Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 20:26

General

  • Target

    NEAS.66c158147321a1ee377aaca871f67c10.exe

  • Size

    783KB

  • MD5

    66c158147321a1ee377aaca871f67c10

  • SHA1

    e7d81492b40cf90d611538d4e9982919873ddb58

  • SHA256

    bf35292b701b24b6a18aa29f6dd6c651d8a50b24098440fc90b8423ca732ee06

  • SHA512

    23fd4833c37bc4d7fa2e5b58966431ab826540f7d1f2aa4f8a148fda666f5d1cf9624c6821528ab203012bf52cf77b1cd0c2de89bf2c8d2f0ef4ad64dbd351f4

  • SSDEEP

    12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 8 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.66c158147321a1ee377aaca871f67c10.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.66c158147321a1ee377aaca871f67c10.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2344
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\spx4VPmLa2.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:732
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1908
        • C:\Windows\System32\wbem\wdigest\unsecapp.exe
          "C:\Windows\System32\wbem\wdigest\unsecapp.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:3252
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "NEAS.66c158147321a1ee377aaca871f67c10" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\chrome_installer\NEAS.66c158147321a1ee377aaca871f67c10.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4028
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Windows\System32\wbem\wdigest\unsecapp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4356
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-cn\OfficeClickToRun.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2808
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\wmpeffects\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2280

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\chrome_installer\NEAS.66c158147321a1ee377aaca871f67c10.exe

      Filesize

      783KB

      MD5

      66c158147321a1ee377aaca871f67c10

      SHA1

      e7d81492b40cf90d611538d4e9982919873ddb58

      SHA256

      bf35292b701b24b6a18aa29f6dd6c651d8a50b24098440fc90b8423ca732ee06

      SHA512

      23fd4833c37bc4d7fa2e5b58966431ab826540f7d1f2aa4f8a148fda666f5d1cf9624c6821528ab203012bf52cf77b1cd0c2de89bf2c8d2f0ef4ad64dbd351f4

    • C:\Users\Admin\AppData\Local\Temp\spx4VPmLa2.bat

      Filesize

      209B

      MD5

      0d35fe988fef2475c6566b88a6bca142

      SHA1

      652e5fc85c4342a6b46655b2d40416b06b511d5e

      SHA256

      510a1691470c780843d904a0d583b6b5389d7a8bdd15fbb613ca54127e866d0c

      SHA512

      652fbc86255f5b8ffbb108896fa7ed0fce0c4f0fd43b790fc7a05005a76e57353c259663b415c6d9f1d89c24f828d5e907e06129861d5daa06d20047fa966e4c

    • C:\Windows\System32\wbem\wdigest\unsecapp.exe

      Filesize

      783KB

      MD5

      66c158147321a1ee377aaca871f67c10

      SHA1

      e7d81492b40cf90d611538d4e9982919873ddb58

      SHA256

      bf35292b701b24b6a18aa29f6dd6c651d8a50b24098440fc90b8423ca732ee06

      SHA512

      23fd4833c37bc4d7fa2e5b58966431ab826540f7d1f2aa4f8a148fda666f5d1cf9624c6821528ab203012bf52cf77b1cd0c2de89bf2c8d2f0ef4ad64dbd351f4

    • C:\Windows\System32\wbem\wdigest\unsecapp.exe

      Filesize

      783KB

      MD5

      66c158147321a1ee377aaca871f67c10

      SHA1

      e7d81492b40cf90d611538d4e9982919873ddb58

      SHA256

      bf35292b701b24b6a18aa29f6dd6c651d8a50b24098440fc90b8423ca732ee06

      SHA512

      23fd4833c37bc4d7fa2e5b58966431ab826540f7d1f2aa4f8a148fda666f5d1cf9624c6821528ab203012bf52cf77b1cd0c2de89bf2c8d2f0ef4ad64dbd351f4

    • memory/2344-22-0x0000000003220000-0x0000000003228000-memory.dmp

      Filesize

      32KB

    • memory/2344-7-0x0000000003070000-0x000000000307C000-memory.dmp

      Filesize

      48KB

    • memory/2344-6-0x0000000003060000-0x0000000003068000-memory.dmp

      Filesize

      32KB

    • memory/2344-27-0x0000000003030000-0x0000000003040000-memory.dmp

      Filesize

      64KB

    • memory/2344-8-0x0000000003080000-0x000000000308A000-memory.dmp

      Filesize

      40KB

    • memory/2344-9-0x00000000030A0000-0x00000000030AA000-memory.dmp

      Filesize

      40KB

    • memory/2344-10-0x0000000003090000-0x0000000003098000-memory.dmp

      Filesize

      32KB

    • memory/2344-11-0x00000000030B0000-0x00000000030B8000-memory.dmp

      Filesize

      32KB

    • memory/2344-12-0x00000000031E0000-0x00000000031E8000-memory.dmp

      Filesize

      32KB

    • memory/2344-17-0x000000001BC40000-0x000000001BC48000-memory.dmp

      Filesize

      32KB

    • memory/2344-16-0x0000000003240000-0x0000000003248000-memory.dmp

      Filesize

      32KB

    • memory/2344-15-0x0000000003230000-0x0000000003238000-memory.dmp

      Filesize

      32KB

    • memory/2344-14-0x0000000003210000-0x0000000003218000-memory.dmp

      Filesize

      32KB

    • memory/2344-13-0x0000000003200000-0x0000000003208000-memory.dmp

      Filesize

      32KB

    • memory/2344-18-0x000000001BC50000-0x000000001BC58000-memory.dmp

      Filesize

      32KB

    • memory/2344-28-0x0000000003030000-0x0000000003040000-memory.dmp

      Filesize

      64KB

    • memory/2344-21-0x0000000003030000-0x0000000003040000-memory.dmp

      Filesize

      64KB

    • memory/2344-19-0x0000000003030000-0x0000000003040000-memory.dmp

      Filesize

      64KB

    • memory/2344-0-0x0000000000F00000-0x0000000000FCA000-memory.dmp

      Filesize

      808KB

    • memory/2344-23-0x000000001BCA0000-0x000000001BCAC000-memory.dmp

      Filesize

      48KB

    • memory/2344-24-0x000000001BDB0000-0x000000001BDB8000-memory.dmp

      Filesize

      32KB

    • memory/2344-5-0x0000000003050000-0x0000000003060000-memory.dmp

      Filesize

      64KB

    • memory/2344-20-0x00000000031F0000-0x00000000031F8000-memory.dmp

      Filesize

      32KB

    • memory/2344-4-0x0000000003040000-0x0000000003048000-memory.dmp

      Filesize

      32KB

    • memory/2344-47-0x00007FFE36EF0000-0x00007FFE379B1000-memory.dmp

      Filesize

      10.8MB

    • memory/2344-52-0x0000000003030000-0x0000000003040000-memory.dmp

      Filesize

      64KB

    • memory/2344-53-0x0000000003030000-0x0000000003040000-memory.dmp

      Filesize

      64KB

    • memory/2344-57-0x0000000003030000-0x0000000003040000-memory.dmp

      Filesize

      64KB

    • memory/2344-62-0x0000000003030000-0x0000000003040000-memory.dmp

      Filesize

      64KB

    • memory/2344-66-0x0000000003030000-0x0000000003040000-memory.dmp

      Filesize

      64KB

    • memory/2344-3-0x0000000003020000-0x0000000003028000-memory.dmp

      Filesize

      32KB

    • memory/2344-78-0x00007FFE36EF0000-0x00007FFE379B1000-memory.dmp

      Filesize

      10.8MB

    • memory/2344-2-0x0000000003030000-0x0000000003040000-memory.dmp

      Filesize

      64KB

    • memory/2344-1-0x00007FFE36EF0000-0x00007FFE379B1000-memory.dmp

      Filesize

      10.8MB

    • memory/3252-82-0x00007FFE36BA0000-0x00007FFE37661000-memory.dmp

      Filesize

      10.8MB

    • memory/3252-83-0x00000000023E0000-0x00000000023F0000-memory.dmp

      Filesize

      64KB

    • memory/3252-84-0x00000000023E0000-0x00000000023F0000-memory.dmp

      Filesize

      64KB

    • memory/3252-85-0x00000000023E0000-0x00000000023F0000-memory.dmp

      Filesize

      64KB

    • memory/3252-86-0x00007FFE36BA0000-0x00007FFE37661000-memory.dmp

      Filesize

      10.8MB

    • memory/3252-87-0x00000000023E0000-0x00000000023F0000-memory.dmp

      Filesize

      64KB

    • memory/3252-88-0x00000000023E0000-0x00000000023F0000-memory.dmp

      Filesize

      64KB

    • memory/3252-89-0x00000000023E0000-0x00000000023F0000-memory.dmp

      Filesize

      64KB

    • memory/3252-90-0x00007FFE36BA0000-0x00007FFE37661000-memory.dmp

      Filesize

      10.8MB