Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 14:09

General

  • Target

    492ea97a5e145707a87cd019f102042b.exe

  • Size

    1.2MB

  • MD5

    492ea97a5e145707a87cd019f102042b

  • SHA1

    e9b8c09b26921801d11fedb8426875c0cc59f0e4

  • SHA256

    3bfdd10fe2da7cb4dcff775df6897b3f5d4745391630640be7c388a816d649d1

  • SHA512

    06356125fa0071eb41c4074eba9c1610d03160954bcc27d24a507990f465207c2e21e31a433afaeaed36a59787c5441f476c0753f6e12ab19edff5ae214bfd1b

  • SSDEEP

    12288:6e+nZZPllEevpmjEdApnSavNYkHN2nG9mAKKCVUy0XKKtOpCG0J3jK5MKYXqn4:/CeIQrSavmGcAKnVUHK5b0Jzf5X+4

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 7 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\492ea97a5e145707a87cd019f102042b.exe
    "C:\Users\Admin\AppData\Local\Temp\492ea97a5e145707a87cd019f102042b.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\services.exe
      "C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\services.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3020
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2844
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Documents and Settings\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2728
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Public\Recorded TV\Sample Media\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2860
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\PerfLogs\Admin\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2628
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\QSVRMGMT\lsm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2676
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2612
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2772

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\services.exe

          Filesize

          1.1MB

          MD5

          afff480041adb4f2f1a9c77d7c8a1b30

          SHA1

          964697ca696284039e4466aa4797fb23310b940f

          SHA256

          4f6141552d0a963c7697942be0e75e8e6ce78c8aa302864f76d4b0581d3a079f

          SHA512

          f7fa176dcbf2916649f1b16578a0d502903397e1f7d36d4a8b50fb0e4218ac9c43933a2b9bf67b2a054079083888294178eb3dd473e82777836bf283a97244c7

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\services.exe

          Filesize

          884KB

          MD5

          d4a6be44e17933c02d9cafba7a3a2453

          SHA1

          ec00c31f21cc8736aa7d803898458c2a1b515e07

          SHA256

          7fe81e24ac7a85f426e708022d3ade21479e7efdc6a94a98950def80d01de32f

          SHA512

          00897262b76fb6fbd0f0415e86593be76195f3ca7cda00b47830ad2facfa799c30191ad0b83930b1aa565c200d6f6761cd3cafc4762d863bc8f3c571387d96e4

        • C:\Users\Default\dllhost.exe

          Filesize

          628KB

          MD5

          f84f07817990c5414e06f806f30394f2

          SHA1

          a5d9033414324f0cfab8719b787574d85a480703

          SHA256

          7efe4cf105e913c25dee0d6c7bf282f32abe8b83201fc7da6dc4f07c5f4fd6be

          SHA512

          f2766d3a7cc8e69290febc358e913d521ee97e05c16452d581f8762d3c5b207fe52f43d4fe42efd5d6b44e221001b7d4c09c2e87ceb842d21c66207c9d7cbcff

        • memory/2996-0-0x00000000000D0000-0x000000000020E000-memory.dmp

          Filesize

          1.2MB

        • memory/2996-1-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

          Filesize

          9.9MB

        • memory/2996-2-0x000000001B1A0000-0x000000001B220000-memory.dmp

          Filesize

          512KB

        • memory/2996-24-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

          Filesize

          9.9MB

        • memory/3020-25-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

          Filesize

          9.9MB

        • memory/3020-26-0x000000001A7D0000-0x000000001A850000-memory.dmp

          Filesize

          512KB

        • memory/3020-23-0x0000000000260000-0x000000000039E000-memory.dmp

          Filesize

          1.2MB

        • memory/3020-27-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

          Filesize

          9.9MB