Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 01:11
Behavioral task
behavioral1
Sample
2f49d5afa516d56f39663428ff111295df5dbddf2bbe6c64c049c67348cbcedf.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2f49d5afa516d56f39663428ff111295df5dbddf2bbe6c64c049c67348cbcedf.exe
Resource
win10v2004-20240802-en
General
-
Target
2f49d5afa516d56f39663428ff111295df5dbddf2bbe6c64c049c67348cbcedf.exe
-
Size
1.1MB
-
MD5
4f486217bd3e8bef8a8ba6c89f9f4ee3
-
SHA1
685829b39898a12fcddb60625c528885033043a3
-
SHA256
2f49d5afa516d56f39663428ff111295df5dbddf2bbe6c64c049c67348cbcedf
-
SHA512
7dd9bfca5c791e4a7821b6d2d9e04408530bfbcaf03a21a5d9daf1b85ac00c15a625f843cc49239366f2d15a3dbbd4b8e6442ec41331c87cdbdd7221693b6244
-
SSDEEP
24576:U2G/nvxW3Ww0t0uNRedfgl+rRBPwFqemEUcg4:UbA3002BKjAq5Q
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1268 2492 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4544 2492 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5000 2492 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2512 2492 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3744 2492 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4360 2492 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2444 2492 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2092 2492 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1552 2492 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4144 2492 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5072 2492 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 868 2492 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4636 2492 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1084 2492 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5084 2492 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 2492 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 816 2492 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5016 2492 schtasks.exe 92 -
resource yara_rule behavioral2/files/0x00070000000234a6-10.dat dcrat behavioral2/memory/4368-13-0x0000000000200000-0x00000000002D6000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation 2f49d5afa516d56f39663428ff111295df5dbddf2bbe6c64c049c67348cbcedf.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation blockproviderPerf.exe -
Executes dropped EXE 2 IoCs
pid Process 4368 blockproviderPerf.exe 1844 cmd.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Mail\cmd.exe blockproviderPerf.exe File opened for modification C:\Program Files (x86)\Windows Mail\cmd.exe blockproviderPerf.exe File created C:\Program Files (x86)\Windows Mail\ebf1f9fa8afd6d blockproviderPerf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f49d5afa516d56f39663428ff111295df5dbddf2bbe6c64c049c67348cbcedf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings 2f49d5afa516d56f39663428ff111295df5dbddf2bbe6c64c049c67348cbcedf.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings blockproviderPerf.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2092 schtasks.exe 4144 schtasks.exe 868 schtasks.exe 4544 schtasks.exe 5016 schtasks.exe 4636 schtasks.exe 1740 schtasks.exe 816 schtasks.exe 5072 schtasks.exe 5000 schtasks.exe 2512 schtasks.exe 3744 schtasks.exe 4360 schtasks.exe 2444 schtasks.exe 1552 schtasks.exe 1084 schtasks.exe 1268 schtasks.exe 5084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4368 blockproviderPerf.exe 4368 blockproviderPerf.exe 4368 blockproviderPerf.exe 4368 blockproviderPerf.exe 4368 blockproviderPerf.exe 1844 cmd.exe 1844 cmd.exe 1844 cmd.exe 1844 cmd.exe 1844 cmd.exe 1844 cmd.exe 1844 cmd.exe 1844 cmd.exe 1844 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1844 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4368 blockproviderPerf.exe Token: SeDebugPrivilege 1844 cmd.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2920 wrote to memory of 3132 2920 2f49d5afa516d56f39663428ff111295df5dbddf2bbe6c64c049c67348cbcedf.exe 85 PID 2920 wrote to memory of 3132 2920 2f49d5afa516d56f39663428ff111295df5dbddf2bbe6c64c049c67348cbcedf.exe 85 PID 2920 wrote to memory of 3132 2920 2f49d5afa516d56f39663428ff111295df5dbddf2bbe6c64c049c67348cbcedf.exe 85 PID 3132 wrote to memory of 452 3132 WScript.exe 96 PID 3132 wrote to memory of 452 3132 WScript.exe 96 PID 3132 wrote to memory of 452 3132 WScript.exe 96 PID 452 wrote to memory of 4368 452 cmd.exe 98 PID 452 wrote to memory of 4368 452 cmd.exe 98 PID 4368 wrote to memory of 372 4368 blockproviderPerf.exe 117 PID 4368 wrote to memory of 372 4368 blockproviderPerf.exe 117 PID 372 wrote to memory of 1848 372 cmd.exe 119 PID 372 wrote to memory of 1848 372 cmd.exe 119 PID 372 wrote to memory of 1844 372 cmd.exe 120 PID 372 wrote to memory of 1844 372 cmd.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f49d5afa516d56f39663428ff111295df5dbddf2bbe6c64c049c67348cbcedf.exe"C:\Users\Admin\AppData\Local\Temp\2f49d5afa516d56f39663428ff111295df5dbddf2bbe6c64c049c67348cbcedf.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ServerDhcp\AQOMybq.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ServerDhcp\VwXUKm0r1lmZiu0QP.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\ServerDhcp\blockproviderPerf.exe"C:\ServerDhcp\blockproviderPerf.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0xb1FKji9F.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1848
-
-
C:\Program Files (x86)\Windows Mail\cmd.exe"C:\Program Files (x86)\Windows Mail\cmd.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Mail\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Mail\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 11 /tr "'C:\ServerDhcp\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\ServerDhcp\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 12 /tr "'C:\ServerDhcp\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Users\Default User\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205B
MD58314d8c2d53717584fed8b4b3271fba2
SHA12e10ec785f96b3c861b8cc0d062c779d0538fe21
SHA25644daab539f79fedf94b57343b2066d79b9d26592f67d1129b773bd19c114d29e
SHA512cdf5d7f9a119e4265b501f4df7ed2843290b93a0d51228b5099fb3f399972f91fb9e7ed2cac16d267926b8b89c5cfb7bbcbe9f14e9ebef2a09bce9dfdec10a5d
-
Filesize
37B
MD52790c1d05ce22b25e4ee541c721c5a6b
SHA18bd862c3cda6f3d86acfb44d58694fe0a7abcfb1
SHA256df7b97921dd91e94a9ebe754ca8373b738a19b76e32edfdc5af784cfdfc7d236
SHA512f81d44801a2150a65268efbdc473c1a00aff34faa225164dade1130a05883a605639e3d7266edcff557d54968857acd5527176f555ec6d10bff8958b712d91c4
-
Filesize
827KB
MD573c1c41b9e71c48e752a5cd19fe808b6
SHA1b8bd41a0b9dc7baef6eb01dfe6c852afdfaeed18
SHA256fce441edb227275c5380194cc7a96a95998de6d75cd601b73bce1be529a68bd6
SHA512f146a8917d39aa29d52386f5a23bbc01fbfade291d576782b5cc80b0ca363fa24fee80f00cf81ffa40e12503fedd203b422b7ad97dbb0d4500152e86d974cb38
-
Filesize
208B
MD58dce8f7c33d7d36122e0f31686c9d8e7
SHA107bc45e0270ce0ff3c23d5b454c5982e17e0070c
SHA25632022df9ec3a4e81d06aa9a30110652e28bfd6ad6bddf4594377eca197d809e9
SHA5123f2eb4bbd9ab29924206aa3001c963389bdf998acee6395b0dc43cf423e6b8b947c3f8ae3a7160756272ee99803055bc214e7b5b0911c68ffd46c0cca5b41809