Overview
overview
10Static
static
1001d63645f4...e3.exe
windows7-x64
901d63645f4...e3.exe
windows10-2004-x64
1014bae02cc3...0e.exe
windows7-x64
1014bae02cc3...0e.exe
windows10-2004-x64
8TNT Origin...ce.exe
windows7-x64
10TNT Origin...ce.exe
windows10-2004-x64
10402ff605d7...97.exe
windows7-x64
10402ff605d7...97.exe
windows10-2004-x64
104d0dfae91f...bf.exe
windows7-x64
74d0dfae91f...bf.exe
windows10-2004-x64
75401a3332d...8e.exe
windows7-x64
105401a3332d...8e.exe
windows10-2004-x64
10Autoit3.exe
windows7-x64
3Autoit3.exe
windows10-2004-x64
36cfe745f03...d2.exe
windows7-x64
106cfe745f03...d2.exe
windows10-2004-x64
1090f19e1a78...ef.exe
windows7-x64
790f19e1a78...ef.exe
windows10-2004-x64
1a3eeef65c4...4.xlsx
windows7-x64
1a3eeef65c4...4.xlsx
windows10-2004-x64
1a71829e150...e5.exe
windows7-x64
7a71829e150...e5.exe
windows10-2004-x64
7db58eb7713...c4.exe
windows7-x64
10db58eb7713...c4.exe
windows10-2004-x64
7Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 14:00
Behavioral task
behavioral1
Sample
01d63645f4c648e12fa693ecc9a926eda29ca031c5d067c687ee65cab67e74e3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
01d63645f4c648e12fa693ecc9a926eda29ca031c5d067c687ee65cab67e74e3.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
14bae02cc31e4fb13f02aa594d65a977f1fdec305089c415985e11903769ae0e.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
14bae02cc31e4fb13f02aa594d65a977f1fdec305089c415985e11903769ae0e.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
TNT Original Invoice.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
TNT Original Invoice.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
402ff605d7f23f20e253e13b8cb1eb7b5b763a00311deba3cf13c9646ae1f397.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
402ff605d7f23f20e253e13b8cb1eb7b5b763a00311deba3cf13c9646ae1f397.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
4d0dfae91fed3f9273356eae54dae047b51e374034fd7e8c1e50066c24add6bf.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
4d0dfae91fed3f9273356eae54dae047b51e374034fd7e8c1e50066c24add6bf.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
5401a3332d6bf674b3a25eb23745edd09f943284aa4448f9eb6c53620027f28e.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
5401a3332d6bf674b3a25eb23745edd09f943284aa4448f9eb6c53620027f28e.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
Autoit3.exe
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
Autoit3.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
6cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2.exe
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
6cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
90f19e1a7843dbee63856899da664d073c2b8fadd0cad368e623d5f7426ba5ef.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
90f19e1a7843dbee63856899da664d073c2b8fadd0cad368e623d5f7426ba5ef.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
a3eeef65c42890fd372bc7c627b36d2b9d54a909b809663e0f0392fa34766794.xlsx
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
a3eeef65c42890fd372bc7c627b36d2b9d54a909b809663e0f0392fa34766794.xlsx
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
a71829e150536a415790ed3f8897daab1da879adef2366f75ec939ec0e749de5.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
a71829e150536a415790ed3f8897daab1da879adef2366f75ec939ec0e749de5.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral23
Sample
db58eb77136d0a35453f949a25df9a2e0d344b389a136f966a1ec2c3c09ef2c4.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
db58eb77136d0a35453f949a25df9a2e0d344b389a136f966a1ec2c3c09ef2c4.exe
Resource
win10v2004-20240226-en
General
-
Target
6cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2.exe
-
Size
1.2MB
-
MD5
3963e3d1ecc64e895451d9e243f10862
-
SHA1
775f9c86b3b5ba45064f89c10775120da8deabb7
-
SHA256
6cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2
-
SHA512
3552db20ac0013f647384383016e2eb49f28525848b5a5ab9609a8f0e88f26b8c5b6c47e9558619b54d697e956bf1880793b13f011caab7aeffa095ec7fc9d14
-
SSDEEP
24576:rInyjugojpIaaHZn/HNTlL6lo4+ebE88T4SwrVO72:rqq2m7NK+3Tnk
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 21 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2784 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2720 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2652 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2820 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1288 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2796 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2568 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2524 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2572 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3032 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3040 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1060 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2900 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2880 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3016 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2588 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1256 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2424 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1588 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 2624 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1976 2624 schtasks.exe 28 -
resource yara_rule behavioral15/memory/2288-1-0x0000000000D40000-0x0000000000E7E000-memory.dmp dcrat behavioral15/files/0x00060000000155e8-16.dat dcrat behavioral15/memory/2764-28-0x00000000011A0000-0x00000000012DE000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2764 spoolsv.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io 5 ipinfo.io -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Portable Devices\sppsvc.exe 6cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2.exe File created C:\Program Files (x86)\Windows Portable Devices\0a1fd5f707cd16 6cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\es-ES\smss.exe 6cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2.exe File opened for modification C:\Windows\es-ES\smss.exe 6cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2.exe File created C:\Windows\es-ES\69ddcba757bf72 6cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 21 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2652 schtasks.exe 2568 schtasks.exe 3016 schtasks.exe 2588 schtasks.exe 1588 schtasks.exe 2720 schtasks.exe 2820 schtasks.exe 1288 schtasks.exe 2572 schtasks.exe 3032 schtasks.exe 2508 schtasks.exe 1976 schtasks.exe 2900 schtasks.exe 2880 schtasks.exe 1256 schtasks.exe 2424 schtasks.exe 2784 schtasks.exe 2796 schtasks.exe 2524 schtasks.exe 3040 schtasks.exe 1060 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 spoolsv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2288 6cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2.exe 2764 spoolsv.exe 2764 spoolsv.exe 2764 spoolsv.exe 2764 spoolsv.exe 2764 spoolsv.exe 2764 spoolsv.exe 2764 spoolsv.exe 2764 spoolsv.exe 2764 spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2288 6cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2.exe Token: SeDebugPrivilege 2764 spoolsv.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2764 2288 6cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2.exe 50 PID 2288 wrote to memory of 2764 2288 6cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2.exe 50 PID 2288 wrote to memory of 2764 2288 6cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2.exe 50 PID 2764 wrote to memory of 2044 2764 spoolsv.exe 51 PID 2764 wrote to memory of 2044 2764 spoolsv.exe 51 PID 2764 wrote to memory of 2044 2764 spoolsv.exe 51 PID 2764 wrote to memory of 1992 2764 spoolsv.exe 52 PID 2764 wrote to memory of 1992 2764 spoolsv.exe 52 PID 2764 wrote to memory of 1992 2764 spoolsv.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2.exe"C:\Users\Admin\AppData\Local\Temp\6cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\Contacts\spoolsv.exe"C:\Users\Admin\Contacts\spoolsv.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dea6549c-0dd8-4ddd-ad1f-b41ec4dc7434.vbs"3⤵PID:2044
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f389cbef-84a3-4a56-871f-3b61f63b55c6.vbs"3⤵PID:1992
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Windows\es-ES\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\es-ES\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Windows\es-ES\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Admin\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\SendTo\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Admin\SendTo\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\SendTo\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Portable Devices\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Portable Devices\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Recovery\07daf2c2-fe8f-11ee-804d-f636db4e28e7\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\07daf2c2-fe8f-11ee-804d-f636db4e28e7\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1256
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Recovery\07daf2c2-fe8f-11ee-804d-f636db4e28e7\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Contacts\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Admin\Contacts\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Contacts\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD53963e3d1ecc64e895451d9e243f10862
SHA1775f9c86b3b5ba45064f89c10775120da8deabb7
SHA2566cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2
SHA5123552db20ac0013f647384383016e2eb49f28525848b5a5ab9609a8f0e88f26b8c5b6c47e9558619b54d697e956bf1880793b13f011caab7aeffa095ec7fc9d14
-
Filesize
711B
MD51eb19505e501776ce278354d82983b2b
SHA1bd465c493d7869c02a39a058b193635235042c18
SHA2569f1c107a423253847d01dde673a137306639362f4ba2c6b72057d0428b14e7e5
SHA51240e746543203568d630516a20a039dfe391aa82b43ad3fc8a6000597b2b73023ddd0123464fc2a581f72ca33e534cdb0b7fd09664ff25e93a64fa367446f2f87
-
Filesize
487B
MD54d3c0068f327a7e1c6c5b0110391b7c6
SHA1c94c2180b0b2d09c0ed8d1e1a3cd01d65a552a23
SHA256618d826bd8eb0e6f9a44e23837b4376bcbde4b746132ec396a5a8f389d2f665a
SHA5129c38be1be4fcf19d51a468bb512bbfaafd29989e7e66c7e886176011bf8bf6f0727614b34d023ca2acc46db1886785009ded11c6914cdf8925fcb6cf13ecaf6c