Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 22:51
Behavioral task
behavioral1
Sample
2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe
Resource
win10v2004-20240508-en
General
-
Target
2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe
-
Size
1.2MB
-
MD5
2f77b6ba0d6b4cf6cb232c0e5aa2f999
-
SHA1
4bb0d8a5c6e42374d1a58b8b025bbf99cda42b77
-
SHA256
d5e776aa38d141a5621e492af32685568f2c527864caa72dad17ec08172bd223
-
SHA512
d434e987bcd3f8ee09501e2c4b600b7781d228bc465e54d0d016ae086d2eef18500832ebd78e1b7d75956ffb3ad621c77bb3cca45ca0dc57b00826aa2f2e8e8a
-
SSDEEP
24576:GiRX4ONyMaJtHAWwIh1zunez5ma3Z1tzVSzWdPnG:GiRX4jMD7R/a3Z1hf
Malware Config
Signatures
-
DcRat 15 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
pid Process 2760 schtasks.exe 2832 schtasks.exe 1332 schtasks.exe 2580 schtasks.exe 2960 schtasks.exe 2624 schtasks.exe 2964 schtasks.exe 2836 schtasks.exe 2828 schtasks.exe 2284 schtasks.exe 2360 schtasks.exe 2728 schtasks.exe 2752 schtasks.exe 2700 schtasks.exe 1312 schtasks.exe -
Modifies WinLogon for persistence 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\fc26e022-289f-11ef-a973-46d84c032646\\2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\fc26e022-289f-11ef-a973-46d84c032646\\2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe\", \"C:\\Recovery\\fc26e022-289f-11ef-a973-46d84c032646\\dllhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\fc26e022-289f-11ef-a973-46d84c032646\\2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe\", \"C:\\Recovery\\fc26e022-289f-11ef-a973-46d84c032646\\dllhost.exe\", \"C:\\Users\\Default User\\spoolsv.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\fc26e022-289f-11ef-a973-46d84c032646\\2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe\", \"C:\\Recovery\\fc26e022-289f-11ef-a973-46d84c032646\\dllhost.exe\", \"C:\\Users\\Default User\\spoolsv.exe\", \"C:\\Users\\Public\\Music\\dllhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\fc26e022-289f-11ef-a973-46d84c032646\\2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe\", \"C:\\Recovery\\fc26e022-289f-11ef-a973-46d84c032646\\dllhost.exe\", \"C:\\Users\\Default User\\spoolsv.exe\", \"C:\\Users\\Public\\Music\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\Idle.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe -
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2728 2856 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2832 2856 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2836 2856 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1332 2856 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 2856 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2752 2856 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2580 2856 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2624 2856 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 2856 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2284 2856 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2360 2856 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2960 2856 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2964 2856 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 2856 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1312 2856 schtasks.exe 28 -
resource yara_rule behavioral1/memory/2540-1-0x0000000000920000-0x0000000000A54000-memory.dmp dcrat behavioral1/files/0x0006000000016da9-15.dat dcrat behavioral1/memory/316-25-0x00000000008A0000-0x00000000009D4000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 316 dllhost.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Users\\Default User\\spoolsv.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Users\\Default User\\spoolsv.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Public\\Music\\dllhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Public\\Music\\dllhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\2f77b6ba0d6b4cf6cb232c0e5aa2f999 = "\"C:\\Recovery\\fc26e022-289f-11ef-a973-46d84c032646\\2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2f77b6ba0d6b4cf6cb232c0e5aa2f999 = "\"C:\\Recovery\\fc26e022-289f-11ef-a973-46d84c032646\\2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Recovery\\fc26e022-289f-11ef-a973-46d84c032646\\dllhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Recovery\\fc26e022-289f-11ef-a973-46d84c032646\\dllhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\Idle.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\Idle.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\CSC\v2.0.6\services.exe 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2360 schtasks.exe 2760 schtasks.exe 2728 schtasks.exe 2832 schtasks.exe 2828 schtasks.exe 1312 schtasks.exe 2580 schtasks.exe 2624 schtasks.exe 2284 schtasks.exe 2836 schtasks.exe 1332 schtasks.exe 2752 schtasks.exe 2700 schtasks.exe 2960 schtasks.exe 2964 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2540 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 2540 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 2540 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 2540 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 2540 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe 316 dllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 316 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2540 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Token: SeDebugPrivilege 316 dllhost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2796 2540 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 44 PID 2540 wrote to memory of 2796 2540 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 44 PID 2540 wrote to memory of 2796 2540 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 44 PID 2796 wrote to memory of 1756 2796 cmd.exe 46 PID 2796 wrote to memory of 1756 2796 cmd.exe 46 PID 2796 wrote to memory of 1756 2796 cmd.exe 46 PID 2796 wrote to memory of 316 2796 cmd.exe 47 PID 2796 wrote to memory of 316 2796 cmd.exe 47 PID 2796 wrote to memory of 316 2796 cmd.exe 47 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe"C:\Users\Admin\AppData\Local\Temp\2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\m5CkcR6d4r.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1756
-
-
C:\Users\Public\Music\dllhost.exe"C:\Users\Public\Music\dllhost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "2f77b6ba0d6b4cf6cb232c0e5aa2f9992" /sc MINUTE /mo 13 /tr "'C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "2f77b6ba0d6b4cf6cb232c0e5aa2f999" /sc ONLOGON /tr "'C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "2f77b6ba0d6b4cf6cb232c0e5aa2f9992" /sc MINUTE /mo 7 /tr "'C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\spoolsv.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Default User\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Music\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Public\Music\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Music\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1312
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD52f77b6ba0d6b4cf6cb232c0e5aa2f999
SHA14bb0d8a5c6e42374d1a58b8b025bbf99cda42b77
SHA256d5e776aa38d141a5621e492af32685568f2c527864caa72dad17ec08172bd223
SHA512d434e987bcd3f8ee09501e2c4b600b7781d228bc465e54d0d016ae086d2eef18500832ebd78e1b7d75956ffb3ad621c77bb3cca45ca0dc57b00826aa2f2e8e8a
-
Filesize
198B
MD58fc42d563dc9ab51bfb4bbf40bc7631d
SHA1a8c3f5f5a020f05884237fa3d43f26938a9a49fa
SHA256465c142e671003dac7f8d286ef9e802ac3c6fbe77db67ec97c48d3942e8a2d7f
SHA51219ace08a088574e3d2c6de5d3844131d91697019b315341859ea488df1179cc73e55138e5f2070cad7e0bfad1a871083586851b6097e9dfa924cdb043f3a0f79