Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 20:26
Behavioral task
behavioral1
Sample
NEAS.66c158147321a1ee377aaca871f67c10.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.66c158147321a1ee377aaca871f67c10.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.66c158147321a1ee377aaca871f67c10.exe
-
Size
783KB
-
MD5
66c158147321a1ee377aaca871f67c10
-
SHA1
e7d81492b40cf90d611538d4e9982919873ddb58
-
SHA256
bf35292b701b24b6a18aa29f6dd6c651d8a50b24098440fc90b8423ca732ee06
-
SHA512
23fd4833c37bc4d7fa2e5b58966431ab826540f7d1f2aa4f8a148fda666f5d1cf9624c6821528ab203012bf52cf77b1cd0c2de89bf2c8d2f0ef4ad64dbd351f4
-
SSDEEP
12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4028 2212 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4356 2212 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2808 2212 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2280 2212 schtasks.exe 86 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.66c158147321a1ee377aaca871f67c10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" NEAS.66c158147321a1ee377aaca871f67c10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" NEAS.66c158147321a1ee377aaca871f67c10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" unsecapp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" unsecapp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" unsecapp.exe -
resource yara_rule behavioral2/memory/2344-0-0x0000000000F00000-0x0000000000FCA000-memory.dmp dcrat behavioral2/files/0x000700000002323a-38.dat dcrat behavioral2/files/0x000700000002323e-80.dat dcrat behavioral2/files/0x000700000002323e-81.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation NEAS.66c158147321a1ee377aaca871f67c10.exe -
Executes dropped EXE 1 IoCs
pid Process 3252 unsecapp.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NEAS.66c158147321a1ee377aaca871f67c10 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\chrome_installer\\NEAS.66c158147321a1ee377aaca871f67c10.exe\"" NEAS.66c158147321a1ee377aaca871f67c10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\unsecapp = "\"C:\\Windows\\System32\\wbem\\wdigest\\unsecapp.exe\"" NEAS.66c158147321a1ee377aaca871f67c10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Program Files\\Common Files\\microsoft shared\\ClickToRun\\C2RINTL.zh-cn\\OfficeClickToRun.exe\"" NEAS.66c158147321a1ee377aaca871f67c10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\wmpeffects\\RuntimeBroker.exe\"" NEAS.66c158147321a1ee377aaca871f67c10.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NEAS.66c158147321a1ee377aaca871f67c10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.66c158147321a1ee377aaca871f67c10.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA unsecapp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" unsecapp.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\System32\wbem\wdigest\RCX2CC.tmp NEAS.66c158147321a1ee377aaca871f67c10.exe File opened for modification C:\Windows\System32\wbem\wdigest\unsecapp.exe NEAS.66c158147321a1ee377aaca871f67c10.exe File opened for modification C:\Windows\System32\wmpeffects\RCX1D4B.tmp NEAS.66c158147321a1ee377aaca871f67c10.exe File opened for modification C:\Windows\System32\wmpeffects\RuntimeBroker.exe NEAS.66c158147321a1ee377aaca871f67c10.exe File created C:\Windows\System32\wbem\wdigest\unsecapp.exe NEAS.66c158147321a1ee377aaca871f67c10.exe File created C:\Windows\System32\wbem\wdigest\29c1c3cc0f76855c7e7456076a4ffc27e4947119 NEAS.66c158147321a1ee377aaca871f67c10.exe File created C:\Windows\System32\wmpeffects\RuntimeBroker.exe NEAS.66c158147321a1ee377aaca871f67c10.exe File created C:\Windows\System32\wmpeffects\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d NEAS.66c158147321a1ee377aaca871f67c10.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-cn\OfficeClickToRun.exe NEAS.66c158147321a1ee377aaca871f67c10.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-cn\e6c9b481da804f07baff8eff543b0a1441069b5d NEAS.66c158147321a1ee377aaca871f67c10.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-cn\RCX10C7.tmp NEAS.66c158147321a1ee377aaca871f67c10.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-cn\OfficeClickToRun.exe NEAS.66c158147321a1ee377aaca871f67c10.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4028 schtasks.exe 4356 schtasks.exe 2808 schtasks.exe 2280 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings NEAS.66c158147321a1ee377aaca871f67c10.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2344 NEAS.66c158147321a1ee377aaca871f67c10.exe 2344 NEAS.66c158147321a1ee377aaca871f67c10.exe 2344 NEAS.66c158147321a1ee377aaca871f67c10.exe 2344 NEAS.66c158147321a1ee377aaca871f67c10.exe 2344 NEAS.66c158147321a1ee377aaca871f67c10.exe 2344 NEAS.66c158147321a1ee377aaca871f67c10.exe 2344 NEAS.66c158147321a1ee377aaca871f67c10.exe 2344 NEAS.66c158147321a1ee377aaca871f67c10.exe 2344 NEAS.66c158147321a1ee377aaca871f67c10.exe 2344 NEAS.66c158147321a1ee377aaca871f67c10.exe 2344 NEAS.66c158147321a1ee377aaca871f67c10.exe 2344 NEAS.66c158147321a1ee377aaca871f67c10.exe 3252 unsecapp.exe 3252 unsecapp.exe 3252 unsecapp.exe 3252 unsecapp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2344 NEAS.66c158147321a1ee377aaca871f67c10.exe Token: SeDebugPrivilege 3252 unsecapp.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2344 wrote to memory of 732 2344 NEAS.66c158147321a1ee377aaca871f67c10.exe 94 PID 2344 wrote to memory of 732 2344 NEAS.66c158147321a1ee377aaca871f67c10.exe 94 PID 732 wrote to memory of 1908 732 cmd.exe 96 PID 732 wrote to memory of 1908 732 cmd.exe 96 PID 732 wrote to memory of 3252 732 cmd.exe 101 PID 732 wrote to memory of 3252 732 cmd.exe 101 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" NEAS.66c158147321a1ee377aaca871f67c10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" unsecapp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" unsecapp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" unsecapp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.66c158147321a1ee377aaca871f67c10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" NEAS.66c158147321a1ee377aaca871f67c10.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.66c158147321a1ee377aaca871f67c10.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.66c158147321a1ee377aaca871f67c10.exe"1⤵
- UAC bypass
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2344 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\spx4VPmLa2.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1908
-
-
C:\Windows\System32\wbem\wdigest\unsecapp.exe"C:\Windows\System32\wbem\wdigest\unsecapp.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3252
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "NEAS.66c158147321a1ee377aaca871f67c10" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\chrome_installer\NEAS.66c158147321a1ee377aaca871f67c10.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Windows\System32\wbem\wdigest\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-cn\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\wmpeffects\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2280
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
783KB
MD566c158147321a1ee377aaca871f67c10
SHA1e7d81492b40cf90d611538d4e9982919873ddb58
SHA256bf35292b701b24b6a18aa29f6dd6c651d8a50b24098440fc90b8423ca732ee06
SHA51223fd4833c37bc4d7fa2e5b58966431ab826540f7d1f2aa4f8a148fda666f5d1cf9624c6821528ab203012bf52cf77b1cd0c2de89bf2c8d2f0ef4ad64dbd351f4
-
Filesize
209B
MD50d35fe988fef2475c6566b88a6bca142
SHA1652e5fc85c4342a6b46655b2d40416b06b511d5e
SHA256510a1691470c780843d904a0d583b6b5389d7a8bdd15fbb613ca54127e866d0c
SHA512652fbc86255f5b8ffbb108896fa7ed0fce0c4f0fd43b790fc7a05005a76e57353c259663b415c6d9f1d89c24f828d5e907e06129861d5daa06d20047fa966e4c
-
Filesize
783KB
MD566c158147321a1ee377aaca871f67c10
SHA1e7d81492b40cf90d611538d4e9982919873ddb58
SHA256bf35292b701b24b6a18aa29f6dd6c651d8a50b24098440fc90b8423ca732ee06
SHA51223fd4833c37bc4d7fa2e5b58966431ab826540f7d1f2aa4f8a148fda666f5d1cf9624c6821528ab203012bf52cf77b1cd0c2de89bf2c8d2f0ef4ad64dbd351f4
-
Filesize
783KB
MD566c158147321a1ee377aaca871f67c10
SHA1e7d81492b40cf90d611538d4e9982919873ddb58
SHA256bf35292b701b24b6a18aa29f6dd6c651d8a50b24098440fc90b8423ca732ee06
SHA51223fd4833c37bc4d7fa2e5b58966431ab826540f7d1f2aa4f8a148fda666f5d1cf9624c6821528ab203012bf52cf77b1cd0c2de89bf2c8d2f0ef4ad64dbd351f4