Analysis

  • max time kernel
    18s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 04:08

General

  • Target

    6d88a5462b28fd339bc3d85d60c1a340N.exe

  • Size

    1.5MB

  • MD5

    6d88a5462b28fd339bc3d85d60c1a340

  • SHA1

    58116f47109092bd855cefa90820ee8e5fdd1346

  • SHA256

    1f9e61c82cd02f8cb6780816776425413962b725ad18078c3e905af5484db607

  • SHA512

    a69a83ab46f7842ae71335d98dbdaab7c94fbdaf977d7113370bcfebb59dae30fb1a1238a72587f4931cc1987b09fca493b51c11a6488068d46e8c75ce184353

  • SSDEEP

    24576:EU5vvCDsOPh09mqwTbgh6OATBjqh2y58fRbkTHn8zH3fFPciPHv+TiE9+4:1CemoYOqoylkTcj9EiPH9F

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 5 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 8 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d88a5462b28fd339bc3d85d60c1a340N.exe
    "C:\Users\Admin\AppData\Local\Temp\6d88a5462b28fd339bc3d85d60c1a340N.exe"
    1⤵
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2700
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FR8xG7c6eo.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2020
        • C:\ProgramData\Templates\spoolsv.exe
          "C:\ProgramData\Templates\spoolsv.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:1428
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\es-ES\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3068
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\ProgramData\Templates\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3000
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\api-ms-win-core-string-l1-1-0\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2668
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2640
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\InfDefaultInstall\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2176

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\FR8xG7c6eo.bat

      Filesize

      200B

      MD5

      dd97eaf71502b25d9ee247ec22249bbe

      SHA1

      472d69da21fe80f8397e057d7de9296dd991e7db

      SHA256

      b3b56eee7dd2e87edd812201b17ceed62bc1d0434a9f190fdd1eef9c99923240

      SHA512

      612fd1402a0c3a20563ee2942955db1dacc57289c5de36799b6fea032c83e07932b5a36747b6a15328550395bc9ebbde10b57a61331e5ab71c9e04e65371d2ce

    • C:\Windows\System32\InfDefaultInstall\dwm.exe

      Filesize

      1.5MB

      MD5

      6d88a5462b28fd339bc3d85d60c1a340

      SHA1

      58116f47109092bd855cefa90820ee8e5fdd1346

      SHA256

      1f9e61c82cd02f8cb6780816776425413962b725ad18078c3e905af5484db607

      SHA512

      a69a83ab46f7842ae71335d98dbdaab7c94fbdaf977d7113370bcfebb59dae30fb1a1238a72587f4931cc1987b09fca493b51c11a6488068d46e8c75ce184353

    • memory/1428-84-0x00000000001E0000-0x0000000000374000-memory.dmp

      Filesize

      1.6MB

    • memory/2700-17-0x0000000000550000-0x000000000055A000-memory.dmp

      Filesize

      40KB

    • memory/2700-7-0x0000000000430000-0x0000000000438000-memory.dmp

      Filesize

      32KB

    • memory/2700-18-0x0000000000530000-0x0000000000538000-memory.dmp

      Filesize

      32KB

    • memory/2700-4-0x00000000003E0000-0x00000000003E8000-memory.dmp

      Filesize

      32KB

    • memory/2700-21-0x0000000000570000-0x000000000057C000-memory.dmp

      Filesize

      48KB

    • memory/2700-8-0x00000000004F0000-0x00000000004FC000-memory.dmp

      Filesize

      48KB

    • memory/2700-9-0x0000000000510000-0x000000000051A000-memory.dmp

      Filesize

      40KB

    • memory/2700-10-0x0000000000450000-0x000000000045A000-memory.dmp

      Filesize

      40KB

    • memory/2700-13-0x0000000000520000-0x0000000000528000-memory.dmp

      Filesize

      32KB

    • memory/2700-12-0x0000000000460000-0x0000000000468000-memory.dmp

      Filesize

      32KB

    • memory/2700-11-0x0000000000420000-0x0000000000428000-memory.dmp

      Filesize

      32KB

    • memory/2700-20-0x0000000000560000-0x0000000000568000-memory.dmp

      Filesize

      32KB

    • memory/2700-15-0x0000000000500000-0x000000000050C000-memory.dmp

      Filesize

      48KB

    • memory/2700-0-0x000007FEF5873000-0x000007FEF5874000-memory.dmp

      Filesize

      4KB

    • memory/2700-5-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/2700-6-0x0000000000410000-0x000000000041C000-memory.dmp

      Filesize

      48KB

    • memory/2700-14-0x00000000003F0000-0x00000000003F8000-memory.dmp

      Filesize

      32KB

    • memory/2700-19-0x0000000000440000-0x000000000044A000-memory.dmp

      Filesize

      40KB

    • memory/2700-16-0x0000000000540000-0x0000000000548000-memory.dmp

      Filesize

      32KB

    • memory/2700-22-0x0000000000580000-0x000000000058C000-memory.dmp

      Filesize

      48KB

    • memory/2700-24-0x00000000005B0000-0x00000000005BA000-memory.dmp

      Filesize

      40KB

    • memory/2700-23-0x0000000000B30000-0x0000000000B38000-memory.dmp

      Filesize

      32KB

    • memory/2700-27-0x000007FEF5870000-0x000007FEF625C000-memory.dmp

      Filesize

      9.9MB

    • memory/2700-3-0x00000000003D0000-0x00000000003DC000-memory.dmp

      Filesize

      48KB

    • memory/2700-39-0x000007FEF5870000-0x000007FEF625C000-memory.dmp

      Filesize

      9.9MB

    • memory/2700-67-0x000007FEF5870000-0x000007FEF625C000-memory.dmp

      Filesize

      9.9MB

    • memory/2700-2-0x000007FEF5870000-0x000007FEF625C000-memory.dmp

      Filesize

      9.9MB

    • memory/2700-81-0x000007FEF5870000-0x000007FEF625C000-memory.dmp

      Filesize

      9.9MB

    • memory/2700-1-0x0000000000BA0000-0x0000000000D34000-memory.dmp

      Filesize

      1.6MB