Analysis

  • max time kernel
    122s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 20:26

General

  • Target

    NEAS.66c158147321a1ee377aaca871f67c10.exe

  • Size

    783KB

  • MD5

    66c158147321a1ee377aaca871f67c10

  • SHA1

    e7d81492b40cf90d611538d4e9982919873ddb58

  • SHA256

    bf35292b701b24b6a18aa29f6dd6c651d8a50b24098440fc90b8423ca732ee06

  • SHA512

    23fd4833c37bc4d7fa2e5b58966431ab826540f7d1f2aa4f8a148fda666f5d1cf9624c6821528ab203012bf52cf77b1cd0c2de89bf2c8d2f0ef4ad64dbd351f4

  • SSDEEP

    12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 9 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 7 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 16 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.66c158147321a1ee377aaca871f67c10.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.66c158147321a1ee377aaca871f67c10.exe"
    1⤵
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3056
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\KNWZ7r49sR.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1344
        • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\WMIADAP.exe
          "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\WMIADAP.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:2580
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Documents and Settings\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2600
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\idndl\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2764
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "NEAS.66c158147321a1ee377aaca871f67c10" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\NEAS.66c158147321a1ee377aaca871f67c10.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3008
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\CHxReadingStringIME\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2796
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\WMIADAP.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2732
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\System32\mfmjpegdec\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2548
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Java\jre7\bin\server\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2744
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\objsel\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2472
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Documents and Settings\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1680

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\WMIADAP.exe

      Filesize

      783KB

      MD5

      66c158147321a1ee377aaca871f67c10

      SHA1

      e7d81492b40cf90d611538d4e9982919873ddb58

      SHA256

      bf35292b701b24b6a18aa29f6dd6c651d8a50b24098440fc90b8423ca732ee06

      SHA512

      23fd4833c37bc4d7fa2e5b58966431ab826540f7d1f2aa4f8a148fda666f5d1cf9624c6821528ab203012bf52cf77b1cd0c2de89bf2c8d2f0ef4ad64dbd351f4

    • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\WMIADAP.exe

      Filesize

      783KB

      MD5

      66c158147321a1ee377aaca871f67c10

      SHA1

      e7d81492b40cf90d611538d4e9982919873ddb58

      SHA256

      bf35292b701b24b6a18aa29f6dd6c651d8a50b24098440fc90b8423ca732ee06

      SHA512

      23fd4833c37bc4d7fa2e5b58966431ab826540f7d1f2aa4f8a148fda666f5d1cf9624c6821528ab203012bf52cf77b1cd0c2de89bf2c8d2f0ef4ad64dbd351f4

    • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\WMIADAP.exe

      Filesize

      783KB

      MD5

      66c158147321a1ee377aaca871f67c10

      SHA1

      e7d81492b40cf90d611538d4e9982919873ddb58

      SHA256

      bf35292b701b24b6a18aa29f6dd6c651d8a50b24098440fc90b8423ca732ee06

      SHA512

      23fd4833c37bc4d7fa2e5b58966431ab826540f7d1f2aa4f8a148fda666f5d1cf9624c6821528ab203012bf52cf77b1cd0c2de89bf2c8d2f0ef4ad64dbd351f4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8929da1c6691bb6a0655dbb44c6a05d9

      SHA1

      906073220ef23a1912bf21c0a5a83db91ac1f619

      SHA256

      fb855994f006c4726fc06decd04914f924fdf08cf7382b26ff2fa2db2462518d

      SHA512

      d335d2ae7242c713ea110673033b2cbf08251f39d4708b8142191ac734d632fa7ee7adce1378980d73b258cc4af34e3267d0658305964d459f00c9d61bfd8d07

    • C:\Users\Admin\AppData\Local\Temp\Cab8539.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\KNWZ7r49sR.bat

      Filesize

      238B

      MD5

      7cdfef68961eaf264356a37f683f7caa

      SHA1

      9313be0b1b861a792c1e1032b5f33cdd67c76cce

      SHA256

      9abe02b287d3c1059a218009f344ce27aab17a119ccdd37d88b750c2be19e5d4

      SHA512

      5f717d18c836c1aa4d967d23cd6927882699c2c5a3b044247a22c850dc7f27b71d73c60d40378960f3a77b5b38bf1b98d6c100d982050dda1b824de09a23076d

    • C:\Users\Admin\AppData\Local\Temp\Tar85C8.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • memory/2580-139-0x000000001AEC0000-0x000000001AF40000-memory.dmp

      Filesize

      512KB

    • memory/2580-135-0x000000001AEC0000-0x000000001AF40000-memory.dmp

      Filesize

      512KB

    • memory/2580-140-0x000000001AEC0000-0x000000001AF40000-memory.dmp

      Filesize

      512KB

    • memory/2580-169-0x000000001AEC0000-0x000000001AF40000-memory.dmp

      Filesize

      512KB

    • memory/2580-138-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

      Filesize

      9.9MB

    • memory/2580-137-0x000000001AEC0000-0x000000001AF40000-memory.dmp

      Filesize

      512KB

    • memory/2580-136-0x000000001AEC0000-0x000000001AF40000-memory.dmp

      Filesize

      512KB

    • memory/2580-168-0x000000001AEC0000-0x000000001AF40000-memory.dmp

      Filesize

      512KB

    • memory/2580-134-0x000000001AEC0000-0x000000001AF40000-memory.dmp

      Filesize

      512KB

    • memory/2580-133-0x000000001AEC0000-0x000000001AF40000-memory.dmp

      Filesize

      512KB

    • memory/2580-132-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

      Filesize

      9.9MB

    • memory/2580-131-0x0000000000F70000-0x000000000103A000-memory.dmp

      Filesize

      808KB

    • memory/2580-204-0x000000001AEC0000-0x000000001AF40000-memory.dmp

      Filesize

      512KB

    • memory/2580-205-0x000000001AEC0000-0x000000001AF40000-memory.dmp

      Filesize

      512KB

    • memory/2580-224-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

      Filesize

      9.9MB

    • memory/3056-17-0x0000000000200000-0x0000000000208000-memory.dmp

      Filesize

      32KB

    • memory/3056-127-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-24-0x0000000000440000-0x0000000000448000-memory.dmp

      Filesize

      32KB

    • memory/3056-27-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-34-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-22-0x00000000021C0000-0x00000000021CC000-memory.dmp

      Filesize

      48KB

    • memory/3056-39-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-40-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-47-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-57-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-64-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-65-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-73-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-87-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-88-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-89-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-99-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-110-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-111-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-118-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-119-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-20-0x0000000000BB0000-0x0000000000BB8000-memory.dmp

      Filesize

      32KB

    • memory/3056-126-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-23-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-128-0x000007FEF5F70000-0x000007FEF695C000-memory.dmp

      Filesize

      9.9MB

    • memory/3056-21-0x00000000021A0000-0x00000000021A8000-memory.dmp

      Filesize

      32KB

    • memory/3056-16-0x0000000000420000-0x0000000000428000-memory.dmp

      Filesize

      32KB

    • memory/3056-19-0x0000000000B90000-0x0000000000B98000-memory.dmp

      Filesize

      32KB

    • memory/3056-18-0x0000000000410000-0x0000000000418000-memory.dmp

      Filesize

      32KB

    • memory/3056-0-0x000007FEF5F70000-0x000007FEF695C000-memory.dmp

      Filesize

      9.9MB

    • memory/3056-15-0x0000000000430000-0x0000000000438000-memory.dmp

      Filesize

      32KB

    • memory/3056-14-0x0000000000B80000-0x0000000000B88000-memory.dmp

      Filesize

      32KB

    • memory/3056-13-0x00000000001E0000-0x00000000001E8000-memory.dmp

      Filesize

      32KB

    • memory/3056-12-0x00000000001F0000-0x00000000001F8000-memory.dmp

      Filesize

      32KB

    • memory/3056-9-0x00000000001B0000-0x00000000001BA000-memory.dmp

      Filesize

      40KB

    • memory/3056-10-0x00000000001A0000-0x00000000001AA000-memory.dmp

      Filesize

      40KB

    • memory/3056-11-0x00000000001C0000-0x00000000001C8000-memory.dmp

      Filesize

      32KB

    • memory/3056-8-0x00000000001D0000-0x00000000001DC000-memory.dmp

      Filesize

      48KB

    • memory/3056-7-0x0000000000190000-0x0000000000198000-memory.dmp

      Filesize

      32KB

    • memory/3056-5-0x0000000000160000-0x0000000000168000-memory.dmp

      Filesize

      32KB

    • memory/3056-6-0x0000000000180000-0x0000000000190000-memory.dmp

      Filesize

      64KB

    • memory/3056-4-0x0000000000150000-0x0000000000158000-memory.dmp

      Filesize

      32KB

    • memory/3056-3-0x000007FEF5F70000-0x000007FEF695C000-memory.dmp

      Filesize

      9.9MB

    • memory/3056-2-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/3056-1-0x0000000000BC0000-0x0000000000C8A000-memory.dmp

      Filesize

      808KB