Analysis

  • max time kernel
    103s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2024 03:48

General

  • Target

    69c5ea0a44027e82bab6de842c2736e0N.exe

  • Size

    2.6MB

  • MD5

    69c5ea0a44027e82bab6de842c2736e0

  • SHA1

    f9fca090c82aa851b94b6cb3f6a8e59d1eaf46ce

  • SHA256

    b26bd1c0f18de40e6123428988234b21640203431c5f66e2d602e805511f9e79

  • SHA512

    de370686ce72d5d4b42b9c445eab8bcc5f6ef0dd27d2e5e59dfc24fcb052e7ea4869fc690873b637bdc56ad363bf3c87a6a2e769aab2e9c4ec29a076d1dc9f6f

  • SSDEEP

    49152:UbA303peNkzjI6lp/5xblQ94oT4mbaUpCVvUwi2FUTGWK/ZJ8PFjw:UblYo/5xbGTT4J3VvRi5TGWsadw

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\69c5ea0a44027e82bab6de842c2736e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\69c5ea0a44027e82bab6de842c2736e0N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:460
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\PortsurrogateRefBroker\6O4ZKdsS9YLdfMGrXlv6UX.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4592
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\PortsurrogateRefBroker\PG5XI6tflf9wFGpWTuMeLdwspHl.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5020
        • C:\PortsurrogateRefBroker\agentWeb.exe
          "C:\PortsurrogateRefBroker\agentWeb.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4936
          • C:\Program Files\Windows Media Player\winlogon.exe
            "C:\Program Files\Windows Media Player\winlogon.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3872
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\PortsurrogateRefBroker\RuntimeBroker.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3220
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\PortsurrogateRefBroker\RuntimeBroker.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2456
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\PortsurrogateRefBroker\RuntimeBroker.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3784
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Common Files\dwm.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3328
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2712
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Common Files\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1800
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "TrustedInstallerT" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Recent\TrustedInstaller.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2136
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "TrustedInstaller" /sc ONLOGON /tr "'C:\Users\Default\Recent\TrustedInstaller.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2040
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "TrustedInstallerT" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Recent\TrustedInstaller.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4320
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Start Menu\conhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3376
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\All Users\Start Menu\conhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1760
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Start Menu\conhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3184
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Users\Default\NetHood\wininit.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4528
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Default\NetHood\wininit.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4724
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Users\Default\NetHood\wininit.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4000
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Media Player\winlogon.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4052
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4496
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Media Player\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PortsurrogateRefBroker\6O4ZKdsS9YLdfMGrXlv6UX.vbe

    Filesize

    226B

    MD5

    8fc7c988fab4354676da51a891e4dff8

    SHA1

    1f0f76c0877214ea21d83765a67142952073a04d

    SHA256

    3a98cbc48815b464d277a0df33d7b9945cf199a51fb95311dfd952d360534376

    SHA512

    cf1b2f1401b849a91cac570a8ac226d8c9c27be238d0950c7a1b53476c186272533db6508cf6d820d328904201ade44c6f6047f13882a0d5642ee37c372dad25

  • C:\PortsurrogateRefBroker\PG5XI6tflf9wFGpWTuMeLdwspHl.bat

    Filesize

    40B

    MD5

    852d2ba781fa5b950a28cbda58000a17

    SHA1

    539c6187f1ec6f5b70728c38c01a3606954eee8c

    SHA256

    19547e2acb53b7ad4c2bd6416ca40281671f7b1d05a6fffa0268e5563d59fb8a

    SHA512

    c8f8a83bca2332cb4073b01b0fbd81905e62f92702555769c4e3abf820f71744b4ecbdd267c4e5adbd2e78a2fdd1986641b08e1ebec41903a62c2bdf5b6d8a4b

  • C:\PortsurrogateRefBroker\agentWeb.exe

    Filesize

    2.3MB

    MD5

    bbb13ad585691ca7a1bfcff2d84a0a93

    SHA1

    0b8249606fbe8c30761f7ff891b8cff760bf8766

    SHA256

    bc8457cb02515ded80d0eff126064577b39cf4acc4bb76ff49b0c20841689310

    SHA512

    89042b70561185c99b876e44bf73fdaa8f205bbb05d89ab8276baea16dfb97e702d255cc18e86614b1e5b93462b11fa275898870736043a9a834d855f657ba31

  • memory/4936-12-0x00007FF8B22D3000-0x00007FF8B22D5000-memory.dmp

    Filesize

    8KB

  • memory/4936-13-0x0000000000BF0000-0x0000000000E3E000-memory.dmp

    Filesize

    2.3MB

  • memory/4936-14-0x000000001BF50000-0x000000001BF6C000-memory.dmp

    Filesize

    112KB

  • memory/4936-15-0x000000001BFC0000-0x000000001C010000-memory.dmp

    Filesize

    320KB

  • memory/4936-16-0x000000001BF70000-0x000000001BF86000-memory.dmp

    Filesize

    88KB

  • memory/4936-17-0x000000001C010000-0x000000001C066000-memory.dmp

    Filesize

    344KB

  • memory/4936-18-0x000000001BF90000-0x000000001BFA2000-memory.dmp

    Filesize

    72KB

  • memory/4936-19-0x000000001C950000-0x000000001CE78000-memory.dmp

    Filesize

    5.2MB

  • memory/4936-20-0x000000001C060000-0x000000001C06E000-memory.dmp

    Filesize

    56KB