Analysis

  • max time kernel
    129s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2023 08:59

General

  • Target

    NEAS.deae068c77a6e63c6d74307f353e5e40.exe

  • Size

    784KB

  • MD5

    deae068c77a6e63c6d74307f353e5e40

  • SHA1

    cb740abd0c89cd3cb20356f6e5777f879372f906

  • SHA256

    c3b511d889528a52823649518bf1f0227f28c5d76f252bbaea8a3f31578f86a7

  • SHA512

    4c506b647042da604aa3f96a30538874218daf4960e4fb11048a7f4a7f998a020928fb2374e27073fe4bf5fd9be80bf0f3d218108bcb0a513467991057115166

  • SSDEEP

    12288:eqnO8YpD1oOJp+Ce1PSiG2jfIBoI5DyDwYMDxFesH0ioBw7oKk2:e+ORToOWSi5gBoS4wYUJ0eo2

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 8 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 3 IoCs
  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.deae068c77a6e63c6d74307f353e5e40.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.deae068c77a6e63c6d74307f353e5e40.exe"
    1⤵
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:4340
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\ProgramData\Package Cache\{F6080405-9FA8-4CAA-9982-14E95D1A3DAC}v14.30.30704\TextInputHost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2356
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\System32\dmcsps\backgroundTaskHost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2680
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\ProgramData\Packages\Microsoft.549981C3F5F10_8wekyb3d8bbwe\S-1-5-21-3125601242-331447593-1512828465-1000\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3560
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\PerfLogs\RuntimeBroker.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3776
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:464
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\System32\provplatformdesktop\taskhostw.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1992
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartUI\StartMenuExperienceHost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4920
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Documents and Settings\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Default\explorer.exe

    Filesize

    784KB

    MD5

    deae068c77a6e63c6d74307f353e5e40

    SHA1

    cb740abd0c89cd3cb20356f6e5777f879372f906

    SHA256

    c3b511d889528a52823649518bf1f0227f28c5d76f252bbaea8a3f31578f86a7

    SHA512

    4c506b647042da604aa3f96a30538874218daf4960e4fb11048a7f4a7f998a020928fb2374e27073fe4bf5fd9be80bf0f3d218108bcb0a513467991057115166

  • memory/4340-16-0x000000001B010000-0x000000001B018000-memory.dmp

    Filesize

    32KB

  • memory/4340-46-0x00007FFFAA610000-0x00007FFFAB0D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4340-15-0x000000001AFE0000-0x000000001AFE8000-memory.dmp

    Filesize

    32KB

  • memory/4340-4-0x0000000002440000-0x0000000002448000-memory.dmp

    Filesize

    32KB

  • memory/4340-5-0x0000000002450000-0x0000000002458000-memory.dmp

    Filesize

    32KB

  • memory/4340-6-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/4340-7-0x0000000002470000-0x0000000002478000-memory.dmp

    Filesize

    32KB

  • memory/4340-8-0x0000000002480000-0x000000000248C000-memory.dmp

    Filesize

    48KB

  • memory/4340-9-0x0000000002490000-0x000000000249A000-memory.dmp

    Filesize

    40KB

  • memory/4340-10-0x00000000024A0000-0x00000000024AA000-memory.dmp

    Filesize

    40KB

  • memory/4340-11-0x00000000024C0000-0x00000000024C8000-memory.dmp

    Filesize

    32KB

  • memory/4340-12-0x000000001AFB0000-0x000000001AFB8000-memory.dmp

    Filesize

    32KB

  • memory/4340-13-0x000000001AFC0000-0x000000001AFC8000-memory.dmp

    Filesize

    32KB

  • memory/4340-14-0x000000001AFD0000-0x000000001AFD8000-memory.dmp

    Filesize

    32KB

  • memory/4340-3-0x00007FFFAA610000-0x00007FFFAB0D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4340-17-0x000000001B020000-0x000000001B028000-memory.dmp

    Filesize

    32KB

  • memory/4340-2-0x000000001B000000-0x000000001B010000-memory.dmp

    Filesize

    64KB

  • memory/4340-18-0x000000001B640000-0x000000001B648000-memory.dmp

    Filesize

    32KB

  • memory/4340-19-0x000000001B250000-0x000000001B258000-memory.dmp

    Filesize

    32KB

  • memory/4340-20-0x000000001B260000-0x000000001B268000-memory.dmp

    Filesize

    32KB

  • memory/4340-21-0x000000001B000000-0x000000001B010000-memory.dmp

    Filesize

    64KB

  • memory/4340-22-0x000000001B2B0000-0x000000001B2B8000-memory.dmp

    Filesize

    32KB

  • memory/4340-23-0x000000001B2C0000-0x000000001B2CC000-memory.dmp

    Filesize

    48KB

  • memory/4340-24-0x000000001B000000-0x000000001B010000-memory.dmp

    Filesize

    64KB

  • memory/4340-25-0x00000000024B0000-0x00000000024B8000-memory.dmp

    Filesize

    32KB

  • memory/4340-28-0x000000001B000000-0x000000001B010000-memory.dmp

    Filesize

    64KB

  • memory/4340-29-0x000000001B000000-0x000000001B010000-memory.dmp

    Filesize

    64KB

  • memory/4340-30-0x000000001B000000-0x000000001B010000-memory.dmp

    Filesize

    64KB

  • memory/4340-31-0x000000001B000000-0x000000001B010000-memory.dmp

    Filesize

    64KB

  • memory/4340-1-0x00007FFFAA610000-0x00007FFFAB0D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4340-0-0x0000000000310000-0x00000000003DA000-memory.dmp

    Filesize

    808KB