Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 10:36
Behavioral task
behavioral1
Sample
24EDBB670151083A35200EAE5E927259.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24EDBB670151083A35200EAE5E927259.exe
Resource
win10v2004-20240221-en
General
-
Target
24EDBB670151083A35200EAE5E927259.exe
-
Size
2.0MB
-
MD5
24edbb670151083a35200eae5e927259
-
SHA1
c69efb169379d77388c94969fdcb3f50f768cfcc
-
SHA256
9084394a955e7b25bca70b2298e1e3359c5aab5189628b647eba18706ffd67c3
-
SHA512
dffdea54ed58823858cc30259b64536cd96c6ab28d8eb4570d9501d187b82ac48f1ee7ac8058555df725165ae660f279ec259b2dafa5b3056e98ed84b003b0a2
-
SSDEEP
49152:FqHEuTrhUqQcvwHnX9B0gQ1TgqAsoqbBmXob3:QHrUqQcvQnX9B0gQ1TgqAsRVmXob3
Malware Config
Signatures
-
DcRat 12 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
pid Process 2536 schtasks.exe 2440 schtasks.exe 2736 schtasks.exe 2864 schtasks.exe 2600 schtasks.exe 2224 schtasks.exe 2488 schtasks.exe 2772 schtasks.exe 240 schtasks.exe 1560 schtasks.exe 2404 schtasks.exe 1252 schtasks.exe -
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\dwm.exe\"" 24EDBB670151083A35200EAE5E927259.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\dwm.exe\", \"C:\\Users\\Default User\\dllhost.exe\"" 24EDBB670151083A35200EAE5E927259.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\dwm.exe\", \"C:\\Users\\Default User\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\dllhost.exe\"" 24EDBB670151083A35200EAE5E927259.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\dwm.exe\", \"C:\\Users\\Default User\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\dllhost.exe\", \"C:\\Recovery\\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\\sppsvc.exe\"" 24EDBB670151083A35200EAE5E927259.exe -
Process spawned unexpected child process 12 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2772 2160 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2600 2160 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2224 2160 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2536 2160 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 2160 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2488 2160 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 2160 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2864 2160 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 240 2160 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1560 2160 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2404 2160 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1252 2160 schtasks.exe 28 -
resource yara_rule behavioral1/memory/2020-0-0x0000000000930000-0x0000000000B3A000-memory.dmp dcrat behavioral1/files/0x000800000001222a-36.dat dcrat behavioral1/files/0x000800000001222a-72.dat dcrat behavioral1/files/0x000800000001222a-73.dat dcrat behavioral1/memory/1496-82-0x00000000002B0000-0x00000000004BA000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 1496 dwm.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Default User\\dllhost.exe\"" 24EDBB670151083A35200EAE5E927259.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\dllhost.exe\"" 24EDBB670151083A35200EAE5E927259.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\dllhost.exe\"" 24EDBB670151083A35200EAE5E927259.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Recovery\\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\\sppsvc.exe\"" 24EDBB670151083A35200EAE5E927259.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Recovery\\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\\sppsvc.exe\"" 24EDBB670151083A35200EAE5E927259.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\dwm.exe\"" 24EDBB670151083A35200EAE5E927259.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\dwm.exe\"" 24EDBB670151083A35200EAE5E927259.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Default User\\dllhost.exe\"" 24EDBB670151083A35200EAE5E927259.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2440 schtasks.exe 2736 schtasks.exe 2864 schtasks.exe 1560 schtasks.exe 2404 schtasks.exe 2772 schtasks.exe 2224 schtasks.exe 2536 schtasks.exe 1252 schtasks.exe 2600 schtasks.exe 2488 schtasks.exe 240 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 2020 24EDBB670151083A35200EAE5E927259.exe 1968 powershell.exe 1920 powershell.exe 1820 powershell.exe 1944 powershell.exe 1524 powershell.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2020 24EDBB670151083A35200EAE5E927259.exe Token: SeDebugPrivilege 1968 powershell.exe Token: SeDebugPrivilege 1920 powershell.exe Token: SeDebugPrivilege 1820 powershell.exe Token: SeDebugPrivilege 1944 powershell.exe Token: SeDebugPrivilege 1524 powershell.exe Token: SeDebugPrivilege 1496 dwm.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1820 2020 24EDBB670151083A35200EAE5E927259.exe 41 PID 2020 wrote to memory of 1820 2020 24EDBB670151083A35200EAE5E927259.exe 41 PID 2020 wrote to memory of 1820 2020 24EDBB670151083A35200EAE5E927259.exe 41 PID 2020 wrote to memory of 1920 2020 24EDBB670151083A35200EAE5E927259.exe 42 PID 2020 wrote to memory of 1920 2020 24EDBB670151083A35200EAE5E927259.exe 42 PID 2020 wrote to memory of 1920 2020 24EDBB670151083A35200EAE5E927259.exe 42 PID 2020 wrote to memory of 1524 2020 24EDBB670151083A35200EAE5E927259.exe 43 PID 2020 wrote to memory of 1524 2020 24EDBB670151083A35200EAE5E927259.exe 43 PID 2020 wrote to memory of 1524 2020 24EDBB670151083A35200EAE5E927259.exe 43 PID 2020 wrote to memory of 1944 2020 24EDBB670151083A35200EAE5E927259.exe 45 PID 2020 wrote to memory of 1944 2020 24EDBB670151083A35200EAE5E927259.exe 45 PID 2020 wrote to memory of 1944 2020 24EDBB670151083A35200EAE5E927259.exe 45 PID 2020 wrote to memory of 1968 2020 24EDBB670151083A35200EAE5E927259.exe 44 PID 2020 wrote to memory of 1968 2020 24EDBB670151083A35200EAE5E927259.exe 44 PID 2020 wrote to memory of 1968 2020 24EDBB670151083A35200EAE5E927259.exe 44 PID 2020 wrote to memory of 1496 2020 24EDBB670151083A35200EAE5E927259.exe 51 PID 2020 wrote to memory of 1496 2020 24EDBB670151083A35200EAE5E927259.exe 51 PID 2020 wrote to memory of 1496 2020 24EDBB670151083A35200EAE5E927259.exe 51 PID 1496 wrote to memory of 1616 1496 dwm.exe 52 PID 1496 wrote to memory of 1616 1496 dwm.exe 52 PID 1496 wrote to memory of 1616 1496 dwm.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\24EDBB670151083A35200EAE5E927259.exe"C:\Users\Admin\AppData\Local\Temp\24EDBB670151083A35200EAE5E927259.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\24EDBB670151083A35200EAE5E927259.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\dwm.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\dllhost.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\sppsvc.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\dllhost.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\dwm.exe"C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\dwm.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1496 -s 11323⤵PID:1616
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Recovery\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\sppsvc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Recovery\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1252
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5cbed9b910fccf711ec72e79f39fb8082
SHA152e478f278f81d942961a3f37475f8859123b767
SHA25676918c9853816513a0d1df79a4e0ef14bb2c87909f0cfd549bb662ec89b93642
SHA5122821460eed0f1498d15553b0a0c8929e35653026c29493f1111c7a40ac42850f169c5ddd182930e021ec1d5ebea6054cfc5c6165cf5d8da523f2428f6c37b7ee
-
Filesize
1.9MB
MD5e3e2691d79bbf291c1b31b74bbf341b4
SHA109502c0c25c7755c4c79129c930f4927e3f277ab
SHA2564fac42b42f7a113ba521255240b7d7b818403d27bd97ad37f84d9538b14c6484
SHA512a3883a4ed2b5a7bf771a0d10be253ebd991d04ed23c89b8ab1d88c32a76243a6e960f44ae041fa3eeff919dbedbedf07ff95852ad9d5ab35321682cc62fb7465
-
Filesize
1.4MB
MD5499248224b205cd4537062ccd0a87c80
SHA192a62fdbcd8d8c60d9591f2effc3fe67afdc474b
SHA2568394a2b2c6780c5a6d71b22dc89f15ffbde1d98308f010ba18ee0b945efff0af
SHA5120092eb13165d867df54ddf791e70e89168ed6613220b3f5b920b44df118f4e588e61ed428d2136e0734e0b8fa36711691f1e6cfc54a5667bf28c44052b7a58b0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5cdd42d607215f00048a73b78e20cd764
SHA1e87f601377eb2cbe921a3411c71110db6af29c70
SHA256debe94cf0c7ea62b6109e30d5b6f91c3c0a9ff994c8d9734e881f0a3cfaf0385
SHA5124e133b45e865399d6787ceb86bfd07ce71aab19578d835aced724a007cb9269d27132c8601205e16f1fd662c358a0c7096ffada9c564cb3cc1221162dfb3296b