Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2023 08:59

General

  • Target

    NEAS.deae068c77a6e63c6d74307f353e5e40.exe

  • Size

    784KB

  • MD5

    deae068c77a6e63c6d74307f353e5e40

  • SHA1

    cb740abd0c89cd3cb20356f6e5777f879372f906

  • SHA256

    c3b511d889528a52823649518bf1f0227f28c5d76f252bbaea8a3f31578f86a7

  • SHA512

    4c506b647042da604aa3f96a30538874218daf4960e4fb11048a7f4a7f998a020928fb2374e27073fe4bf5fd9be80bf0f3d218108bcb0a513467991057115166

  • SSDEEP

    12288:eqnO8YpD1oOJp+Ce1PSiG2jfIBoI5DyDwYMDxFesH0ioBw7oKk2:e+ORToOWSi5gBoS4wYUJ0eo2

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 9 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 20 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.deae068c77a6e63c6d74307f353e5e40.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.deae068c77a6e63c6d74307f353e5e40.exe"
    1⤵
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:628
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BQr0H05ZpU.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2384
        • C:\Windows\System32\shrpubw\winlogon.exe
          "C:\Windows\System32\shrpubw\winlogon.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:2676
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "NEAS.deae068c77a6e63c6d74307f353e5e40" /sc ONLOGON /tr "'C:\Program Files\Google\NEAS.deae068c77a6e63c6d74307f353e5e40.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2996
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\Bubbles\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2692
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\d10510a2-6fc3-11ee-bc6f-a02387f916ed\wininit.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2612
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\shrpubw\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2140
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\d10510a2-6fc3-11ee-bc6f-a02387f916ed\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2564
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\System32\perfh00A\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2932
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\perfc011\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2960
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Admin\Links\lsass.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1960
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\wscapi\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2004

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\d10510a2-6fc3-11ee-bc6f-a02387f916ed\explorer.exe

      Filesize

      784KB

      MD5

      deae068c77a6e63c6d74307f353e5e40

      SHA1

      cb740abd0c89cd3cb20356f6e5777f879372f906

      SHA256

      c3b511d889528a52823649518bf1f0227f28c5d76f252bbaea8a3f31578f86a7

      SHA512

      4c506b647042da604aa3f96a30538874218daf4960e4fb11048a7f4a7f998a020928fb2374e27073fe4bf5fd9be80bf0f3d218108bcb0a513467991057115166

    • C:\Users\Admin\AppData\Local\Temp\BQr0H05ZpU.bat

      Filesize

      204B

      MD5

      bacafb167684e4bec91d333a715961a5

      SHA1

      f3df1aa857cdef2c75689a17f469e7dc6edbada0

      SHA256

      3101bea462b0750db6dc248300d8f94de1200c50fbba0ab46131345c810a2ce9

      SHA512

      7b1d783268d1fcde56dcd7bb71bb500b0ecb84f7288f92362800053d502f1307c12d021b921c7d3af70d48b5952d4da5bcc04f7461a5c1c2567df29e6f31e526

    • C:\Users\Admin\AppData\Local\Temp\Cab82A9.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\TarB234.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Windows\System32\shrpubw\winlogon.exe

      Filesize

      784KB

      MD5

      9c621d7dedc11c8e6758b2904a7e5386

      SHA1

      e21e2d468c337ccd7f5465b985b7d67f303c0cd6

      SHA256

      22ae46d71a4e7331d943f49b9e30a04321fb05d895a025439496ed5113a90233

      SHA512

      b58b88debfd722b6a7cf216e8e16e827f3f6deacec38dbfa3a21dfb5e9e6d657a83e881a19b75ecf6d2ab680b38799c3a53547c86863698f176e81202098cf6a

    • C:\Windows\System32\shrpubw\winlogon.exe

      Filesize

      784KB

      MD5

      9c621d7dedc11c8e6758b2904a7e5386

      SHA1

      e21e2d468c337ccd7f5465b985b7d67f303c0cd6

      SHA256

      22ae46d71a4e7331d943f49b9e30a04321fb05d895a025439496ed5113a90233

      SHA512

      b58b88debfd722b6a7cf216e8e16e827f3f6deacec38dbfa3a21dfb5e9e6d657a83e881a19b75ecf6d2ab680b38799c3a53547c86863698f176e81202098cf6a

    • memory/628-76-0x000000001B180000-0x000000001B200000-memory.dmp

      Filesize

      512KB

    • memory/628-11-0x0000000000AD0000-0x0000000000AD8000-memory.dmp

      Filesize

      32KB

    • memory/628-3-0x00000000001C0000-0x00000000001C8000-memory.dmp

      Filesize

      32KB

    • memory/628-4-0x00000000001D0000-0x00000000001D8000-memory.dmp

      Filesize

      32KB

    • memory/628-5-0x00000000001E0000-0x00000000001F0000-memory.dmp

      Filesize

      64KB

    • memory/628-6-0x0000000000200000-0x0000000000208000-memory.dmp

      Filesize

      32KB

    • memory/628-7-0x0000000000AE0000-0x0000000000AEC000-memory.dmp

      Filesize

      48KB

    • memory/628-8-0x0000000000680000-0x000000000068A000-memory.dmp

      Filesize

      40KB

    • memory/628-9-0x0000000000670000-0x000000000067A000-memory.dmp

      Filesize

      40KB

    • memory/628-10-0x0000000002020000-0x0000000002028000-memory.dmp

      Filesize

      32KB

    • memory/628-107-0x000000001B180000-0x000000001B200000-memory.dmp

      Filesize

      512KB

    • memory/628-12-0x0000000000B00000-0x0000000000B08000-memory.dmp

      Filesize

      32KB

    • memory/628-13-0x0000000002270000-0x0000000002278000-memory.dmp

      Filesize

      32KB

    • memory/628-14-0x0000000000AC0000-0x0000000000AC8000-memory.dmp

      Filesize

      32KB

    • memory/628-17-0x0000000000AF0000-0x0000000000AF8000-memory.dmp

      Filesize

      32KB

    • memory/628-16-0x0000000002000000-0x0000000002008000-memory.dmp

      Filesize

      32KB

    • memory/628-15-0x0000000000B10000-0x0000000000B18000-memory.dmp

      Filesize

      32KB

    • memory/628-18-0x0000000000B20000-0x0000000000B28000-memory.dmp

      Filesize

      32KB

    • memory/628-19-0x0000000002060000-0x0000000002068000-memory.dmp

      Filesize

      32KB

    • memory/628-20-0x0000000002080000-0x0000000002088000-memory.dmp

      Filesize

      32KB

    • memory/628-21-0x0000000002010000-0x000000000201C000-memory.dmp

      Filesize

      48KB

    • memory/628-22-0x0000000002030000-0x0000000002038000-memory.dmp

      Filesize

      32KB

    • memory/628-23-0x000000001B180000-0x000000001B200000-memory.dmp

      Filesize

      512KB

    • memory/628-42-0x000000001B180000-0x000000001B200000-memory.dmp

      Filesize

      512KB

    • memory/628-43-0x000000001B180000-0x000000001B200000-memory.dmp

      Filesize

      512KB

    • memory/628-49-0x000000001B180000-0x000000001B200000-memory.dmp

      Filesize

      512KB

    • memory/628-61-0x000000001B180000-0x000000001B200000-memory.dmp

      Filesize

      512KB

    • memory/628-75-0x000007FEF54D0000-0x000007FEF5EBC000-memory.dmp

      Filesize

      9.9MB

    • memory/628-1-0x000007FEF54D0000-0x000007FEF5EBC000-memory.dmp

      Filesize

      9.9MB

    • memory/628-91-0x000000001B180000-0x000000001B200000-memory.dmp

      Filesize

      512KB

    • memory/628-0-0x0000000000B30000-0x0000000000BFA000-memory.dmp

      Filesize

      808KB

    • memory/628-105-0x000000001B180000-0x000000001B200000-memory.dmp

      Filesize

      512KB

    • memory/628-2-0x000000001B180000-0x000000001B200000-memory.dmp

      Filesize

      512KB

    • memory/628-119-0x000000001B180000-0x000000001B200000-memory.dmp

      Filesize

      512KB

    • memory/628-121-0x000000001B180000-0x000000001B200000-memory.dmp

      Filesize

      512KB

    • memory/628-123-0x000007FEF54D0000-0x000007FEF5EBC000-memory.dmp

      Filesize

      9.9MB

    • memory/628-106-0x000000001B180000-0x000000001B200000-memory.dmp

      Filesize

      512KB

    • memory/2676-167-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-156-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-127-0x000007FEF4AE0000-0x000007FEF54CC000-memory.dmp

      Filesize

      9.9MB

    • memory/2676-130-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-149-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-150-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-151-0x000007FEF4AE0000-0x000007FEF54CC000-memory.dmp

      Filesize

      9.9MB

    • memory/2676-152-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-153-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-154-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-155-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-191-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-129-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-128-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-166-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-160-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-161-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-158-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-163-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-164-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-165-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-159-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-126-0x00000000000F0000-0x00000000001BA000-memory.dmp

      Filesize

      808KB

    • memory/2676-168-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-157-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-187-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB

    • memory/2676-162-0x000000001B060000-0x000000001B0E0000-memory.dmp

      Filesize

      512KB