Analysis

  • max time kernel
    122s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    22/10/2023, 17:25

General

  • Target

    NEAS.aaf95178efb97f6d4e0f58d7e6841f40.exe

  • Size

    783KB

  • MD5

    aaf95178efb97f6d4e0f58d7e6841f40

  • SHA1

    bf9705ab690b363ec7c85053bdcdef02b4621d86

  • SHA256

    a4284047b5ad4975355bf13b74b8919a0de2a3cc6166f4569ef42662f40ae2d1

  • SHA512

    70bb3d92c0a4e74e3ef330bca053fe658f9d56bc323b3a9d5f326f7e3f0d29fdea3f9b6e91d1a9a20693807c760ede297b87d034030d14dc2784407ea0270b88

  • SSDEEP

    12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 8 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.aaf95178efb97f6d4e0f58d7e6841f40.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.aaf95178efb97f6d4e0f58d7e6841f40.exe"
    1⤵
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2516
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5hNgkZOXUr.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1072
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2296
        • C:\Windows\twunk_32\explorer.exe
          "C:\Windows\twunk_32\explorer.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:2396
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\System32\gpupdate\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2612
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2656
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\twunk_32\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2864
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\PerfLogs\Admin\audiodg.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2592
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\System32\dhcpcore\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2484
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Documents and Settings\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2008
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\korwbrkr\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2000
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\schemas\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1992

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5ae3dd2f52f6b464823477d41e31d0a3

      SHA1

      68caf07b0aefa6f33beb81dba8a2cbcb3d21e12a

      SHA256

      1f56437c33269cf75227272a1090d01a087d64601083a153d7a43e57d769c70c

      SHA512

      c999f6d8b10aa2b9804f7b1d852f392736e05a4472de2dfe267c9f690d93cd0ab46e50d228d9db5370fae7905647e428484f9f32f7cd84a1d23a4c4142587a37

    • C:\Users\Admin\AppData\Local\Temp\5hNgkZOXUr.bat

      Filesize

      196B

      MD5

      75187541a399cbd8b107461863bae3aa

      SHA1

      1ff36f31f3fad11cd615485506f44e45bfb64c3b

      SHA256

      a37dda54084c28e9f5e9fe9eff1810410252cf533188ca81bbafc40b8dd1d1f7

      SHA512

      ed91364307d4cf2111fdc5bca70926397468a74e00ad0b2aaedbcdec7309713b7d3ca6e61b823e36de6751ee6217754e70fd6cd8cfbf48f26f379036d4ac4bc8

    • C:\Users\Admin\AppData\Local\Temp\Cab3F05.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Tar3F85.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Windows\System32\dhcpcore\sppsvc.exe

      Filesize

      783KB

      MD5

      aaf95178efb97f6d4e0f58d7e6841f40

      SHA1

      bf9705ab690b363ec7c85053bdcdef02b4621d86

      SHA256

      a4284047b5ad4975355bf13b74b8919a0de2a3cc6166f4569ef42662f40ae2d1

      SHA512

      70bb3d92c0a4e74e3ef330bca053fe658f9d56bc323b3a9d5f326f7e3f0d29fdea3f9b6e91d1a9a20693807c760ede297b87d034030d14dc2784407ea0270b88

    • C:\Windows\twunk_32\explorer.exe

      Filesize

      783KB

      MD5

      aaf95178efb97f6d4e0f58d7e6841f40

      SHA1

      bf9705ab690b363ec7c85053bdcdef02b4621d86

      SHA256

      a4284047b5ad4975355bf13b74b8919a0de2a3cc6166f4569ef42662f40ae2d1

      SHA512

      70bb3d92c0a4e74e3ef330bca053fe658f9d56bc323b3a9d5f326f7e3f0d29fdea3f9b6e91d1a9a20693807c760ede297b87d034030d14dc2784407ea0270b88

    • C:\Windows\twunk_32\explorer.exe

      Filesize

      783KB

      MD5

      aaf95178efb97f6d4e0f58d7e6841f40

      SHA1

      bf9705ab690b363ec7c85053bdcdef02b4621d86

      SHA256

      a4284047b5ad4975355bf13b74b8919a0de2a3cc6166f4569ef42662f40ae2d1

      SHA512

      70bb3d92c0a4e74e3ef330bca053fe658f9d56bc323b3a9d5f326f7e3f0d29fdea3f9b6e91d1a9a20693807c760ede297b87d034030d14dc2784407ea0270b88

    • memory/2396-202-0x000000001AFB0000-0x000000001B030000-memory.dmp

      Filesize

      512KB

    • memory/2396-221-0x000007FEF4E30000-0x000007FEF581C000-memory.dmp

      Filesize

      9.9MB

    • memory/2396-137-0x0000000001250000-0x000000000131A000-memory.dmp

      Filesize

      808KB

    • memory/2396-140-0x000000001AFB0000-0x000000001B030000-memory.dmp

      Filesize

      512KB

    • memory/2396-139-0x000000001AFB0000-0x000000001B030000-memory.dmp

      Filesize

      512KB

    • memory/2396-138-0x000007FEF4E30000-0x000007FEF581C000-memory.dmp

      Filesize

      9.9MB

    • memory/2516-31-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-36-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-10-0x0000000000530000-0x0000000000538000-memory.dmp

      Filesize

      32KB

    • memory/2516-11-0x00000000004E0000-0x00000000004E8000-memory.dmp

      Filesize

      32KB

    • memory/2516-12-0x0000000000560000-0x0000000000568000-memory.dmp

      Filesize

      32KB

    • memory/2516-13-0x00000000004F0000-0x00000000004F8000-memory.dmp

      Filesize

      32KB

    • memory/2516-14-0x0000000000520000-0x0000000000528000-memory.dmp

      Filesize

      32KB

    • memory/2516-16-0x0000000000590000-0x0000000000598000-memory.dmp

      Filesize

      32KB

    • memory/2516-15-0x0000000000580000-0x0000000000588000-memory.dmp

      Filesize

      32KB

    • memory/2516-17-0x00000000005A0000-0x00000000005A8000-memory.dmp

      Filesize

      32KB

    • memory/2516-18-0x00000000005C0000-0x00000000005C8000-memory.dmp

      Filesize

      32KB

    • memory/2516-19-0x0000000000570000-0x0000000000578000-memory.dmp

      Filesize

      32KB

    • memory/2516-20-0x00000000005D0000-0x00000000005D8000-memory.dmp

      Filesize

      32KB

    • memory/2516-21-0x00000000005B0000-0x00000000005BC000-memory.dmp

      Filesize

      48KB

    • memory/2516-22-0x00000000005E0000-0x00000000005E8000-memory.dmp

      Filesize

      32KB

    • memory/2516-23-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-24-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-25-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-26-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-27-0x000007FEF5820000-0x000007FEF620C000-memory.dmp

      Filesize

      9.9MB

    • memory/2516-28-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-8-0x0000000000500000-0x000000000050A000-memory.dmp

      Filesize

      40KB

    • memory/2516-32-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-33-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-34-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-35-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-37-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-9-0x0000000000540000-0x000000000054A000-memory.dmp

      Filesize

      40KB

    • memory/2516-38-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-39-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-40-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-41-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-42-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-43-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-44-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-45-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-46-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-47-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-48-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-53-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-54-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-65-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-75-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-103-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-118-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-7-0x0000000000510000-0x000000000051C000-memory.dmp

      Filesize

      48KB

    • memory/2516-4-0x00000000004B0000-0x00000000004B8000-memory.dmp

      Filesize

      32KB

    • memory/2516-6-0x00000000004D0000-0x00000000004D8000-memory.dmp

      Filesize

      32KB

    • memory/2516-5-0x00000000004C0000-0x00000000004D0000-memory.dmp

      Filesize

      64KB

    • memory/2516-3-0x0000000000390000-0x0000000000398000-memory.dmp

      Filesize

      32KB

    • memory/2516-2-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-1-0x0000000000010000-0x00000000000DA000-memory.dmp

      Filesize

      808KB

    • memory/2516-0-0x000007FEF5820000-0x000007FEF620C000-memory.dmp

      Filesize

      9.9MB

    • memory/2516-131-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-133-0x000000001AFA0000-0x000000001B020000-memory.dmp

      Filesize

      512KB

    • memory/2516-134-0x000007FEF5820000-0x000007FEF620C000-memory.dmp

      Filesize

      9.9MB