Analysis

  • max time kernel
    136s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2023, 02:31

General

  • Target

    NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe

  • Size

    783KB

  • MD5

    b1d8052ed41a27fe08f3d2fff46b5490

  • SHA1

    4b7e84c556fcf4ff2c5bdae48f73f084a7a8fe73

  • SHA256

    62960dadc5119f2ad64919d0fa3c6d5b6bfc930f0bf171917dbb8cba03938431

  • SHA512

    4b140ced04e60e998738d30a49666599e6720d39fbb3bd24c8414e0d632418c307f7447a7a3d808a5440eb5f992d8c7631e5c629462336a660888b15a22b0147

  • SSDEEP

    12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 8 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 16 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3032
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RBw34MHLBy.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5076
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:4852
        • C:\Windows\System32\NotificationControllerPS\SppExtComObj.exe
          "C:\Windows\System32\NotificationControllerPS\SppExtComObj.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:3880
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\resources\SearchApp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:264
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\System32\NotificationControllerPS\SppExtComObj.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:368
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.CppWinrt\SearchApp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2612
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\Windows\System32\SysFxUI\MusNotification.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3172
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\System32\IHDS\backgroundTaskHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3816
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Java\jre-1.8\lib\security\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2172
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\System32\dnscmmc\taskhostw.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1208
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\PerfLogs\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RBw34MHLBy.bat

      Filesize

      225B

      MD5

      4b283d1d3cf6a76a12e45c4a61f8acd1

      SHA1

      64df859a6a43f585c25eef6c05ec27fd2b978fa6

      SHA256

      2322bf61242976acaf36f7d10629fa8c90800bbab88d290402ca6a4d3ddaf284

      SHA512

      272801aca0b9227e65fb10c798fe923c74812d4d1909c07359689f6bd4cde51a22daf4e8d21de407578f0b83799aa6ddcde3c09bd770de4d5db6acc2bf9c8fc0

    • C:\Windows\System32\IHDS\backgroundTaskHost.exe

      Filesize

      783KB

      MD5

      b1d8052ed41a27fe08f3d2fff46b5490

      SHA1

      4b7e84c556fcf4ff2c5bdae48f73f084a7a8fe73

      SHA256

      62960dadc5119f2ad64919d0fa3c6d5b6bfc930f0bf171917dbb8cba03938431

      SHA512

      4b140ced04e60e998738d30a49666599e6720d39fbb3bd24c8414e0d632418c307f7447a7a3d808a5440eb5f992d8c7631e5c629462336a660888b15a22b0147

    • C:\Windows\System32\NotificationControllerPS\SppExtComObj.exe

      Filesize

      783KB

      MD5

      b1d8052ed41a27fe08f3d2fff46b5490

      SHA1

      4b7e84c556fcf4ff2c5bdae48f73f084a7a8fe73

      SHA256

      62960dadc5119f2ad64919d0fa3c6d5b6bfc930f0bf171917dbb8cba03938431

      SHA512

      4b140ced04e60e998738d30a49666599e6720d39fbb3bd24c8414e0d632418c307f7447a7a3d808a5440eb5f992d8c7631e5c629462336a660888b15a22b0147

    • C:\Windows\System32\NotificationControllerPS\SppExtComObj.exe

      Filesize

      783KB

      MD5

      b1d8052ed41a27fe08f3d2fff46b5490

      SHA1

      4b7e84c556fcf4ff2c5bdae48f73f084a7a8fe73

      SHA256

      62960dadc5119f2ad64919d0fa3c6d5b6bfc930f0bf171917dbb8cba03938431

      SHA512

      4b140ced04e60e998738d30a49666599e6720d39fbb3bd24c8414e0d632418c307f7447a7a3d808a5440eb5f992d8c7631e5c629462336a660888b15a22b0147

    • memory/3032-24-0x000000001B740000-0x000000001B748000-memory.dmp

      Filesize

      32KB

    • memory/3032-5-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

      Filesize

      64KB

    • memory/3032-6-0x0000000002CB0000-0x0000000002CB8000-memory.dmp

      Filesize

      32KB

    • memory/3032-7-0x0000000002DE0000-0x0000000002DEC000-memory.dmp

      Filesize

      48KB

    • memory/3032-8-0x000000001B6F0000-0x000000001B6FA000-memory.dmp

      Filesize

      40KB

    • memory/3032-9-0x0000000002CC0000-0x0000000002CCA000-memory.dmp

      Filesize

      40KB

    • memory/3032-10-0x000000001B6E0000-0x000000001B6E8000-memory.dmp

      Filesize

      32KB

    • memory/3032-11-0x000000001B700000-0x000000001B708000-memory.dmp

      Filesize

      32KB

    • memory/3032-12-0x000000001B710000-0x000000001B718000-memory.dmp

      Filesize

      32KB

    • memory/3032-13-0x000000001B720000-0x000000001B728000-memory.dmp

      Filesize

      32KB

    • memory/3032-14-0x000000001B730000-0x000000001B738000-memory.dmp

      Filesize

      32KB

    • memory/3032-15-0x000000001B750000-0x000000001B758000-memory.dmp

      Filesize

      32KB

    • memory/3032-16-0x000000001B760000-0x000000001B768000-memory.dmp

      Filesize

      32KB

    • memory/3032-17-0x000000001B770000-0x000000001B778000-memory.dmp

      Filesize

      32KB

    • memory/3032-18-0x000000001B780000-0x000000001B788000-memory.dmp

      Filesize

      32KB

    • memory/3032-19-0x000000001B7D0000-0x000000001B7D8000-memory.dmp

      Filesize

      32KB

    • memory/3032-20-0x000000001B7C0000-0x000000001B7D0000-memory.dmp

      Filesize

      64KB

    • memory/3032-21-0x000000001B790000-0x000000001B798000-memory.dmp

      Filesize

      32KB

    • memory/3032-22-0x000000001B7C0000-0x000000001B7D0000-memory.dmp

      Filesize

      64KB

    • memory/3032-23-0x0000000002DF0000-0x0000000002DFC000-memory.dmp

      Filesize

      48KB

    • memory/3032-28-0x00007FFA99630000-0x00007FFA9A0F1000-memory.dmp

      Filesize

      10.8MB

    • memory/3032-0-0x0000000000B60000-0x0000000000C2A000-memory.dmp

      Filesize

      808KB

    • memory/3032-27-0x000000001B7C0000-0x000000001B7D0000-memory.dmp

      Filesize

      64KB

    • memory/3032-29-0x000000001B7C0000-0x000000001B7D0000-memory.dmp

      Filesize

      64KB

    • memory/3032-36-0x000000001B7C0000-0x000000001B7D0000-memory.dmp

      Filesize

      64KB

    • memory/3032-4-0x0000000002C90000-0x0000000002C98000-memory.dmp

      Filesize

      32KB

    • memory/3032-54-0x000000001B7C0000-0x000000001B7D0000-memory.dmp

      Filesize

      64KB

    • memory/3032-72-0x000000001B7C0000-0x000000001B7D0000-memory.dmp

      Filesize

      64KB

    • memory/3032-73-0x000000001C6D0000-0x000000001C7D0000-memory.dmp

      Filesize

      1024KB

    • memory/3032-85-0x000000001B7C0000-0x000000001B7D0000-memory.dmp

      Filesize

      64KB

    • memory/3032-100-0x000000001B7C0000-0x000000001B7D0000-memory.dmp

      Filesize

      64KB

    • memory/3032-101-0x000000001B7C0000-0x000000001B7D0000-memory.dmp

      Filesize

      64KB

    • memory/3032-105-0x000000001C6D0000-0x000000001C7D0000-memory.dmp

      Filesize

      1024KB

    • memory/3032-115-0x000000001C6D0000-0x000000001C7D0000-memory.dmp

      Filesize

      1024KB

    • memory/3032-3-0x0000000002C80000-0x0000000002C88000-memory.dmp

      Filesize

      32KB

    • memory/3032-118-0x00007FFA99630000-0x00007FFA9A0F1000-memory.dmp

      Filesize

      10.8MB

    • memory/3032-2-0x000000001B7C0000-0x000000001B7D0000-memory.dmp

      Filesize

      64KB

    • memory/3032-1-0x00007FFA99630000-0x00007FFA9A0F1000-memory.dmp

      Filesize

      10.8MB

    • memory/3880-122-0x00007FFA99630000-0x00007FFA9A0F1000-memory.dmp

      Filesize

      10.8MB

    • memory/3880-123-0x000000001B7D0000-0x000000001B7E0000-memory.dmp

      Filesize

      64KB

    • memory/3880-124-0x000000001B7D0000-0x000000001B7E0000-memory.dmp

      Filesize

      64KB

    • memory/3880-125-0x000000001B7D0000-0x000000001B7E0000-memory.dmp

      Filesize

      64KB

    • memory/3880-126-0x000000001B7D0000-0x000000001B7E0000-memory.dmp

      Filesize

      64KB

    • memory/3880-128-0x00007FFA99630000-0x00007FFA9A0F1000-memory.dmp

      Filesize

      10.8MB