Analysis

  • max time kernel
    74s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    05-07-2023 10:26

General

  • Target

    ad531536d5ea6ac2b629e7e1ea63e5bb.exe

  • Size

    1.4MB

  • MD5

    ad531536d5ea6ac2b629e7e1ea63e5bb

  • SHA1

    74324e685a1a676d50f80009eb677f1218da6c67

  • SHA256

    5a8b4862e2819123cc9d2f271fbe0c602f871b39c616235ba1e3bdb7c5e1543c

  • SHA512

    00f354214b546311cdfa7697e961f43b8ca423ccb04e791f8ae32cf49e7d3fc368b8ce651a036778bf58dcd3fab43858e2dd1c1e35625124e98f43318b3d447f

  • SSDEEP

    24576:OdWjIqrUgLy1ouH8irAmYmctqudaQtrk0xf+LVmyhharuHrc95z:+UIqHLyTUm1qaKF+hmCdo9

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 24 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 9 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 24 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad531536d5ea6ac2b629e7e1ea63e5bb.exe
    "C:\Users\Admin\AppData\Local\Temp\ad531536d5ea6ac2b629e7e1ea63e5bb.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Default\Cookies\sppsvc.exe
      "C:\Users\Default\Cookies\sppsvc.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:872
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Mail\ja-JP\sppsvc.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1028
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\ja-JP\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2912
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Mail\ja-JP\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2464
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Windows\Help\mui\0410\csrss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:816
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Help\mui\0410\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2952
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Windows\Help\mui\0410\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2160
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\sppsvc.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1536
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1824
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1452
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1724
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1496
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2028
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Recovery\b00bdcc2-19f7-11ee-af88-94f7f1066b94\spoolsv.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2744
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\b00bdcc2-19f7-11ee-af88-94f7f1066b94\spoolsv.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2788
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Recovery\b00bdcc2-19f7-11ee-af88-94f7f1066b94\spoolsv.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2608
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Recovery\b00bdcc2-19f7-11ee-af88-94f7f1066b94\wininit.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2756
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\b00bdcc2-19f7-11ee-af88-94f7f1066b94\wininit.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2052
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Recovery\b00bdcc2-19f7-11ee-af88-94f7f1066b94\wininit.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2792
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Cookies\sppsvc.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2528
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\Cookies\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:996
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Cookies\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2492
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Users\Default\NetHood\services.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2560
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Default\NetHood\services.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2176
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\Users\Default\NetHood\services.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2232

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe

    Filesize

    1.4MB

    MD5

    a9d15c91ff21964fa06034e34810cc70

    SHA1

    4bc3a4a79683cf3181680dd19e61a952f4202455

    SHA256

    74088ffd2267126b265f449a4ce2c13ca5553d5bd0ce0d2001c3131c98d4fff4

    SHA512

    7a79ce4f3d93964f591bddca64e148b77dd0973d09ec3ccfeb94c718d5ab6bbd93d5edf7c2f6d43614cce9aa7df79fde811f16294d6f4b18a7d4aa90fdb3b01a

  • C:\Recovery\b00bdcc2-19f7-11ee-af88-94f7f1066b94\spoolsv.exe

    Filesize

    1.4MB

    MD5

    ad531536d5ea6ac2b629e7e1ea63e5bb

    SHA1

    74324e685a1a676d50f80009eb677f1218da6c67

    SHA256

    5a8b4862e2819123cc9d2f271fbe0c602f871b39c616235ba1e3bdb7c5e1543c

    SHA512

    00f354214b546311cdfa7697e961f43b8ca423ccb04e791f8ae32cf49e7d3fc368b8ce651a036778bf58dcd3fab43858e2dd1c1e35625124e98f43318b3d447f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7f4f46aed27ba0b2465ab9162ee8f735

    SHA1

    605cca4c6ffc74dd5daec20d47dcbd24506381b8

    SHA256

    5b952995346ed302e09bf0a56e2419a699cd132b6fdec90a32d909a2e10a6706

    SHA512

    3e9d476158e478ee568fcf427af8c7f2d5c4a75ad2f0e494cf87c08a751247ab0bbfdb4af9fdd94b565a38475ea14ee8cbdf8085cc469c62758f886545a20f15

  • C:\Users\Admin\AppData\Local\Temp\CabC0D2.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarC1A0.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Local\Temp\tmp9630E.tmp

    Filesize

    936B

    MD5

    26be0cccb48249810e2c64e0b7caa427

    SHA1

    964f6765b59d92023c7b248b77d741b4f5708eb1

    SHA256

    6ada292f9383e2d9b89568809e537e0f47e146330a02d948b8c4aadc81ac17fa

    SHA512

    f97dfb0cf30aa05d60e07261da0d52623fd41a532dfaf9b00047770254033f0392fe9be95a37777b80d20862d598fc8eaafbf27bea4c19fab255d9afdfaef5e4

  • C:\Users\Default\AppData\Roaming\Microsoft\Windows\Cookies\sppsvc.exe

    Filesize

    1.4MB

    MD5

    ad531536d5ea6ac2b629e7e1ea63e5bb

    SHA1

    74324e685a1a676d50f80009eb677f1218da6c67

    SHA256

    5a8b4862e2819123cc9d2f271fbe0c602f871b39c616235ba1e3bdb7c5e1543c

    SHA512

    00f354214b546311cdfa7697e961f43b8ca423ccb04e791f8ae32cf49e7d3fc368b8ce651a036778bf58dcd3fab43858e2dd1c1e35625124e98f43318b3d447f

  • C:\Users\Default\Cookies\sppsvc.exe

    Filesize

    1.4MB

    MD5

    ad531536d5ea6ac2b629e7e1ea63e5bb

    SHA1

    74324e685a1a676d50f80009eb677f1218da6c67

    SHA256

    5a8b4862e2819123cc9d2f271fbe0c602f871b39c616235ba1e3bdb7c5e1543c

    SHA512

    00f354214b546311cdfa7697e961f43b8ca423ccb04e791f8ae32cf49e7d3fc368b8ce651a036778bf58dcd3fab43858e2dd1c1e35625124e98f43318b3d447f

  • memory/872-144-0x0000000001340000-0x00000000014B6000-memory.dmp

    Filesize

    1.5MB

  • memory/872-220-0x000000001B010000-0x000000001B090000-memory.dmp

    Filesize

    512KB

  • memory/872-252-0x000000001B010000-0x000000001B090000-memory.dmp

    Filesize

    512KB

  • memory/872-251-0x000000001B010000-0x000000001B090000-memory.dmp

    Filesize

    512KB

  • memory/872-226-0x000000001B010000-0x000000001B090000-memory.dmp

    Filesize

    512KB

  • memory/872-145-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/872-146-0x000000001B010000-0x000000001B090000-memory.dmp

    Filesize

    512KB

  • memory/872-147-0x000000001B010000-0x000000001B090000-memory.dmp

    Filesize

    512KB

  • memory/2360-54-0x0000000000330000-0x00000000004A6000-memory.dmp

    Filesize

    1.5MB

  • memory/2360-57-0x00000000008C0000-0x00000000008D0000-memory.dmp

    Filesize

    64KB

  • memory/2360-56-0x00000000008E0000-0x00000000008FC000-memory.dmp

    Filesize

    112KB

  • memory/2360-55-0x000000001B040000-0x000000001B0C0000-memory.dmp

    Filesize

    512KB

  • memory/2360-58-0x0000000001EB0000-0x0000000001EC6000-memory.dmp

    Filesize

    88KB

  • memory/2360-61-0x0000000001F00000-0x0000000001F0E000-memory.dmp

    Filesize

    56KB

  • memory/2360-59-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/2360-60-0x0000000001EF0000-0x0000000001EFE000-memory.dmp

    Filesize

    56KB