Analysis

  • max time kernel
    146s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 21:00

General

  • Target

    1c5beacf795033142fa3ed081ada1b30.exe

  • Size

    1.2MB

  • MD5

    1c5beacf795033142fa3ed081ada1b30

  • SHA1

    2e38208dfd2bf4b52e82359cd5101d08667e5b4c

  • SHA256

    82c160832568258001ad498291a7c3b6f0500bdd1f93153d8ae1b0e3b9033e44

  • SHA512

    42540ac45358cbaf44d7148dd6f64dc9cd45ccdcf50b3550c1c02eb9e2e1098f05d92f3630abdee4e6d9bed35c389768e98680fd7a406a7d35c09abe5f8e7634

  • SSDEEP

    24576:Rm0INy7ki6HAYWbNAtjrpMlcOV+3xNFTG+FWx+4:MC7h6HIAtltxDG+J

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c5beacf795033142fa3ed081ada1b30.exe
    "C:\Users\Admin\AppData\Local\Temp\1c5beacf795033142fa3ed081ada1b30.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3912
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System32\ProximityCommon\fontdrvhost.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1516
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\backgroundTaskHost\RuntimeBroker.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:116
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\ClickToRun\cpprestsdk\OfficeClickToRun.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:4468
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "smss" /sc ONLOGON /tr "'C:\PerfLogs\smss.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:3524
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\EventTracingManagement\WmiPrvSE.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1412
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\CrashReports\wininit.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:3092
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NgE58zVcDC.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2148
        • C:\Windows\system32\PING.EXE
          ping -n 5 localhost
          3⤵
          • Runs ping.exe
          PID:1156
        • C:\Windows\System32\wbem\EventTracingManagement\WmiPrvSE.exe
          "C:\Windows\System32\wbem\EventTracingManagement\WmiPrvSE.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4640

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\NgE58zVcDC.bat

      Filesize

      226B

      MD5

      5832c591ac89b0c5d8f8ce156277f78e

      SHA1

      36124d60185d240f41a6f388fac12685d689fa65

      SHA256

      c56acc940b57fbf00884576b9539b96ca02c4a07ab48c9d20a5d65dc8b4bc895

      SHA512

      3a9ae9a9bd3e3007bdc9ff6912debe9f41754d8dcd0dcc3f8ee47645c9bba1e4a1ec5e92baf67237c2ae5f85e5f3c234edbffbc97f2e9cd941c5e2130aeafa73

    • C:\Windows\System32\wbem\EventTracingManagement\WmiPrvSE.exe

      Filesize

      1.2MB

      MD5

      1c5beacf795033142fa3ed081ada1b30

      SHA1

      2e38208dfd2bf4b52e82359cd5101d08667e5b4c

      SHA256

      82c160832568258001ad498291a7c3b6f0500bdd1f93153d8ae1b0e3b9033e44

      SHA512

      42540ac45358cbaf44d7148dd6f64dc9cd45ccdcf50b3550c1c02eb9e2e1098f05d92f3630abdee4e6d9bed35c389768e98680fd7a406a7d35c09abe5f8e7634

    • memory/3912-0-0x0000000000E30000-0x0000000000F64000-memory.dmp

      Filesize

      1.2MB

    • memory/3912-1-0x00007FFC8D6B0000-0x00007FFC8E171000-memory.dmp

      Filesize

      10.8MB

    • memory/3912-2-0x00007FFC8D6B0000-0x00007FFC8E171000-memory.dmp

      Filesize

      10.8MB

    • memory/3912-3-0x000000001BCE0000-0x000000001BCF0000-memory.dmp

      Filesize

      64KB

    • memory/3912-21-0x00007FFC8D6B0000-0x00007FFC8E171000-memory.dmp

      Filesize

      10.8MB

    • memory/4640-26-0x00007FFC8D730000-0x00007FFC8E1F1000-memory.dmp

      Filesize

      10.8MB

    • memory/4640-27-0x0000000002460000-0x0000000002470000-memory.dmp

      Filesize

      64KB

    • memory/4640-28-0x00007FFC8D730000-0x00007FFC8E1F1000-memory.dmp

      Filesize

      10.8MB

    • memory/4640-29-0x0000000002460000-0x0000000002470000-memory.dmp

      Filesize

      64KB

    • memory/4640-31-0x00007FFC8D730000-0x00007FFC8E1F1000-memory.dmp

      Filesize

      10.8MB