Analysis

  • max time kernel
    144s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 11:41

General

  • Target

    5614b417cca4217b0a1a4a4a081f9f43.exe

  • Size

    831KB

  • MD5

    5614b417cca4217b0a1a4a4a081f9f43

  • SHA1

    6597f30054da2fcea4f5c37121a0581b1a93781b

  • SHA256

    0993c5335a17f17141e1be3f1936fa420e69c33bebedcd39d01bc527f6cd7d96

  • SHA512

    bed2ed22e5759aa7d4beac74d0b3cfaf7a045c70dc3ab97c490b978a365b741fd6257a64cf3cdf3f0653febd1176cd5278e57347dbc11d55c9513aa2c7777e12

  • SSDEEP

    12288:xmhMcbVbcxC9wcb8QyKJT2ediDP78OK1CALBuMOh7x:xmRVbcxCWKyKJT2Z4xi

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 15 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5614b417cca4217b0a1a4a4a081f9f43.exe
    "C:\Users\Admin\AppData\Local\Temp\5614b417cca4217b0a1a4a4a081f9f43.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1UeGdALQqr.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:3020
        • C:\Users\Default\Documents\RuntimeBroker.exe
          "C:\Users\Default\Documents\RuntimeBroker.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4592
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Documents\RuntimeBroker.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1072
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default\Documents\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4464
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Documents\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4876
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Program Files\Microsoft Office\PackageManifests\smss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4660
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\PackageManifests\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2680
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office\PackageManifests\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3476
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1612
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:5032
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4980
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "5614b417cca4217b0a1a4a4a081f9f435" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\5614b417cca4217b0a1a4a4a081f9f43.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4728
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "5614b417cca4217b0a1a4a4a081f9f43" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\5614b417cca4217b0a1a4a4a081f9f43.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1064
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "5614b417cca4217b0a1a4a4a081f9f435" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\5614b417cca4217b0a1a4a4a081f9f43.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:640
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Mozilla Firefox\browser\VisualElements\System.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3148
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\browser\VisualElements\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3800
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Program Files\Mozilla Firefox\browser\VisualElements\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:768

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\Mozilla Firefox\browser\VisualElements\System.exe

            Filesize

            831KB

            MD5

            5614b417cca4217b0a1a4a4a081f9f43

            SHA1

            6597f30054da2fcea4f5c37121a0581b1a93781b

            SHA256

            0993c5335a17f17141e1be3f1936fa420e69c33bebedcd39d01bc527f6cd7d96

            SHA512

            bed2ed22e5759aa7d4beac74d0b3cfaf7a045c70dc3ab97c490b978a365b741fd6257a64cf3cdf3f0653febd1176cd5278e57347dbc11d55c9513aa2c7777e12

          • C:\Users\Admin\AppData\Local\Temp\1UeGdALQqr.bat

            Filesize

            209B

            MD5

            0045aa2fad12a0ab69ff15f46a654b9f

            SHA1

            d2183da6e53ff9579eb0e5a49e1c35244835b8f0

            SHA256

            e0cdcd5b3d2cbc26ceb9b8289811dd7e133f965a10594f7b43cbcd0ede937a94

            SHA512

            65aa08a8c77d47910a8686d3df26a74628b3b6428afde835023a8c825d58b1e101a8d029482c0728d0f72df75458cf3ffd9294c2e1ffe8dfebe8c93dc5aee7ae

          • memory/1660-0-0x00007FF810C13000-0x00007FF810C15000-memory.dmp

            Filesize

            8KB

          • memory/1660-1-0x00000000002E0000-0x00000000003B8000-memory.dmp

            Filesize

            864KB

          • memory/1660-4-0x00007FF810C10000-0x00007FF8116D1000-memory.dmp

            Filesize

            10.8MB

          • memory/1660-19-0x00007FF810C10000-0x00007FF8116D1000-memory.dmp

            Filesize

            10.8MB