482bac3599d9fba0

  • SHA256

    67eeefd5e0497fbdc04b51cfbb76efae169c3875c67620ebaa13c62ece5edf15

  • SHA512

    0cf3b0d3568c5cf3f442bee42bdbfccb5e576fa1f5abb14f2a1427dc3d85d54c5b55d3df75ea9dc39d2bc3c688fa4ede24663ff7af7e66debd474b26aa2fad2d

  • SSDEEP

    196608:Ck6YzLe5c91ELY0JDfyGZ21X5Sp6GemDMPwuWJYPnkRo:PLt96Y0JDfD0pfaMPWTo

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0edf51664b0a45acdce457d9a8cdc386.exe
    "C:\Users\Admin\AppData\Local\Temp\0edf51664b0a45acdce457d9a8cdc386.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Users\Admin\AppData\Local\Temp\0edf51664b0a45acdce457d9a8cdc386.exe
      "C:\Users\Admin\AppData\Local\Temp\0edf51664b0a45acdce457d9a8cdc386.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Windows\SYSTEM32\cmd.exe
        cmd /c echo %temp%
        3⤵
          PID:2160
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\INST.exe
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4624
          • C:\Users\Admin\AppData\Local\Temp\INST.exe
            C:\Users\Admin\AppData\Local\Temp\INST.exe
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4344
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hH1wTxprdi.bat"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3176
              • C:\Windows\SysWOW64\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:3376
                • C:\Windows\system32\w32tm.exe
                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                  7⤵
                    PID:3664
                • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\winlogon.exe
                  "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\winlogon.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:1712
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\winlogon.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1508
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:3792
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:3760
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Music\conhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1924
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\Public\Music\conhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1080
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Music\conhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1648
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2700
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:5072
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2576
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Portable Devices\dwm.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1300
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\dwm.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1864
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Portable Devices\dwm.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:324
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\cmd.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:32
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\cmd.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:832
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\cmd.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2404
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Multimedia Platform\System.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:3212
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\System.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:3312
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Multimedia Platform\System.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:3564

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\winlogon.exe
        Filesize

        1.8MB

        MD5

        ae20cf47b19fa8d28907dca698a4e554

        SHA1

        e370a2f7a29dd8e91277bd60d9eb2bc2ad69ac3c

        SHA256

        4b9bd91462bfc6d84f789e4dcd63fe0190feddd31efdb4a10582afdd8732a48e

        SHA512

        307e5d5f0873888a1031a7b9b6c606be9cb2856965b12acc98b9e3dee82053d147a35138af49335d2f4c2ebe8114f75da4ba639c1417a246a9636d7af9551e3e

      • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\winlogon.exe
        Filesize

        1.8MB

        MD5

        ae20cf47b19fa8d28907dca698a4e554

        SHA1

        e370a2f7a29dd8e91277bd60d9eb2bc2ad69ac3c

        SHA256

        4b9bd91462bfc6d84f789e4dcd63fe0190feddd31efdb4a10582afdd8732a48e

        SHA512

        307e5d5f0873888a1031a7b9b6c606be9cb2856965b12acc98b9e3dee82053d147a35138af49335d2f4c2ebe8114f75da4ba639c1417a246a9636d7af9551e3e

      • C:\Recovery\WindowsRE\SearchApp.exe
        Filesize

        1.8MB

        MD5

        ae20cf47b19fa8d28907dca698a4e554

        SHA1

        e370a2f7a29dd8e91277bd60d9eb2bc2ad69ac3c

        SHA256

        4b9bd91462bfc6d84f789e4dcd63fe0190feddd31efdb4a10582afdd8732a48e

        SHA512

        307e5d5f0873888a1031a7b9b6c606be9cb2856965b12acc98b9e3dee82053d147a35138af49335d2f4c2ebe8114f75da4ba639c1417a246a9636d7af9551e3e

      • C:\Users\Admin\AppData\Local\Temp\INST.exe
        Filesize

        1.8MB

        MD5

        ae20cf47b19fa8d28907dca698a4e554

        SHA1

        e370a2f7a29dd8e91277bd60d9eb2bc2ad69ac3c

        SHA256

        4b9bd91462bfc6d84f789e4dcd63fe0190feddd31efdb4a10582afdd8732a48e

        SHA512

        307e5d5f0873888a1031a7b9b6c606be9cb2856965b12acc98b9e3dee82053d147a35138af49335d2f4c2ebe8114f75da4ba639c1417a246a9636d7af9551e3e

      • C:\Users\Admin\AppData\Local\Temp\INST.exe
        Filesize

        1.8MB

        MD5

        ae20cf47b19fa8d28907dca698a4e554

        SHA1

        e370a2f7a29dd8e91277bd60d9eb2bc2ad69ac3c

        SHA256

        4b9bd91462bfc6d84f789e4dcd63fe0190feddd31efdb4a10582afdd8732a48e

        SHA512

        307e5d5f0873888a1031a7b9b6c606be9cb2856965b12acc98b9e3dee82053d147a35138af49335d2f4c2ebe8114f75da4ba639c1417a246a9636d7af9551e3e

      • C:\Users\Admin\AppData\Local\Temp\_MEI50482\VCRUNTIME140.dll
        Filesize

        106KB

        MD5

        4585a96cc4eef6aafd5e27ea09147dc6

        SHA1

        489cfff1b19abbec98fda26ac8958005e88dd0cb

        SHA256

        a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736

        SHA512

        d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286

      • C:\Users\Admin\AppData\Local\Temp\_MEI50482\VCRUNTIME140.dll
        Filesize

        106KB

        MD5

        4585a96cc4eef6aafd5e27ea09147dc6

        SHA1

        489cfff1b19abbec98fda26ac8958005e88dd0cb

        SHA256

        a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736

        SHA512

        d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286

      • C:\Users\Admin\AppData\Local\Temp\_MEI50482\base_library.zip
        Filesize

        1.7MB

        MD5

        ebb4f1a115f0692698b5640869f30853

        SHA1

        9ba77340a6a32af08899e7f3c97841724dd78c3f

        SHA256

        4ab0deb6a298d14a0f50d55dc6ce5673b6c5320817ec255acf282191642a4576

        SHA512

        3f6ba7d86c9f292344f4ad196f4ae863bf936578dd7cfac7dc4aaf05c2c78e68d5f813c4ed36048b6678451f1717deeb77493d8557ee6778c6a70beb5294d21a

      • C:\Users\Admin\AppData\Local\Temp\_MEI50482\python311.dll
        Filesize

        5.5MB

        MD5

        e2bd5ae53427f193b42d64b8e9bf1943

        SHA1

        7c317aad8e2b24c08d3b8b3fba16dd537411727f

        SHA256

        c4844b05e3a936b130adedb854d3c04d49ee54edb43e9d36f8c4ae94ccb78400

        SHA512

        ae23a6707e539c619fd5c5b4fc6e4734edc91f89ebe024d25ff2a70168da6105ac0bd47cf6bf3715af6411963caf0acbb4632464e1619ca6361abf53adfe7036

      • C:\Users\Admin\AppData\Local\Temp\_MEI50482\python311.dll
        Filesize

        5.5MB

        MD5

        e2bd5ae53427f193b42d64b8e9bf1943

        SHA1

        7c317aad8e2b24c08d3b8b3fba16dd537411727f

        SHA256

        c4844b05e3a936b130adedb854d3c04d49ee54edb43e9d36f8c4ae94ccb78400

        SHA512

        ae23a6707e539c619fd5c5b4fc6e4734edc91f89ebe024d25ff2a70168da6105ac0bd47cf6bf3715af6411963caf0acbb4632464e1619ca6361abf53adfe7036

      • C:\Users\Admin\AppData\Local\Temp\hH1wTxprdi.bat
        Filesize

        251B

        MD5

        09bca67c77262284771afb0243be36fa

        SHA1

        782c178bae76cc2d67e7d3b9ff3421eb346c4d8d

        SHA256

        2c7a3bdc3e2d129f075850c97f82ed19d618faf66fc205197c361b22a3859d9d

        SHA512

        996f907708d776f4b2874afc57abdbb99dad07d1be9974d79658c3c0f5ea11dbf9e7b0602edbd7c76bdee2e29b230e268c53fa2a4f0fb117c220499c889f6c77

      • memory/1712-194-0x0000000000770000-0x0000000000BFE000-memory.dmp
        Filesize

        4.6MB

      • memory/1712-195-0x0000000000770000-0x0000000000BFE000-memory.dmp
        Filesize

        4.6MB

      • memory/1712-236-0x0000000005520000-0x0000000005530000-memory.dmp
        Filesize

        64KB

      • memory/1712-235-0x0000000000770000-0x0000000000BFE000-memory.dmp
        Filesize

        4.6MB

      • memory/1712-198-0x0000000007000000-0x0000000007092000-memory.dmp
        Filesize

        584KB

      • memory/1712-197-0x0000000005520000-0x0000000005530000-memory.dmp
        Filesize

        64KB

      • memory/1712-196-0x0000000000770000-0x0000000000BFE000-memory.dmp
        Filesize

        4.6MB

      • memory/4344-180-0x00000000004A0000-0x000000000092E000-memory.dmp
        Filesize

        4.6MB

      • memory/4344-155-0x00000000004A0000-0x000000000092E000-memory.dmp
        Filesize

        4.6MB

      • memory/4344-156-0x00000000004A0000-0x000000000092E000-memory.dmp
        Filesize

        4.6MB

      • memory/4344-157-0x0000000006730000-0x0000000006CD4000-memory.dmp
        Filesize

        5.6MB

      • memory/4344-162-0x0000000006560000-0x00000000065C6000-memory.dmp
        Filesize

        408KB

      • memory/4344-158-0x0000000005BE0000-0x0000000005BF0000-memory.dmp
        Filesize

        64KB

      • memory/4344-159-0x00000000064A0000-0x00000000064F0000-memory.dmp
        Filesize

        320KB