Analysis

  • max time kernel
    122s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2023, 21:29

General

  • Target

    NEAS.b0b24b9c0205044ace0abbd64e44e980.exe

  • Size

    783KB

  • MD5

    b0b24b9c0205044ace0abbd64e44e980

  • SHA1

    0b20572786d013a427a99b2a2ba18fe5c4f439ed

  • SHA256

    9eef15774b4f1d89af295a873b25b6d13f5486deda3ec97986b5b8580d72c6eb

  • SHA512

    51f4c28b06c2ac76959ec8c702713a8ce6eb050eaa43215c070abdf8f90be17627e3a5c7d352ab1b3e73922d84a1d59419e716e05ebd4401112ed1f1cfc327c4

  • SSDEEP

    12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.b0b24b9c0205044ace0abbd64e44e980.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.b0b24b9c0205044ace0abbd64e44e980.exe"
    1⤵
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1768
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zseJ0CNy4U.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:320
        • C:\Recovery\24c32662-6fcd-11ee-ab95-d6a0c7caf0e4\csrss.exe
          "C:\Recovery\24c32662-6fcd-11ee-ab95-d6a0c7caf0e4\csrss.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:2976
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\TapiMigPlugin\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2616
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\24c32662-6fcd-11ee-ab95-d6a0c7caf0e4\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2168
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Documents and Settings\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2524
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\msshooks\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1212

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Recovery\24c32662-6fcd-11ee-ab95-d6a0c7caf0e4\csrss.exe

            Filesize

            783KB

            MD5

            b0b24b9c0205044ace0abbd64e44e980

            SHA1

            0b20572786d013a427a99b2a2ba18fe5c4f439ed

            SHA256

            9eef15774b4f1d89af295a873b25b6d13f5486deda3ec97986b5b8580d72c6eb

            SHA512

            51f4c28b06c2ac76959ec8c702713a8ce6eb050eaa43215c070abdf8f90be17627e3a5c7d352ab1b3e73922d84a1d59419e716e05ebd4401112ed1f1cfc327c4

          • C:\Recovery\24c32662-6fcd-11ee-ab95-d6a0c7caf0e4\csrss.exe

            Filesize

            783KB

            MD5

            b0b24b9c0205044ace0abbd64e44e980

            SHA1

            0b20572786d013a427a99b2a2ba18fe5c4f439ed

            SHA256

            9eef15774b4f1d89af295a873b25b6d13f5486deda3ec97986b5b8580d72c6eb

            SHA512

            51f4c28b06c2ac76959ec8c702713a8ce6eb050eaa43215c070abdf8f90be17627e3a5c7d352ab1b3e73922d84a1d59419e716e05ebd4401112ed1f1cfc327c4

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            6175873189503a566bdd33495bb5830a

            SHA1

            7ecbb6a5a31f124cfbdaa3d6088ee69a7e82ac95

            SHA256

            4e62b043ce29738498f19fb92566187f95416107429190f5ccde9da5b69ff243

            SHA512

            5bc65257464dad73002fdf8c234ead97843f597abd149d9d14c9cf5508a8f99624540a328fb6bd80578a92c628f5ae434a19886e9e85e23e0057d0260d9090ff

          • C:\Users\Admin\AppData\Local\Temp\CabC277.tmp

            Filesize

            61KB

            MD5

            f3441b8572aae8801c04f3060b550443

            SHA1

            4ef0a35436125d6821831ef36c28ffaf196cda15

            SHA256

            6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

            SHA512

            5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

          • C:\Users\Admin\AppData\Local\Temp\TarC2C8.tmp

            Filesize

            163KB

            MD5

            9441737383d21192400eca82fda910ec

            SHA1

            725e0d606a4fc9ba44aa8ffde65bed15e65367e4

            SHA256

            bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

            SHA512

            7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

          • C:\Users\Admin\AppData\Local\Temp\zseJ0CNy4U.bat

            Filesize

            222B

            MD5

            cf8eb1a50d9ed24958b7fe33f02f9834

            SHA1

            b24a2bd4378eb0873fa1f064a42ff296e4e18a73

            SHA256

            f0b835232b36b0dfe32c987982bfe5f2d1a4f1e726fca0c9f57c430eaa463cde

            SHA512

            c00263c1f5110dc0e1da972eb7194b37f4170d50c1b65a3f1167a3f49fa0ccb5e12bd858ca524b6fd4a11c81223faca60f317cf7d2940a680481ff2460cac7e0

          • C:\Windows\System32\TapiMigPlugin\winlogon.exe

            Filesize

            783KB

            MD5

            b0b24b9c0205044ace0abbd64e44e980

            SHA1

            0b20572786d013a427a99b2a2ba18fe5c4f439ed

            SHA256

            9eef15774b4f1d89af295a873b25b6d13f5486deda3ec97986b5b8580d72c6eb

            SHA512

            51f4c28b06c2ac76959ec8c702713a8ce6eb050eaa43215c070abdf8f90be17627e3a5c7d352ab1b3e73922d84a1d59419e716e05ebd4401112ed1f1cfc327c4

          • C:\Windows\System32\msshooks\csrss.exe

            Filesize

            783KB

            MD5

            0893b31226fed83048bb9d1d042e6630

            SHA1

            8697bd831fb0dfe272b6932bf1623308e35a941e

            SHA256

            114bbb94fac4858a41e47ff62b9a70f8340379984b81706d9b01f225ab19ebfd

            SHA512

            78a68edc3c5ddcf3f0e31c7a6640c724183b81196545c5934ed413d4426c8ba98b243d512ebecabe0ef96a1328d46863c43ee856388b68f0e15f86fc7d313fa1

          • memory/1768-11-0x00000000005F0000-0x00000000005F8000-memory.dmp

            Filesize

            32KB

          • memory/1768-50-0x00000000004D0000-0x0000000000550000-memory.dmp

            Filesize

            512KB

          • memory/1768-8-0x00000000005E0000-0x00000000005EA000-memory.dmp

            Filesize

            40KB

          • memory/1768-0-0x0000000000110000-0x00000000001DA000-memory.dmp

            Filesize

            808KB

          • memory/1768-12-0x0000000000610000-0x0000000000618000-memory.dmp

            Filesize

            32KB

          • memory/1768-13-0x0000000002110000-0x0000000002118000-memory.dmp

            Filesize

            32KB

          • memory/1768-14-0x00000000020E0000-0x00000000020E8000-memory.dmp

            Filesize

            32KB

          • memory/1768-15-0x000000001A6E0000-0x000000001A6E8000-memory.dmp

            Filesize

            32KB

          • memory/1768-16-0x00000000021A0000-0x00000000021A8000-memory.dmp

            Filesize

            32KB

          • memory/1768-17-0x000000001A710000-0x000000001A718000-memory.dmp

            Filesize

            32KB

          • memory/1768-18-0x000000001A700000-0x000000001A708000-memory.dmp

            Filesize

            32KB

          • memory/1768-20-0x000000001A6D0000-0x000000001A6D8000-memory.dmp

            Filesize

            32KB

          • memory/1768-19-0x00000000022B0000-0x00000000022B8000-memory.dmp

            Filesize

            32KB

          • memory/1768-21-0x00000000022C0000-0x00000000022CC000-memory.dmp

            Filesize

            48KB

          • memory/1768-22-0x00000000004D0000-0x0000000000550000-memory.dmp

            Filesize

            512KB

          • memory/1768-23-0x000000001A6F0000-0x000000001A6F8000-memory.dmp

            Filesize

            32KB

          • memory/1768-32-0x00000000004D0000-0x0000000000550000-memory.dmp

            Filesize

            512KB

          • memory/1768-36-0x00000000004D0000-0x0000000000550000-memory.dmp

            Filesize

            512KB

          • memory/1768-9-0x00000000020F0000-0x00000000020FA000-memory.dmp

            Filesize

            40KB

          • memory/1768-10-0x0000000002100000-0x0000000002108000-memory.dmp

            Filesize

            32KB

          • memory/1768-63-0x00000000004D0000-0x0000000000550000-memory.dmp

            Filesize

            512KB

          • memory/1768-64-0x000007FEF5D70000-0x000007FEF675C000-memory.dmp

            Filesize

            9.9MB

          • memory/1768-7-0x0000000000600000-0x000000000060C000-memory.dmp

            Filesize

            48KB

          • memory/1768-6-0x00000000005D0000-0x00000000005D8000-memory.dmp

            Filesize

            32KB

          • memory/1768-71-0x000007FEF5D70000-0x000007FEF675C000-memory.dmp

            Filesize

            9.9MB

          • memory/1768-4-0x00000000004B0000-0x00000000004B8000-memory.dmp

            Filesize

            32KB

          • memory/1768-5-0x00000000004C0000-0x00000000004D0000-memory.dmp

            Filesize

            64KB

          • memory/1768-1-0x000007FEF5D70000-0x000007FEF675C000-memory.dmp

            Filesize

            9.9MB

          • memory/1768-2-0x00000000004D0000-0x0000000000550000-memory.dmp

            Filesize

            512KB

          • memory/1768-3-0x00000000004A0000-0x00000000004A8000-memory.dmp

            Filesize

            32KB

          • memory/2976-77-0x000000001AFB0000-0x000000001B030000-memory.dmp

            Filesize

            512KB

          • memory/2976-78-0x000000001AFB0000-0x000000001B030000-memory.dmp

            Filesize

            512KB

          • memory/2976-76-0x000000001AFB0000-0x000000001B030000-memory.dmp

            Filesize

            512KB

          • memory/2976-75-0x0000000001370000-0x000000000143A000-memory.dmp

            Filesize

            808KB

          • memory/2976-74-0x000007FEF5380000-0x000007FEF5D6C000-memory.dmp

            Filesize

            9.9MB

          • memory/2976-140-0x000000001AFB0000-0x000000001B030000-memory.dmp

            Filesize

            512KB

          • memory/2976-159-0x000007FEF5380000-0x000007FEF5D6C000-memory.dmp

            Filesize

            9.9MB