Analysis

  • max time kernel
    150s
  • max time network
    165s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-08-2024 17:49

General

  • Target

    1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe

  • Size

    3.6MB

  • MD5

    4cf736359926f19077a4c21300613900

  • SHA1

    ccadc053294ab749b8588e96d970b2b9f68673eb

  • SHA256

    1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342

  • SHA512

    f06470ccf1777ae0b4dbf1fb55af6804178bb18bd92eb2da5d091acdadc93206ab94358698bf272353462cc56cee9a5453b0f8a251f989805a55ce76190dc64b

  • SSDEEP

    98304:ubzJfmjiWIkSsHIDR6ToISNCEVmC0LyZG7:ulmjPZSsoYoISNV0BLI2

Malware Config

Signatures

  • DcRat 14 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 12 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Disables Task Manager via registry modification
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe
    "C:\Users\Admin\AppData\Local\Temp\1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe"
    1⤵
    • DcRat
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3348
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\hyperChaincrtdhcp\W484khEzBTOw1PD2BkAq8Rq.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\hyperChaincrtdhcp\6ThdyFOhxVnd16OS.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3580
        • C:\hyperChaincrtdhcp\surrogatenetsvc.exe
          "C:\hyperChaincrtdhcp\surrogatenetsvc.exe"
          4⤵
          • DcRat
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2460
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\URQljcfPtk.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3632
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:3024
              • C:\Users\Default\Desktop\csrss.exe
                "C:\Users\Default\Desktop\csrss.exe"
                6⤵
                • UAC bypass
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:484
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ec41b82c-e465-4557-87f6-aa0e536adc8b.vbs"
                  7⤵
                    PID:2824
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0a7852c7-aa85-4825-8a70-582de4ad4ba3.vbs"
                    7⤵
                      PID:920
              • C:\Windows\SysWOW64\reg.exe
                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                4⤵
                • System Location Discovery: System Language Discovery
                • Modifies registry key
                PID:2464
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\hyperChaincrtdhcp\file.vbs"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:3076
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "ApplicationFrameHostA" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\ApplicationFrameHost.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4112
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "ApplicationFrameHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\ApplicationFrameHost.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1104
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "ApplicationFrameHostA" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\ApplicationFrameHost.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1860
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Windows\AppPatch\en-US\OfficeClickToRun.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2516
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\AppPatch\en-US\OfficeClickToRun.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4628
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Windows\AppPatch\en-US\OfficeClickToRun.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:704
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Desktop\csrss.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1636
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default\Desktop\csrss.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4744
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Desktop\csrss.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3056
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\hyperChaincrtdhcp\dllhost.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:5100
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\hyperChaincrtdhcp\dllhost.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4880
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\hyperChaincrtdhcp\dllhost.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4892
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3992
        • C:\Windows\system32\wbem\WmiApSrv.exe
          C:\Windows\system32\wbem\WmiApSrv.exe
          1⤵
            PID:3284

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\0a7852c7-aa85-4825-8a70-582de4ad4ba3.vbs

            Filesize

            486B

            MD5

            84970241ca7650b46e9f1ecdfc692e4e

            SHA1

            67c093f88f817ffaec93bb2ae49ed6661810b4df

            SHA256

            ca2c387518755296d8718e68fa201559868ea8282dbb2527a9e38c4c9dda6a17

            SHA512

            59440e73ebc800c6bacda91eeb1ad52dd1ad5d4a72ca0cdd7acc137531d0cffa41d71969cf2eee6665c47fa456e5805d04bd7efad0c263c6ade758894f402bd4

          • C:\Users\Admin\AppData\Local\Temp\URQljcfPtk.bat

            Filesize

            199B

            MD5

            ce5aad0abbc7733980295bb8e5653d7d

            SHA1

            86dcd0a6162e47a19e6806d94a27cb7d5cd6fc8c

            SHA256

            64b33ce5c3c4ed49f925cac38fbedeba7554960202452c34eb9bc82822ed449c

            SHA512

            dd371f2e334817be1c834b2cacc3511643dcf81c3124e08dffe30ca3976c0fd2bc56060e2e6177cee13ed1ba34b75cba57a30d9f50fab4be1f605a43b5e26dec

          • C:\Users\Admin\AppData\Local\Temp\ec41b82c-e465-4557-87f6-aa0e536adc8b.vbs

            Filesize

            709B

            MD5

            dab95fd326d52d71931c7c332e869b3b

            SHA1

            b694fda2ebecf39f798a833f7a2f0d79864446ad

            SHA256

            8a9d04b5aef6161155b2f8233d161cf277246d4bf6f9a029f705152ef4c0e240

            SHA512

            55a4b636d85c30c19bc375df75867cb08c619376dc48bf7590cc16661624732a44ad256c414952b7c1dc28f1d3c2f88b95918c6b2236a752a842e691e890ec55

          • C:\hyperChaincrtdhcp\6ThdyFOhxVnd16OS.bat

            Filesize

            165B

            MD5

            b3a5b424617b3b0c12b97a029f703e70

            SHA1

            2cf751234ee9482ba6478d277c7485c70663cc3f

            SHA256

            37f84b4794429f2dbb20d445d7e643940819168923b3698fec1a66dfbef1529a

            SHA512

            f07fc8ce678b8e11bb86afc69531b16d905d04bc3bb6ac138d3a57bd225775ee47dbbc25ef6b62010a59e21fb6bcaa0ed990fa08725114c0c3f347720d8ee397

          • C:\hyperChaincrtdhcp\W484khEzBTOw1PD2BkAq8Rq.vbe

            Filesize

            221B

            MD5

            f7f659a7d4d5e1d041b9bb28858d3424

            SHA1

            3b35c04183e961d87d3cde33225677eabca19783

            SHA256

            d06e295ba89042d20c86a71cf3840117afaac582ce6353c4f94f7be4d67cb298

            SHA512

            9ed6fab84e566e119a7ad6af57f6876a40d1a6abea3c9c2e1dd08dcf7823d15e0365be4b5b7158a26edfb1f8be8180a3633d2fb2b32932b15aaedd5605f8e8b3

          • C:\hyperChaincrtdhcp\file.vbs

            Filesize

            34B

            MD5

            677cc4360477c72cb0ce00406a949c61

            SHA1

            b679e8c3427f6c5fc47c8ac46cd0e56c9424de05

            SHA256

            f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b

            SHA512

            7cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a

          • C:\hyperChaincrtdhcp\surrogatenetsvc.exe

            Filesize

            3.3MB

            MD5

            65c542e08ee66cd5954e6cd63a71b352

            SHA1

            b1e4e2ee05e63e084ec06300706b55f8f2267303

            SHA256

            31d1c930871005d4da7e67478a2a44faef8842a135769114cb1ff65488671a2e

            SHA512

            8d626876d0709c9ed5514d02841620dd612f1d496a14dea595f2069c1eac352678cccd4ebccde6b5d430c42d3161d9fae29f59d9ce31251051e8090d8cfe9335

          • memory/484-83-0x000000001F060000-0x000000001F222000-memory.dmp

            Filesize

            1.8MB

          • memory/484-73-0x0000000001BF0000-0x0000000001C02000-memory.dmp

            Filesize

            72KB

          • memory/2460-37-0x000000001BD80000-0x000000001BD8C000-memory.dmp

            Filesize

            48KB

          • memory/2460-44-0x000000001BE10000-0x000000001BE1C000-memory.dmp

            Filesize

            48KB

          • memory/2460-25-0x000000001B610000-0x000000001B618000-memory.dmp

            Filesize

            32KB

          • memory/2460-27-0x000000001BC50000-0x000000001BC66000-memory.dmp

            Filesize

            88KB

          • memory/2460-28-0x000000001BC70000-0x000000001BC78000-memory.dmp

            Filesize

            32KB

          • memory/2460-29-0x000000001BE00000-0x000000001BE12000-memory.dmp

            Filesize

            72KB

          • memory/2460-30-0x000000001BC80000-0x000000001BC8C000-memory.dmp

            Filesize

            48KB

          • memory/2460-31-0x000000001BCE0000-0x000000001BCE8000-memory.dmp

            Filesize

            32KB

          • memory/2460-32-0x000000001BCF0000-0x000000001BD00000-memory.dmp

            Filesize

            64KB

          • memory/2460-33-0x000000001BD00000-0x000000001BD0A000-memory.dmp

            Filesize

            40KB

          • memory/2460-34-0x000000001BD10000-0x000000001BD66000-memory.dmp

            Filesize

            344KB

          • memory/2460-35-0x000000001BD60000-0x000000001BD6C000-memory.dmp

            Filesize

            48KB

          • memory/2460-36-0x000000001BD70000-0x000000001BD78000-memory.dmp

            Filesize

            32KB

          • memory/2460-24-0x000000001BC90000-0x000000001BCE0000-memory.dmp

            Filesize

            320KB

          • memory/2460-38-0x000000001BD90000-0x000000001BD98000-memory.dmp

            Filesize

            32KB

          • memory/2460-39-0x000000001BDA0000-0x000000001BDB2000-memory.dmp

            Filesize

            72KB

          • memory/2460-40-0x000000001C540000-0x000000001CA66000-memory.dmp

            Filesize

            5.1MB

          • memory/2460-41-0x000000001BDD0000-0x000000001BDDC000-memory.dmp

            Filesize

            48KB

          • memory/2460-42-0x000000001BDE0000-0x000000001BDEC000-memory.dmp

            Filesize

            48KB

          • memory/2460-26-0x000000001BC40000-0x000000001BC50000-memory.dmp

            Filesize

            64KB

          • memory/2460-43-0x000000001BDF0000-0x000000001BDF8000-memory.dmp

            Filesize

            32KB

          • memory/2460-45-0x000000001BE20000-0x000000001BE2C000-memory.dmp

            Filesize

            48KB

          • memory/2460-47-0x000000001BE40000-0x000000001BE4C000-memory.dmp

            Filesize

            48KB

          • memory/2460-46-0x000000001BE30000-0x000000001BE38000-memory.dmp

            Filesize

            32KB

          • memory/2460-48-0x000000001BE50000-0x000000001BE5A000-memory.dmp

            Filesize

            40KB

          • memory/2460-49-0x000000001BE60000-0x000000001BE6E000-memory.dmp

            Filesize

            56KB

          • memory/2460-51-0x000000001BE80000-0x000000001BE8E000-memory.dmp

            Filesize

            56KB

          • memory/2460-50-0x000000001BE70000-0x000000001BE78000-memory.dmp

            Filesize

            32KB

          • memory/2460-52-0x000000001BE90000-0x000000001BE98000-memory.dmp

            Filesize

            32KB

          • memory/2460-53-0x000000001BEA0000-0x000000001BEAC000-memory.dmp

            Filesize

            48KB

          • memory/2460-54-0x000000001BEB0000-0x000000001BEB8000-memory.dmp

            Filesize

            32KB

          • memory/2460-55-0x000000001BEC0000-0x000000001BECA000-memory.dmp

            Filesize

            40KB

          • memory/2460-23-0x000000001B5F0000-0x000000001B60C000-memory.dmp

            Filesize

            112KB

          • memory/2460-22-0x000000001B5E0000-0x000000001B5E8000-memory.dmp

            Filesize

            32KB

          • memory/2460-21-0x0000000002BF0000-0x0000000002BFE000-memory.dmp

            Filesize

            56KB

          • memory/2460-20-0x0000000002BE0000-0x0000000002BEE000-memory.dmp

            Filesize

            56KB

          • memory/2460-19-0x00000000006A0000-0x00000000009FE000-memory.dmp

            Filesize

            3.4MB