Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-02-2024 06:17

General

  • Target

    b018f5a66001f1ccb3553465778d7a65d04d7a0925ac925b692bfbedcbc08295.exe

  • Size

    1.8MB

  • MD5

    2654cf7f87e8aa432528dc78fedb324f

  • SHA1

    22c2770eea77b91b30e5bfc7199a321339ec92dc

  • SHA256

    b018f5a66001f1ccb3553465778d7a65d04d7a0925ac925b692bfbedcbc08295

  • SHA512

    6aecbe6aae20f2b2e484eaae9a4dfb64ca008c60e11c02de7c8c9559336804a721983b9522431c08979ae307d17e2d202e6e2d208c2ab1f9923bf161e94db890

  • SSDEEP

    24576:u2G/nvxW3WieCfYiKFt+77kwwVomlSUXUkv1nKSW8W5xdf9w4/Zo2L9vU3gtTqUK:ubA3jfYilPmlB9NngLfSMouvKEiV

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 36 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 8 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Detects executables packed with SmartAssembly 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 36 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b018f5a66001f1ccb3553465778d7a65d04d7a0925ac925b692bfbedcbc08295.exe
    "C:\Users\Admin\AppData\Local\Temp\b018f5a66001f1ccb3553465778d7a65d04d7a0925ac925b692bfbedcbc08295.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\bridgeMs\IHDIGCFHaYb0yciijvrQ.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\bridgeMs\ADsVHR0er2fHwJeWUEwiEiTsFzbnax.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\bridgeMs\Hyperbrowser.exe
          "C:\bridgeMs\Hyperbrowser.exe"
          4⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2572
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ea0WjfTxms.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2308
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:2168
              • C:\bridgeMs\System.exe
                "C:\bridgeMs\System.exe"
                6⤵
                • UAC bypass
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:564
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -u -p 564 -s 1312
                  7⤵
                    PID:2360
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Internet Explorer\de-DE\explorer.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2404
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\de-DE\explorer.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2152
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Internet Explorer\de-DE\explorer.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2160
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\audiodg.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:336
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\audiodg.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:884
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\audiodg.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:312
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\conhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2120
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\conhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1876
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\conhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2104
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\bridgeMs\wininit.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:756
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\bridgeMs\wininit.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2744
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\bridgeMs\wininit.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:764
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Google\csrss.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2836
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Google\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2892
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files\Google\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1940
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Program Files\Java\jre7\lib\jfr\explorer.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1720
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Java\jre7\lib\jfr\explorer.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2824
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files\Java\jre7\lib\jfr\explorer.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2960
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Recovery\add7a402-9b9f-11ee-a130-ac12cddc57f5\Idle.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1692
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\add7a402-9b9f-11ee-a130-ac12cddc57f5\Idle.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1960
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Recovery\add7a402-9b9f-11ee-a130-ac12cddc57f5\Idle.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:856
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Documents\My Music\sppsvc.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1272
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Admin\Documents\My Music\sppsvc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1896
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Documents\My Music\sppsvc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2036
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Mail\fr-FR\services.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:3048
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\fr-FR\services.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2436
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Mail\fr-FR\services.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2364
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\System.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2304
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Default User\System.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1112
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\System.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1144
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\services.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:800
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\services.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1224
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\services.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:712
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\bridgeMs\System.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1496
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\bridgeMs\System.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1564
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\bridgeMs\System.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1196

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\conhost.exe

        Filesize

        1.5MB

        MD5

        cdef822478d1c077577a3688b840633b

        SHA1

        06be7518b45505d5c7745483019d6924921c8c46

        SHA256

        74c202254289c54784e8d08d6e42c90977fea9583c2bbc4f18d859336fb2b5d1

        SHA512

        45162cedbb07166cb2e6b2facb200c48dcc0a3655e2f656213cf4de818e371c8ff1d0d7f001a6291c80cbdeb703a4168d4954f9f1c31457d35a0237e4b5fa179

      • C:\Users\Admin\AppData\Local\Temp\ea0WjfTxms.bat

        Filesize

        187B

        MD5

        97b6883e6ef6aefab3528b36b8571a64

        SHA1

        5d658c19901570471b1d5de4d20586b4aa70d80e

        SHA256

        926828565c9cb4d904082847342dc563455f98fea0ae7717a32f20e3590f9531

        SHA512

        50d7e9c485c26b62f389e93efbbaa6c11f0928266bbfbc56cbe32a9572a2003990b2a5b46e97564461fdb02f9293a2b59e0bb89cef137b344d7c2ed891b7fe66

      • C:\bridgeMs\ADsVHR0er2fHwJeWUEwiEiTsFzbnax.bat

        Filesize

        30B

        MD5

        758f4fc5f5a2e79b34610ac4e3308fea

        SHA1

        7fc95ed1265c8d5ce999a509bb0fe08374ede651

        SHA256

        398efdc4c9fa37d28230039a479eb14d81227626fc620b7f2c765a2b70f77e5e

        SHA512

        3cdbb2fb8fc6e2f5bba6b687bef44896a15ad94b866a365172951aed0bb3de15065c030e06dd8acb9cc4730db7ab6b064b74a51aa104d28090fe3c3f2234e595

      • C:\bridgeMs\Hyperbrowser.exe

        Filesize

        857KB

        MD5

        81ee1ad0e1ca81ea4c5e4d4b7f247745

        SHA1

        617fa3f15bdd0ef1bef5c64b1fac28197c32d64a

        SHA256

        5e2083509fb3fd184458b33121afaaa7b36296cc19865e04f3fa240034a1fed8

        SHA512

        dd5ed662943f0a3c9e57865c295d200c3ed7204bfd5fa511ccfc7b74499eb02bea3725a74ed5d74d03686c64205b627a0c3f9ad245c573bfb5fb74720b179e29

      • C:\bridgeMs\Hyperbrowser.exe

        Filesize

        820KB

        MD5

        31f390757996afa8765e9a3b8da43e30

        SHA1

        db6889c28bbcd9b709d29abb48b88b45b4fbeb13

        SHA256

        e785a1d803da5b2a0c4fce072bb294d08082a264682f79f6ba84af447f98bff0

        SHA512

        11a73074cec7aa1037b83f6d3889a702f5f4ca3ef84ffd1514208bc00da056da6bf271365b148a2c795621400b5e66897b860096ba029b27c979ff3f205c09db

      • C:\bridgeMs\IHDIGCFHaYb0yciijvrQ.vbe

        Filesize

        215B

        MD5

        1f8ae1420ead8da4743bfc84f0b6e362

        SHA1

        889bbf5e24a92c7f999aece80209ec21edc4ef13

        SHA256

        26fd0ab73e02437a1bfe5ac8d151175a70dc0c0ece744610bca36aca8d680599

        SHA512

        229c18c42512b8f09932c828a434183605a5bcc8d436021b94f7427418ebf711f901be05433fd69c2afdc48842365ef688294a60ce6feaa5af48a4c24ad83ca5

      • \bridgeMs\Hyperbrowser.exe

        Filesize

        887KB

        MD5

        6f92f6424b58b95c4f021f0a663bb605

        SHA1

        12affae189b9e7c1ae1e726b19d8929ef983e457

        SHA256

        d81a8cae70fa9ce7800159965500c9947844f3af5d402fde8cdbd24fa542ad6c

        SHA512

        624cec87990ca1301ebc177be22ed35cba7050df3479a29709c26951adacc4e4d284b6d05b3fd8e703aaf76265ca55aaf1645386cb927e0e30537e010d313c7a

      • \bridgeMs\Hyperbrowser.exe

        Filesize

        192KB

        MD5

        5d000c6312062c26c8f3a77d04bf4d45

        SHA1

        9f1ce0e942a620ce83fc4c5cb2f7e32e9a2f42c5

        SHA256

        92d7b59605e637414050f82ae8c81d2bfc08faed2fabddd0fa9c85a2c7f4d715

        SHA512

        d5d8a4b445c93943c1eb0f91853a9238f874db67c83ddd8cff4ba85311d458b58d822777f241957fc75498650a752b5da7bac115cd463c49fca77cdd511fb078

      • memory/564-78-0x000000001B230000-0x000000001B2B0000-memory.dmp

        Filesize

        512KB

      • memory/564-72-0x000000001B230000-0x000000001B2B0000-memory.dmp

        Filesize

        512KB

      • memory/564-70-0x0000000000330000-0x00000000004BE000-memory.dmp

        Filesize

        1.6MB

      • memory/564-71-0x000007FEF55C0000-0x000007FEF5FAC000-memory.dmp

        Filesize

        9.9MB

      • memory/564-73-0x000000001A7C0000-0x000000001A7D2000-memory.dmp

        Filesize

        72KB

      • memory/564-77-0x000007FEF55C0000-0x000007FEF5FAC000-memory.dmp

        Filesize

        9.9MB

      • memory/2572-22-0x0000000000440000-0x000000000044A000-memory.dmp

        Filesize

        40KB

      • memory/2572-21-0x0000000000420000-0x0000000000436000-memory.dmp

        Filesize

        88KB

      • memory/2572-23-0x0000000000450000-0x0000000000462000-memory.dmp

        Filesize

        72KB

      • memory/2572-24-0x0000000000490000-0x0000000000498000-memory.dmp

        Filesize

        32KB

      • memory/2572-25-0x00000000009A0000-0x00000000009AC000-memory.dmp

        Filesize

        48KB

      • memory/2572-20-0x0000000000410000-0x0000000000420000-memory.dmp

        Filesize

        64KB

      • memory/2572-19-0x0000000000200000-0x0000000000208000-memory.dmp

        Filesize

        32KB

      • memory/2572-67-0x000007FEF5FB0000-0x000007FEF699C000-memory.dmp

        Filesize

        9.9MB

      • memory/2572-18-0x00000000001E0000-0x00000000001FC000-memory.dmp

        Filesize

        112KB

      • memory/2572-17-0x00000000001D0000-0x00000000001DE000-memory.dmp

        Filesize

        56KB

      • memory/2572-16-0x00000000001C0000-0x00000000001CE000-memory.dmp

        Filesize

        56KB

      • memory/2572-15-0x000000001B200000-0x000000001B280000-memory.dmp

        Filesize

        512KB

      • memory/2572-14-0x000007FEF5FB0000-0x000007FEF699C000-memory.dmp

        Filesize

        9.9MB

      • memory/2572-13-0x00000000009D0000-0x0000000000B5E000-memory.dmp

        Filesize

        1.6MB