Analysis
-
max time kernel
129s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2023 08:59
Behavioral task
behavioral1
Sample
NEAS.deae068c77a6e63c6d74307f353e5e40.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.deae068c77a6e63c6d74307f353e5e40.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.deae068c77a6e63c6d74307f353e5e40.exe
-
Size
784KB
-
MD5
deae068c77a6e63c6d74307f353e5e40
-
SHA1
cb740abd0c89cd3cb20356f6e5777f879372f906
-
SHA256
c3b511d889528a52823649518bf1f0227f28c5d76f252bbaea8a3f31578f86a7
-
SHA512
4c506b647042da604aa3f96a30538874218daf4960e4fb11048a7f4a7f998a020928fb2374e27073fe4bf5fd9be80bf0f3d218108bcb0a513467991057115166
-
SSDEEP
12288:eqnO8YpD1oOJp+Ce1PSiG2jfIBoI5DyDwYMDxFesH0ioBw7oKk2:e+ORToOWSi5gBoS4wYUJ0eo2
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 8 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2356 4716 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2680 4716 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3560 4716 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3776 4716 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 464 4716 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 4716 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4920 4716 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3580 4716 schtasks.exe 91 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" NEAS.deae068c77a6e63c6d74307f353e5e40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" NEAS.deae068c77a6e63c6d74307f353e5e40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.deae068c77a6e63c6d74307f353e5e40.exe -
resource yara_rule behavioral2/memory/4340-0-0x0000000000310000-0x00000000003DA000-memory.dmp dcrat behavioral2/files/0x0006000000022cf6-38.dat dcrat -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Windows\\System32\\provplatformdesktop\\taskhostw.exe\"" NEAS.deae068c77a6e63c6d74307f353e5e40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\\StartUI\\StartMenuExperienceHost.exe\"" NEAS.deae068c77a6e63c6d74307f353e5e40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Documents and Settings\\csrss.exe\"" NEAS.deae068c77a6e63c6d74307f353e5e40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\ProgramData\\Package Cache\\{F6080405-9FA8-4CAA-9982-14E95D1A3DAC}v14.30.30704\\TextInputHost.exe\"" NEAS.deae068c77a6e63c6d74307f353e5e40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Windows\\System32\\dmcsps\\backgroundTaskHost.exe\"" NEAS.deae068c77a6e63c6d74307f353e5e40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\ProgramData\\Packages\\Microsoft.549981C3F5F10_8wekyb3d8bbwe\\S-1-5-21-3125601242-331447593-1512828465-1000\\dllhost.exe\"" NEAS.deae068c77a6e63c6d74307f353e5e40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\PerfLogs\\RuntimeBroker.exe\"" NEAS.deae068c77a6e63c6d74307f353e5e40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Users\\Default User\\explorer.exe\"" NEAS.deae068c77a6e63c6d74307f353e5e40.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.deae068c77a6e63c6d74307f353e5e40.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NEAS.deae068c77a6e63c6d74307f353e5e40.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\System32\dmcsps\backgroundTaskHost.exe NEAS.deae068c77a6e63c6d74307f353e5e40.exe File created C:\Windows\System32\dmcsps\eddb19405b7ce1152b3e19997f2b467f0b72b3d3 NEAS.deae068c77a6e63c6d74307f353e5e40.exe File created C:\Windows\System32\provplatformdesktop\taskhostw.exe NEAS.deae068c77a6e63c6d74307f353e5e40.exe File created C:\Windows\System32\provplatformdesktop\ea9f0e6c9e2dcd4dfacdaf29ba21541fb815a988 NEAS.deae068c77a6e63c6d74307f353e5e40.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartUI\55b276f4edf653fe07efe8f1ecc32d3d195abd16 NEAS.deae068c77a6e63c6d74307f353e5e40.exe File created C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartUI\StartMenuExperienceHost.exe NEAS.deae068c77a6e63c6d74307f353e5e40.exe -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 464 schtasks.exe 1992 schtasks.exe 4920 schtasks.exe 3580 schtasks.exe 2356 schtasks.exe 2680 schtasks.exe 3560 schtasks.exe 3776 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4340 NEAS.deae068c77a6e63c6d74307f353e5e40.exe 4340 NEAS.deae068c77a6e63c6d74307f353e5e40.exe 4340 NEAS.deae068c77a6e63c6d74307f353e5e40.exe 4340 NEAS.deae068c77a6e63c6d74307f353e5e40.exe 4340 NEAS.deae068c77a6e63c6d74307f353e5e40.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4340 NEAS.deae068c77a6e63c6d74307f353e5e40.exe -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.deae068c77a6e63c6d74307f353e5e40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" NEAS.deae068c77a6e63c6d74307f353e5e40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" NEAS.deae068c77a6e63c6d74307f353e5e40.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.deae068c77a6e63c6d74307f353e5e40.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.deae068c77a6e63c6d74307f353e5e40.exe"1⤵
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\ProgramData\Package Cache\{F6080405-9FA8-4CAA-9982-14E95D1A3DAC}v14.30.30704\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\System32\dmcsps\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\ProgramData\Packages\Microsoft.549981C3F5F10_8wekyb3d8bbwe\S-1-5-21-3125601242-331447593-1512828465-1000\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\PerfLogs\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\System32\provplatformdesktop\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartUI\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Documents and Settings\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3580
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5deae068c77a6e63c6d74307f353e5e40
SHA1cb740abd0c89cd3cb20356f6e5777f879372f906
SHA256c3b511d889528a52823649518bf1f0227f28c5d76f252bbaea8a3f31578f86a7
SHA5124c506b647042da604aa3f96a30538874218daf4960e4fb11048a7f4a7f998a020928fb2374e27073fe4bf5fd9be80bf0f3d218108bcb0a513467991057115166