Analysis

  • max time kernel
    118s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    16/10/2023, 14:41

General

  • Target

    NEAS.11d6778a8b7ee9220116e8324b208f20_JC.exe

  • Size

    783KB

  • MD5

    11d6778a8b7ee9220116e8324b208f20

  • SHA1

    cd33ebf6014c4187abd313c56f197a65cc59de2b

  • SHA256

    8ca7610b8cfb28281fa3bfacbd64752209c98d1228447434dfbee9ba01574c38

  • SHA512

    06a8c014d182c4404b5e3b8b057e393a85b6d70130f622d2b26374f91c391109db8ad48a24285e23ad2c99364d3eeb755ababc5afe4eb9c2f284b2bdf70c8130

  • SSDEEP

    12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 5 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.11d6778a8b7ee9220116e8324b208f20_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.11d6778a8b7ee9220116e8324b208f20_JC.exe"
    1⤵
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2060
    • C:\Windows\System32\nsisvc\winlogon.exe
      "C:\Windows\System32\nsisvc\winlogon.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:2796
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\nsisvc\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2804
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\VAN\wininit.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2708
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\NlsLexicons000a\spoolsv.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2568
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\ieui\lsm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2580
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Documents and Settings\explorer.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dadcfd24feca016ff9d5afa962198ba5

    SHA1

    a4fb56b8f05f2295b66bdf8de9470e4e909e04c7

    SHA256

    93b754440b6ce90b78001ed29b12688e7b2fe0b9e126929620613005bd97dbac

    SHA512

    f2a23e91735c97d31c86a61af029063ed754c9e4de1776650a0f8261fd26622574e1a57f3eff834da6498f638ef63b10dc7689f8d3f30244cb8541cc215c6a01

  • C:\Users\Admin\AppData\Local\Temp\CabDBC1.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarDC8E.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\explorer.exe

    Filesize

    783KB

    MD5

    11d6778a8b7ee9220116e8324b208f20

    SHA1

    cd33ebf6014c4187abd313c56f197a65cc59de2b

    SHA256

    8ca7610b8cfb28281fa3bfacbd64752209c98d1228447434dfbee9ba01574c38

    SHA512

    06a8c014d182c4404b5e3b8b057e393a85b6d70130f622d2b26374f91c391109db8ad48a24285e23ad2c99364d3eeb755ababc5afe4eb9c2f284b2bdf70c8130

  • C:\Windows\System32\nsisvc\winlogon.exe

    Filesize

    783KB

    MD5

    11d6778a8b7ee9220116e8324b208f20

    SHA1

    cd33ebf6014c4187abd313c56f197a65cc59de2b

    SHA256

    8ca7610b8cfb28281fa3bfacbd64752209c98d1228447434dfbee9ba01574c38

    SHA512

    06a8c014d182c4404b5e3b8b057e393a85b6d70130f622d2b26374f91c391109db8ad48a24285e23ad2c99364d3eeb755ababc5afe4eb9c2f284b2bdf70c8130

  • C:\Windows\System32\nsisvc\winlogon.exe

    Filesize

    783KB

    MD5

    11d6778a8b7ee9220116e8324b208f20

    SHA1

    cd33ebf6014c4187abd313c56f197a65cc59de2b

    SHA256

    8ca7610b8cfb28281fa3bfacbd64752209c98d1228447434dfbee9ba01574c38

    SHA512

    06a8c014d182c4404b5e3b8b057e393a85b6d70130f622d2b26374f91c391109db8ad48a24285e23ad2c99364d3eeb755ababc5afe4eb9c2f284b2bdf70c8130

  • memory/2060-34-0x000000001AED0000-0x000000001AF50000-memory.dmp

    Filesize

    512KB

  • memory/2060-19-0x0000000000660000-0x0000000000668000-memory.dmp

    Filesize

    32KB

  • memory/2060-4-0x0000000000260000-0x0000000000268000-memory.dmp

    Filesize

    32KB

  • memory/2060-5-0x0000000000270000-0x0000000000280000-memory.dmp

    Filesize

    64KB

  • memory/2060-6-0x0000000000280000-0x0000000000288000-memory.dmp

    Filesize

    32KB

  • memory/2060-7-0x0000000000430000-0x000000000043C000-memory.dmp

    Filesize

    48KB

  • memory/2060-8-0x0000000000440000-0x000000000044A000-memory.dmp

    Filesize

    40KB

  • memory/2060-9-0x0000000000420000-0x000000000042A000-memory.dmp

    Filesize

    40KB

  • memory/2060-15-0x0000000000630000-0x0000000000638000-memory.dmp

    Filesize

    32KB

  • memory/2060-14-0x0000000000500000-0x0000000000508000-memory.dmp

    Filesize

    32KB

  • memory/2060-13-0x0000000000460000-0x0000000000468000-memory.dmp

    Filesize

    32KB

  • memory/2060-12-0x0000000000470000-0x0000000000478000-memory.dmp

    Filesize

    32KB

  • memory/2060-11-0x0000000000450000-0x0000000000458000-memory.dmp

    Filesize

    32KB

  • memory/2060-10-0x0000000000290000-0x0000000000298000-memory.dmp

    Filesize

    32KB

  • memory/2060-16-0x0000000000640000-0x0000000000648000-memory.dmp

    Filesize

    32KB

  • memory/2060-17-0x0000000000650000-0x0000000000658000-memory.dmp

    Filesize

    32KB

  • memory/2060-18-0x0000000000B10000-0x0000000000B18000-memory.dmp

    Filesize

    32KB

  • memory/2060-54-0x000000001AED0000-0x000000001AF50000-memory.dmp

    Filesize

    512KB

  • memory/2060-20-0x0000000000B40000-0x0000000000B48000-memory.dmp

    Filesize

    32KB

  • memory/2060-21-0x0000000000B30000-0x0000000000B3C000-memory.dmp

    Filesize

    48KB

  • memory/2060-22-0x0000000000620000-0x0000000000628000-memory.dmp

    Filesize

    32KB

  • memory/2060-25-0x000000001AED0000-0x000000001AF50000-memory.dmp

    Filesize

    512KB

  • memory/2060-2-0x000000001AED0000-0x000000001AF50000-memory.dmp

    Filesize

    512KB

  • memory/2060-35-0x000000001AED0000-0x000000001AF50000-memory.dmp

    Filesize

    512KB

  • memory/2060-3-0x0000000000250000-0x0000000000258000-memory.dmp

    Filesize

    32KB

  • memory/2060-39-0x000000001AED0000-0x000000001AF50000-memory.dmp

    Filesize

    512KB

  • memory/2060-0-0x0000000001340000-0x000000000140A000-memory.dmp

    Filesize

    808KB

  • memory/2060-69-0x000000001AED0000-0x000000001AF50000-memory.dmp

    Filesize

    512KB

  • memory/2060-76-0x000000001AED0000-0x000000001AF50000-memory.dmp

    Filesize

    512KB

  • memory/2060-77-0x000000001AED0000-0x000000001AF50000-memory.dmp

    Filesize

    512KB

  • memory/2060-86-0x000000001AED0000-0x000000001AF50000-memory.dmp

    Filesize

    512KB

  • memory/2060-89-0x000007FEF5600000-0x000007FEF5FEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2060-1-0x000007FEF5600000-0x000007FEF5FEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2060-53-0x000007FEF5600000-0x000007FEF5FEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2796-100-0x000000001B120000-0x000000001B1A0000-memory.dmp

    Filesize

    512KB

  • memory/2796-88-0x000000001B120000-0x000000001B1A0000-memory.dmp

    Filesize

    512KB

  • memory/2796-92-0x000000001B120000-0x000000001B1A0000-memory.dmp

    Filesize

    512KB

  • memory/2796-93-0x000000001B120000-0x000000001B1A0000-memory.dmp

    Filesize

    512KB

  • memory/2796-94-0x000000001B120000-0x000000001B1A0000-memory.dmp

    Filesize

    512KB

  • memory/2796-95-0x000007FEF5600000-0x000007FEF5FEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2796-96-0x000000001B120000-0x000000001B1A0000-memory.dmp

    Filesize

    512KB

  • memory/2796-97-0x000000001B120000-0x000000001B1A0000-memory.dmp

    Filesize

    512KB

  • memory/2796-98-0x000000001B120000-0x000000001B1A0000-memory.dmp

    Filesize

    512KB

  • memory/2796-99-0x000000001B120000-0x000000001B1A0000-memory.dmp

    Filesize

    512KB

  • memory/2796-87-0x000007FEF5600000-0x000007FEF5FEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2796-101-0x000000001B120000-0x000000001B1A0000-memory.dmp

    Filesize

    512KB

  • memory/2796-85-0x0000000000380000-0x000000000044A000-memory.dmp

    Filesize

    808KB

  • memory/2796-91-0x000000001B120000-0x000000001B1A0000-memory.dmp

    Filesize

    512KB

  • memory/2796-102-0x000000001B120000-0x000000001B1A0000-memory.dmp

    Filesize

    512KB

  • memory/2796-164-0x000000001B120000-0x000000001B1A0000-memory.dmp

    Filesize

    512KB

  • memory/2796-183-0x000007FEF5600000-0x000007FEF5FEC000-memory.dmp

    Filesize

    9.9MB