Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 18:24

General

  • Target

    a56e046d587cf2a6351bbf456ce47982f4aa1c9a6248ead75d734dce42d80fe8.exe

  • Size

    2.8MB

  • MD5

    0654ee38b256d8b4ed07199928fa95e6

  • SHA1

    7ae32ebec9dbf435c5ac41dea6a9e8875af291bc

  • SHA256

    a56e046d587cf2a6351bbf456ce47982f4aa1c9a6248ead75d734dce42d80fe8

  • SHA512

    097ec294941531541bac08a9554685b822e025f4c942f222ab26ddb23bcfa808e6609d6c503770c5ff59fd4fb680f9fec60f7f80ad5395624b246da7994af1f9

  • SSDEEP

    49152:UbA30r0LzsdjjjjJFL+wkwyrcRn6VrrPnfqfLldfHUc5cqTQ:UbfSzsdjtB+wkPYxW/PnfqLf0c5fQ

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a56e046d587cf2a6351bbf456ce47982f4aa1c9a6248ead75d734dce42d80fe8.exe
    "C:\Users\Admin\AppData\Local\Temp\a56e046d587cf2a6351bbf456ce47982f4aa1c9a6248ead75d734dce42d80fe8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\mshyperbrowserDhcp\u8XHddY9GzRDEZBlqmsNRuAICg2F.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\mshyperbrowserDhcp\0kMrxRyKYn.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2468
        • C:\mshyperbrowserDhcp\comMonitornet.exe
          "C:\mshyperbrowserDhcp\comMonitornet.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2816
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\42CEn0iP2b.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1300
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:2824
              • C:\Recovery\be1ea442-3b12-11ef-b767-d2f1755c8afd\Idle.exe
                "C:\Recovery\be1ea442-3b12-11ef-b767-d2f1755c8afd\Idle.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1724
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ae1af305-0c9e-4d4f-8389-5fcc45ceb63a.vbs"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1144
                  • C:\Recovery\be1ea442-3b12-11ef-b767-d2f1755c8afd\Idle.exe
                    C:\Recovery\be1ea442-3b12-11ef-b767-d2f1755c8afd\Idle.exe
                    8⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3000
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\be564c26-50a1-4e90-9221-45df741c4c37.vbs"
                      9⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1868
                      • C:\Recovery\be1ea442-3b12-11ef-b767-d2f1755c8afd\Idle.exe
                        C:\Recovery\be1ea442-3b12-11ef-b767-d2f1755c8afd\Idle.exe
                        10⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:876
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e5d40cc0-f143-402d-9a51-bcff0ffa8851.vbs"
                          11⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2560
                          • C:\Recovery\be1ea442-3b12-11ef-b767-d2f1755c8afd\Idle.exe
                            C:\Recovery\be1ea442-3b12-11ef-b767-d2f1755c8afd\Idle.exe
                            12⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:2744
                            • C:\Windows\System32\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\99f0a14d-40e8-4ae8-97a2-c9d3e7b13bbd.vbs"
                              13⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2724
                              • C:\Recovery\be1ea442-3b12-11ef-b767-d2f1755c8afd\Idle.exe
                                C:\Recovery\be1ea442-3b12-11ef-b767-d2f1755c8afd\Idle.exe
                                14⤵
                                • Executes dropped EXE
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:1380
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c91e7c8e-2b65-4baa-98dd-d6e05a9bab60.vbs"
                                  15⤵
                                    PID:2320
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bfac1cf8-6976-4497-ba69-d98652d18d7b.vbs"
                                    15⤵
                                      PID:2296
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9ab6f62e-e995-4ddd-a7d0-56e3b7ca3035.vbs"
                                  13⤵
                                    PID:2800
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9f3a1bcb-c8c3-4571-8db5-ae12ce88088c.vbs"
                                11⤵
                                  PID:1496
                            • C:\Windows\System32\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b2c7e5b9-6951-48b7-8858-e2d9529a0dec.vbs"
                              9⤵
                                PID:2136
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dddb9775-6f35-498d-9125-fc4eb7c33abb.vbs"
                            7⤵
                              PID:836
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\mshyperbrowserDhcp\smss.exe'" /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2636
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\mshyperbrowserDhcp\smss.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2044
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\mshyperbrowserDhcp\smss.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2620
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Recovery\be1ea442-3b12-11ef-b767-d2f1755c8afd\Idle.exe'" /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:3012
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\be1ea442-3b12-11ef-b767-d2f1755c8afd\Idle.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2220
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Recovery\be1ea442-3b12-11ef-b767-d2f1755c8afd\Idle.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:828

                Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        e12d0a46722b357ba80641cae3fa1c1a

                        SHA1

                        a88e9a3eeafa15ad5ce4163ecd21a68df5cdd3d0

                        SHA256

                        284d4c23b67ccb62e8315b553f13288f6171eb0149aaac4f19323ba39e2ed1ef

                        SHA512

                        c298dfd88ad9f88266635c9392427398cd2d7487153707443b2dc11f51a9200db1da05593e2951a0dc12f4805a8960bc87303d33a0f6a20e9487425e627df668

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        a5c0693507d07085c562c297076de909

                        SHA1

                        cffc4965212bd2b5e3d42dcae8d18a90e42bb0d5

                        SHA256

                        6eeba843864e2f41a743af6356f2a441c97841e8a1ccb497d37a4450a8a18806

                        SHA512

                        aef6c35e6ee77c2592865d939cd0f839dc2210929379f6db7bdcde240bd10cc052acbc50accf8bfe8c4c6b080688879e61a9b8d551c92c1e3456b2dac6e054af

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        abedb0dfe8fa7c29860cc8f57ccb5479

                        SHA1

                        b31cb46b8de25787c1d6c1d896799d7b7c529660

                        SHA256

                        f37395419a188b052a4a5af346eab08fa2ca86289c117c2af0996d13e4b80193

                        SHA512

                        4dc056b2c03f5353be72a94407e1ca487389091d610703606609717dc6cee4ec39403659b1c898d3dc87ffde99498101edcdf7eb354d64045c966184ebe78e07

                      • C:\Users\Admin\AppData\Local\Temp\42CEn0iP2b.bat

                        Filesize

                        222B

                        MD5

                        f6d0ce08d988e93dfc80afb191c131ac

                        SHA1

                        2a654122e70ef772ac3d92818d86427b60163fbd

                        SHA256

                        4d4c783ae930e340a0f80f186b18f2b9e08b3b83c88a14a740e51d7fdaf4d387

                        SHA512

                        781a0170e5187478bc99c996303d6a89030b8fdc6f2b113efc44c6651fb8aca95ccf39418ae4759b632598b4a043bba484e111179eace10f7aef14c3a38210fe

                      • C:\Users\Admin\AppData\Local\Temp\99f0a14d-40e8-4ae8-97a2-c9d3e7b13bbd.vbs

                        Filesize

                        733B

                        MD5

                        9c7e9613ed50c5ced3c1f8fe2df1490b

                        SHA1

                        adb00e3a171f797cc6b64abe68079a2a4adb698d

                        SHA256

                        ece9b06ba5baeedfe7b77899430fe9a2ee8c52d3a02eceb062bee4ee1244dddf

                        SHA512

                        e0f0e4b4787f52fa5bf2da05a6b4d3ec2e9c0ea55baf6213cd023406c9e56784e1652d7bd2979ed796b7ae3eab4a4c40b595c92d3d1f4b4a20b7b6ac5b58195e

                      • C:\Users\Admin\AppData\Local\Temp\CabEFBE.tmp

                        Filesize

                        70KB

                        MD5

                        49aebf8cbd62d92ac215b2923fb1b9f5

                        SHA1

                        1723be06719828dda65ad804298d0431f6aff976

                        SHA256

                        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                        SHA512

                        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                      • C:\Users\Admin\AppData\Local\Temp\TarEFD0.tmp

                        Filesize

                        181KB

                        MD5

                        4ea6026cf93ec6338144661bf1202cd1

                        SHA1

                        a1dec9044f750ad887935a01430bf49322fbdcb7

                        SHA256

                        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                        SHA512

                        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                      • C:\Users\Admin\AppData\Local\Temp\ae1af305-0c9e-4d4f-8389-5fcc45ceb63a.vbs

                        Filesize

                        733B

                        MD5

                        a090372d6bbcc174ef8242f00177a24a

                        SHA1

                        923cc696a47f72d6e0c572a19ceaac27e5291c5a

                        SHA256

                        5ffae447089bd3cfd647d8025388e7bc6e86df4e83662b171183433abbc5a050

                        SHA512

                        b907f062fbda7cdc794148891451a3d4d5ca647f13a6aac8aece1b0fe0a3631d24966a0010694ceaafe0ded1a163fafce110054a9909d7e3cb4cd1c6149e6347

                      • C:\Users\Admin\AppData\Local\Temp\be564c26-50a1-4e90-9221-45df741c4c37.vbs

                        Filesize

                        733B

                        MD5

                        c8452abdd6dc7849e04552bcea68c0f0

                        SHA1

                        abed442d073a79ae064497c363a238a9c6b7fc43

                        SHA256

                        b4da82fda596b822dc55849c7da8920f2b184f3a89e031b4eb1d68634d9bb75d

                        SHA512

                        dd74f5ee5c61c45fcd246d3a4b9c0ee3993847466e54ec978e87bf3b03df885e00a9926f37f8849cffe9ecb1fa88fa950bc7f5e26d89facb8d0aa0acb4deb2a7

                      • C:\Users\Admin\AppData\Local\Temp\c91e7c8e-2b65-4baa-98dd-d6e05a9bab60.vbs

                        Filesize

                        733B

                        MD5

                        c95f698827c21aff941bfd77c31fc33f

                        SHA1

                        35043c7fa819e1e1ddd87556616a13aa39f8fe21

                        SHA256

                        77282edc196ba354d0b30f7c5e1565fbc426874d2d671f410cd4637159b15a7f

                        SHA512

                        f9e26609c91a3c8be3c2e830db9c64714898fba8f49c525ea1f94b0685c142f333fd1f3418d72a963e6e5ef6be0d25f33b60ce29bae63d7f64af9c3ddac991a3

                      • C:\Users\Admin\AppData\Local\Temp\dddb9775-6f35-498d-9125-fc4eb7c33abb.vbs

                        Filesize

                        509B

                        MD5

                        68d09ab4c4e654a5aaf8cfc182575f65

                        SHA1

                        dc92a05a02450626303829ed1caca50f7f2a86b4

                        SHA256

                        e3be7f666e219c617ebcd55b2af5ce09d088a332abfc8eb4ffb514a313bf5f92

                        SHA512

                        4bc5bd3071c9052ab9fb3c75b4a8dbbd584f165226001cffad7443b22a6c264e67818bc9a79c3aaa8d158c845e2d87972b081ec7d7f288b3254a5dac431852ce

                      • C:\Users\Admin\AppData\Local\Temp\e5d40cc0-f143-402d-9a51-bcff0ffa8851.vbs

                        Filesize

                        732B

                        MD5

                        a8705a8a957e76a5591caa7fe604df9b

                        SHA1

                        1e2ae4fbef61273a697049fd0e6df7fa808fb9ea

                        SHA256

                        b51feaadb37a32a6c6f1d3c3937d9068fe740cd6bfcc7b2c566b38b20824ae50

                        SHA512

                        ccaf1c6150c9d500f6bda62fa5ea36dd631b00b707ba12fab21f932b818969bb09b0d3a846e5294ad6550372fb05775319ce0afb7a59bc6e9fa3ed49d14ba7d7

                      • C:\mshyperbrowserDhcp\0kMrxRyKYn.bat

                        Filesize

                        41B

                        MD5

                        71283ea80d338ca69f83762e42140f7e

                        SHA1

                        52917f7247310cd12e3aa46eb4973bbd0896964e

                        SHA256

                        d75dcc8cd332896335ceb8c9f6311a3fbc5229d781fd3b3f003d2a4ffeccbc37

                        SHA512

                        16bc0fb1cde163148b8aab797a781419b9c22762d5f42823ccc501845bcf6789074e978b7a147df1e739ec57218c67853222ea9543437570b6bfd64f1f7f644b

                      • C:\mshyperbrowserDhcp\comMonitornet.exe

                        Filesize

                        2.5MB

                        MD5

                        d7320f2d86f1c055f317934beb3361ea

                        SHA1

                        335faa6702c271b00612f1245bd5671151d39410

                        SHA256

                        ee390a94d7875ab0a6bc58d3b67252bc99e3d1c35b76049ead4397acd06816c2

                        SHA512

                        a7eb61e9c815415c8ec6cc7cbff07dedc50968b55dc234ad4f57ce7e2a1659b588dbb30a4721fdf8f79b02023e9d643ea62f113062fa94fdd769d04b7c6d8a56

                      • C:\mshyperbrowserDhcp\u8XHddY9GzRDEZBlqmsNRuAICg2F.vbe

                        Filesize

                        205B

                        MD5

                        80f3715d67b21f1f260f303b64504d41

                        SHA1

                        27f75be5b9871f0dc0a01d9fa3fb6d7f80a5bb81

                        SHA256

                        916a8770ab6f76a13518cc6ef8abae8826cd84695bc646bf62d0ab6e76a53bb7

                        SHA512

                        f4d2dde3f43cbb39ba4a243447200eb74cbecf53febf0289a0e610d6d3810a0031fe6b4c2e737377e6d276a10ecb7a731619b081feb52523cfe425e10e739aac

                      • memory/876-275-0x0000000000320000-0x0000000000376000-memory.dmp

                        Filesize

                        344KB

                      • memory/876-274-0x0000000000B30000-0x0000000000DB2000-memory.dmp

                        Filesize

                        2.5MB

                      • memory/1724-37-0x00000000005A0000-0x00000000005F6000-memory.dmp

                        Filesize

                        344KB

                      • memory/1724-36-0x0000000000D00000-0x0000000000F82000-memory.dmp

                        Filesize

                        2.5MB

                      • memory/2744-395-0x0000000000AB0000-0x0000000000B06000-memory.dmp

                        Filesize

                        344KB

                      • memory/2744-394-0x0000000000D60000-0x0000000000FE2000-memory.dmp

                        Filesize

                        2.5MB

                      • memory/2744-396-0x0000000000380000-0x0000000000392000-memory.dmp

                        Filesize

                        72KB

                      • memory/2816-20-0x0000000000B50000-0x0000000000B5C000-memory.dmp

                        Filesize

                        48KB

                      • memory/2816-18-0x0000000000AD0000-0x0000000000B26000-memory.dmp

                        Filesize

                        344KB

                      • memory/2816-22-0x0000000000CD0000-0x0000000000CDA000-memory.dmp

                        Filesize

                        40KB

                      • memory/2816-19-0x0000000000B20000-0x0000000000B32000-memory.dmp

                        Filesize

                        72KB

                      • memory/2816-21-0x0000000000CC0000-0x0000000000CC8000-memory.dmp

                        Filesize

                        32KB

                      • memory/2816-16-0x0000000000AA0000-0x0000000000AA8000-memory.dmp

                        Filesize

                        32KB

                      • memory/2816-17-0x0000000000AB0000-0x0000000000AC6000-memory.dmp

                        Filesize

                        88KB

                      • memory/2816-13-0x0000000001210000-0x0000000001492000-memory.dmp

                        Filesize

                        2.5MB

                      • memory/2816-14-0x0000000000540000-0x000000000054E000-memory.dmp

                        Filesize

                        56KB

                      • memory/2816-24-0x0000000000D70000-0x0000000000D7C000-memory.dmp

                        Filesize

                        48KB

                      • memory/2816-23-0x0000000000D60000-0x0000000000D6E000-memory.dmp

                        Filesize

                        56KB

                      • memory/2816-15-0x0000000000550000-0x000000000056C000-memory.dmp

                        Filesize

                        112KB

                      • memory/3000-154-0x00000000000C0000-0x0000000000342000-memory.dmp

                        Filesize

                        2.5MB

                      • memory/3000-155-0x00000000009B0000-0x00000000009C2000-memory.dmp

                        Filesize

                        72KB