Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2024, 06:25

General

  • Target

    4020bfcac652310c77b3c5fa6a609098.exe

  • Size

    1.4MB

  • MD5

    4020bfcac652310c77b3c5fa6a609098

  • SHA1

    072d892ed59b80cc1561c004dfc0ba5343fc530a

  • SHA256

    79a6f43c7c03d086ebcf7c70a25b21e0888866344d889e35068e461ffb82444e

  • SHA512

    09590ce01936bb6ffc2db2a15390820408c726ac65ae2d424edde0f1cc65caf3d1cc570935196eccc7cd454957c89f4a1bad8d820f869f766e49ffb371bddbd5

  • SSDEEP

    24576:G7b6+NMFw50Rp8gXBeyebsBtqKl/NpP2RMJ+V8c6Js7+RzrdI/Ko+4:GPkeqGgXBeySsBZl2y281JGQzJFL

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 14 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 7 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 14 IoCs
  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 14 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4020bfcac652310c77b3c5fa6a609098.exe
    "C:\Users\Admin\AppData\Local\Temp\4020bfcac652310c77b3c5fa6a609098.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Users\Admin\AppData\Local\Temp\4020bfcac652310c77b3c5fa6a609098.exe
      "C:\Users\Admin\AppData\Local\Temp\4020bfcac652310c77b3c5fa6a609098.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Windows\System32\C_28599\csrss.exe
        "C:\Windows\System32\C_28599\csrss.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2972
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\uexfat\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2896
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\mpg2splt\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2728
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "4020bfcac652310c77b3c5fa6a609098" /sc ONLOGON /tr "'C:\Recovery\ebbea1a2-8f1b-11ee-aa93-7ed9061e9c39\4020bfcac652310c77b3c5fa6a609098.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2604
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\lsm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1320
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\es-ES\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2584
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\PerfLogs\Admin\audiodg.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3060
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Documents and Settings\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2808
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\sqlceoledb30\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1436
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Public\Documents\My Pictures\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3016
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2704
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Documents and Settings\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2772
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\System32\sxshared\services.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1164
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\C_28599\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3028
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\ProgramData\Documents\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2088

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\System32\C_28599\csrss.exe

          Filesize

          92KB

          MD5

          6a5db22211f57c32166566efebabb627

          SHA1

          b80cbc1415baed3886cbeca4325322c131fff8d1

          SHA256

          139d050b6e7deb69b6315d527095bfd9d449f72de1ce55548489661606d7ed63

          SHA512

          0aaa94fc3110ea27a2bd1ab44eaf3c0f8cd55128c21e6add72b489b0efab22aede453aea86649e57cf494ebd791f80338a3b3b3e937e96de71e69f8448d91d45

        • C:\Windows\System32\mpg2splt\dwm.exe

          Filesize

          1.4MB

          MD5

          4020bfcac652310c77b3c5fa6a609098

          SHA1

          072d892ed59b80cc1561c004dfc0ba5343fc530a

          SHA256

          79a6f43c7c03d086ebcf7c70a25b21e0888866344d889e35068e461ffb82444e

          SHA512

          09590ce01936bb6ffc2db2a15390820408c726ac65ae2d424edde0f1cc65caf3d1cc570935196eccc7cd454957c89f4a1bad8d820f869f766e49ffb371bddbd5

        • memory/2488-41-0x000007FEF5EE0000-0x000007FEF68CC000-memory.dmp

          Filesize

          9.9MB

        • memory/2488-17-0x000000001AE70000-0x000000001AEF0000-memory.dmp

          Filesize

          512KB

        • memory/2488-15-0x000007FEF5EE0000-0x000007FEF68CC000-memory.dmp

          Filesize

          9.9MB

        • memory/2948-16-0x000007FEF5EE0000-0x000007FEF68CC000-memory.dmp

          Filesize

          9.9MB

        • memory/2948-0-0x0000000000960000-0x0000000000AC8000-memory.dmp

          Filesize

          1.4MB

        • memory/2948-2-0x000000001AE50000-0x000000001AED0000-memory.dmp

          Filesize

          512KB

        • memory/2948-1-0x000007FEF5EE0000-0x000007FEF68CC000-memory.dmp

          Filesize

          9.9MB

        • memory/2972-43-0x000000001AEF0000-0x000000001AF70000-memory.dmp

          Filesize

          512KB

        • memory/2972-42-0x000007FEF5EE0000-0x000007FEF68CC000-memory.dmp

          Filesize

          9.9MB

        • memory/2972-40-0x0000000000A40000-0x0000000000BA8000-memory.dmp

          Filesize

          1.4MB

        • memory/2972-44-0x000007FEF5EE0000-0x000007FEF68CC000-memory.dmp

          Filesize

          9.9MB

        • memory/2972-45-0x000000001AEF0000-0x000000001AF70000-memory.dmp

          Filesize

          512KB

        • memory/2972-46-0x000007FEF5EE0000-0x000007FEF68CC000-memory.dmp

          Filesize

          9.9MB