Analysis

  • max time kernel
    138s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/10/2023, 13:25

General

  • Target

    NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe

  • Size

    783KB

  • MD5

    09865be06746b9f8fb0b61ebe069f310

  • SHA1

    0e280ed0938a153affaf8b11137babf42b88aa46

  • SHA256

    aafe3c3d07cf40de94893484d76ab998678475ff0e65abdd416ec67ef2888351

  • SHA512

    f8f40a1b737bcb009e6ed06e1888b886132845efceec8667481da709181b9696ebe72c456161ccca53630c8e3de80f54f128e38607001d2c16d01de90656321f

  • SSDEEP

    12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 7 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 8 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:32
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HncZTqxPlS.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1504
        • C:\Program Files (x86)\Windows Defender\de-DE\sysmon.exe
          "C:\Program Files (x86)\Windows Defender\de-DE\sysmon.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:4528
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\DeviceCenter\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4328
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\de-DE\sysmon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4344
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\C_20833\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1620
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2844
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\PerfLogs\fontdrvhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1008
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\odt\SearchApp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:5000
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Documents and Settings\TextInputHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2928

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\PerfLogs\fontdrvhost.exe

            Filesize

            783KB

            MD5

            09865be06746b9f8fb0b61ebe069f310

            SHA1

            0e280ed0938a153affaf8b11137babf42b88aa46

            SHA256

            aafe3c3d07cf40de94893484d76ab998678475ff0e65abdd416ec67ef2888351

            SHA512

            f8f40a1b737bcb009e6ed06e1888b886132845efceec8667481da709181b9696ebe72c456161ccca53630c8e3de80f54f128e38607001d2c16d01de90656321f

          • C:\Program Files (x86)\Windows Defender\de-DE\sysmon.exe

            Filesize

            783KB

            MD5

            09865be06746b9f8fb0b61ebe069f310

            SHA1

            0e280ed0938a153affaf8b11137babf42b88aa46

            SHA256

            aafe3c3d07cf40de94893484d76ab998678475ff0e65abdd416ec67ef2888351

            SHA512

            f8f40a1b737bcb009e6ed06e1888b886132845efceec8667481da709181b9696ebe72c456161ccca53630c8e3de80f54f128e38607001d2c16d01de90656321f

          • C:\Program Files (x86)\Windows Defender\de-DE\sysmon.exe

            Filesize

            783KB

            MD5

            09865be06746b9f8fb0b61ebe069f310

            SHA1

            0e280ed0938a153affaf8b11137babf42b88aa46

            SHA256

            aafe3c3d07cf40de94893484d76ab998678475ff0e65abdd416ec67ef2888351

            SHA512

            f8f40a1b737bcb009e6ed06e1888b886132845efceec8667481da709181b9696ebe72c456161ccca53630c8e3de80f54f128e38607001d2c16d01de90656321f

          • C:\Users\Admin\AppData\Local\Temp\HncZTqxPlS.bat

            Filesize

            220B

            MD5

            ea9a6ec700a3949da5b419f6137ad200

            SHA1

            b29c95d1f9c3208dabda6197d73e85cede8e34a1

            SHA256

            1ad5d76b0a1049fc2211d54b917e21e04a679b33c4235648c552095803e06da2

            SHA512

            285c8ee90c85d9b979c5c65a27fc12a3201350fbedb5834c2e8de1e84fe4aff01c21ccc0fb7b827e9e5d26a539d6c93fac60fea43c76f01bfcfe0920aa47da48

          • memory/32-23-0x00000000027D0000-0x00000000027DC000-memory.dmp

            Filesize

            48KB

          • memory/32-25-0x000000001B630000-0x000000001B640000-memory.dmp

            Filesize

            64KB

          • memory/32-6-0x0000000000D30000-0x0000000000D38000-memory.dmp

            Filesize

            32KB

          • memory/32-7-0x0000000000D40000-0x0000000000D4C000-memory.dmp

            Filesize

            48KB

          • memory/32-8-0x0000000002720000-0x000000000272A000-memory.dmp

            Filesize

            40KB

          • memory/32-9-0x0000000002710000-0x000000000271A000-memory.dmp

            Filesize

            40KB

          • memory/32-16-0x00000000027A0000-0x00000000027A8000-memory.dmp

            Filesize

            32KB

          • memory/32-15-0x0000000002790000-0x0000000002798000-memory.dmp

            Filesize

            32KB

          • memory/32-14-0x0000000002770000-0x0000000002778000-memory.dmp

            Filesize

            32KB

          • memory/32-13-0x0000000002760000-0x0000000002768000-memory.dmp

            Filesize

            32KB

          • memory/32-12-0x0000000002750000-0x0000000002758000-memory.dmp

            Filesize

            32KB

          • memory/32-11-0x0000000002740000-0x0000000002748000-memory.dmp

            Filesize

            32KB

          • memory/32-10-0x0000000002730000-0x0000000002738000-memory.dmp

            Filesize

            32KB

          • memory/32-17-0x00000000027B0000-0x00000000027B8000-memory.dmp

            Filesize

            32KB

          • memory/32-18-0x00000000027C0000-0x00000000027C8000-memory.dmp

            Filesize

            32KB

          • memory/32-20-0x0000000000D50000-0x0000000000D58000-memory.dmp

            Filesize

            32KB

          • memory/32-21-0x0000000002780000-0x0000000002788000-memory.dmp

            Filesize

            32KB

          • memory/32-19-0x000000001B630000-0x000000001B640000-memory.dmp

            Filesize

            64KB

          • memory/32-0-0x0000000000590000-0x000000000065A000-memory.dmp

            Filesize

            808KB

          • memory/32-22-0x000000001B630000-0x000000001B640000-memory.dmp

            Filesize

            64KB

          • memory/32-5-0x0000000000D20000-0x0000000000D30000-memory.dmp

            Filesize

            64KB

          • memory/32-28-0x000000001B630000-0x000000001B640000-memory.dmp

            Filesize

            64KB

          • memory/32-24-0x00000000027E0000-0x00000000027E8000-memory.dmp

            Filesize

            32KB

          • memory/32-4-0x0000000000D10000-0x0000000000D18000-memory.dmp

            Filesize

            32KB

          • memory/32-41-0x00007FF9F68C0000-0x00007FF9F7381000-memory.dmp

            Filesize

            10.8MB

          • memory/32-42-0x000000001C280000-0x000000001C380000-memory.dmp

            Filesize

            1024KB

          • memory/32-52-0x000000001B630000-0x000000001B640000-memory.dmp

            Filesize

            64KB

          • memory/32-53-0x000000001C280000-0x000000001C380000-memory.dmp

            Filesize

            1024KB

          • memory/32-68-0x000000001B630000-0x000000001B640000-memory.dmp

            Filesize

            64KB

          • memory/32-83-0x000000001B630000-0x000000001B640000-memory.dmp

            Filesize

            64KB

          • memory/32-98-0x000000001B630000-0x000000001B640000-memory.dmp

            Filesize

            64KB

          • memory/32-3-0x0000000000D00000-0x0000000000D08000-memory.dmp

            Filesize

            32KB

          • memory/32-105-0x000000001B630000-0x000000001B640000-memory.dmp

            Filesize

            64KB

          • memory/32-107-0x00007FF9F68C0000-0x00007FF9F7381000-memory.dmp

            Filesize

            10.8MB

          • memory/32-2-0x000000001B630000-0x000000001B640000-memory.dmp

            Filesize

            64KB

          • memory/32-1-0x00007FF9F68C0000-0x00007FF9F7381000-memory.dmp

            Filesize

            10.8MB

          • memory/4528-111-0x00007FF9F68C0000-0x00007FF9F7381000-memory.dmp

            Filesize

            10.8MB

          • memory/4528-112-0x000000001BC90000-0x000000001BCA0000-memory.dmp

            Filesize

            64KB

          • memory/4528-113-0x000000001BC90000-0x000000001BCA0000-memory.dmp

            Filesize

            64KB

          • memory/4528-114-0x000000001BC90000-0x000000001BCA0000-memory.dmp

            Filesize

            64KB

          • memory/4528-116-0x00007FF9F68C0000-0x00007FF9F7381000-memory.dmp

            Filesize

            10.8MB