Analysis
-
max time kernel
138s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
16/10/2023, 13:25
Behavioral task
behavioral1
Sample
NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe
-
Size
783KB
-
MD5
09865be06746b9f8fb0b61ebe069f310
-
SHA1
0e280ed0938a153affaf8b11137babf42b88aa46
-
SHA256
aafe3c3d07cf40de94893484d76ab998678475ff0e65abdd416ec67ef2888351
-
SHA512
f8f40a1b737bcb009e6ed06e1888b886132845efceec8667481da709181b9696ebe72c456161ccca53630c8e3de80f54f128e38607001d2c16d01de90656321f
-
SSDEEP
12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 7 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4328 4660 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4344 4660 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1620 4660 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2844 4660 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1008 4660 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5000 4660 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2928 4660 schtasks.exe 82 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sysmon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" sysmon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" sysmon.exe -
resource yara_rule behavioral2/memory/32-0-0x0000000000590000-0x000000000065A000-memory.dmp dcrat behavioral2/files/0x000600000002327f-35.dat dcrat behavioral2/files/0x0006000000023274-109.dat dcrat behavioral2/files/0x0006000000023274-110.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 4528 sysmon.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\C_20833\\RuntimeBroker.exe\"" NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Recovery\\WindowsRE\\SppExtComObj.exe\"" NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\PerfLogs\\fontdrvhost.exe\"" NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\odt\\SearchApp.exe\"" NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Documents and Settings\\TextInputHost.exe\"" NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\System32\\DeviceCenter\\winlogon.exe\"" NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Program Files (x86)\\Windows Defender\\de-DE\\sysmon.exe\"" NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sysmon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sysmon.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\System32\DeviceCenter\winlogon.exe NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe File opened for modification C:\Windows\System32\DeviceCenter\winlogon.exe NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe File created C:\Windows\System32\DeviceCenter\cc11b995f2a76da408ea6a601e682e64743153ad NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe File created C:\Windows\System32\C_20833\RuntimeBroker.exe NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe File created C:\Windows\System32\C_20833\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe File opened for modification C:\Windows\System32\DeviceCenter\RCXE11A.tmp NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe File opened for modification C:\Windows\System32\C_20833\RCXE571.tmp NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe File opened for modification C:\Windows\System32\C_20833\RuntimeBroker.exe NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\de-DE\sysmon.exe NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe File created C:\Program Files (x86)\Windows Defender\de-DE\121e5b5079f7c0e46d90f99b3864022518bbbda9 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\RCXE33E.tmp NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\sysmon.exe NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2928 schtasks.exe 4328 schtasks.exe 4344 schtasks.exe 1620 schtasks.exe 2844 schtasks.exe 1008 schtasks.exe 5000 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 4528 sysmon.exe 4528 sysmon.exe 4528 sysmon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe Token: SeDebugPrivilege 4528 sysmon.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 32 wrote to memory of 3060 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 95 PID 32 wrote to memory of 3060 32 NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe 95 PID 3060 wrote to memory of 1504 3060 cmd.exe 97 PID 3060 wrote to memory of 1504 3060 cmd.exe 97 PID 3060 wrote to memory of 4528 3060 cmd.exe 101 PID 3060 wrote to memory of 4528 3060 cmd.exe 101 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" sysmon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" sysmon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sysmon.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.09865be06746b9f8fb0b61ebe069f310_JC.exe"1⤵
- UAC bypass
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:32 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HncZTqxPlS.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1504
-
-
C:\Program Files (x86)\Windows Defender\de-DE\sysmon.exe"C:\Program Files (x86)\Windows Defender\de-DE\sysmon.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4528
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\DeviceCenter\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\de-DE\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\C_20833\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\PerfLogs\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\odt\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Documents and Settings\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2928
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
783KB
MD509865be06746b9f8fb0b61ebe069f310
SHA10e280ed0938a153affaf8b11137babf42b88aa46
SHA256aafe3c3d07cf40de94893484d76ab998678475ff0e65abdd416ec67ef2888351
SHA512f8f40a1b737bcb009e6ed06e1888b886132845efceec8667481da709181b9696ebe72c456161ccca53630c8e3de80f54f128e38607001d2c16d01de90656321f
-
Filesize
783KB
MD509865be06746b9f8fb0b61ebe069f310
SHA10e280ed0938a153affaf8b11137babf42b88aa46
SHA256aafe3c3d07cf40de94893484d76ab998678475ff0e65abdd416ec67ef2888351
SHA512f8f40a1b737bcb009e6ed06e1888b886132845efceec8667481da709181b9696ebe72c456161ccca53630c8e3de80f54f128e38607001d2c16d01de90656321f
-
Filesize
783KB
MD509865be06746b9f8fb0b61ebe069f310
SHA10e280ed0938a153affaf8b11137babf42b88aa46
SHA256aafe3c3d07cf40de94893484d76ab998678475ff0e65abdd416ec67ef2888351
SHA512f8f40a1b737bcb009e6ed06e1888b886132845efceec8667481da709181b9696ebe72c456161ccca53630c8e3de80f54f128e38607001d2c16d01de90656321f
-
Filesize
220B
MD5ea9a6ec700a3949da5b419f6137ad200
SHA1b29c95d1f9c3208dabda6197d73e85cede8e34a1
SHA2561ad5d76b0a1049fc2211d54b917e21e04a679b33c4235648c552095803e06da2
SHA512285c8ee90c85d9b979c5c65a27fc12a3201350fbedb5834c2e8de1e84fe4aff01c21ccc0fb7b827e9e5d26a539d6c93fac60fea43c76f01bfcfe0920aa47da48