Analysis

  • max time kernel
    1796s
  • max time network
    1801s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2024, 16:32

General

  • Target

    DDWDWDEFWFWFW.exe

  • Size

    1.1MB

  • MD5

    0b866728f53216298c5838001327a956

  • SHA1

    537e8cb306ae03886ead31213a51c07cb383843b

  • SHA256

    a7bce36c1b3ec137cc3e5f862de32a8eac49f8c224d5e4f9ed7362eb0ef5f331

  • SHA512

    06f2a9de1804344440e69546230e55772ab44027a9fa7f4aa01ae5a0362813de87f206bb7d28f93cbd1eebb5de0703b2af2e5694c97e2c26a9901e3cebc23d5c

  • SSDEEP

    24576:U2G/nvxW3Ww0tF6hojpO2kdXp/oejF5vBqf6jn:UbA30ghojidXnj1b

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 21 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 19 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 21 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\DDWDWDEFWFWFW.exe
    "C:\Users\Admin\AppData\Local\Temp\DDWDWDEFWFWFW.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3816
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\blockSurrogateproviderDriver\yxVFrgHnPUQhIhJ9dInhupQ.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1788
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\blockSurrogateproviderDriver\BnIRrLeddeMqLEk8Oz77030QB.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1236
        • C:\blockSurrogateproviderDriver\portWeb.exe
          "C:\blockSurrogateproviderDriver\portWeb.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4644
          • C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe
            "C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe"
            5⤵
            • Executes dropped EXE
            • Sets desktop wallpaper using registry
            • Modifies Control Panel
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2176
            • C:\Windows\SYSTEM32\cmd.exe
              "cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\\XFk51gP3Gp.bat"
              6⤵
                PID:4448
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2972
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3224
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3568
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3372
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2992
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1388
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 6 /tr "'C:\blockSurrogateproviderDriver\unsecapp.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1040
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\blockSurrogateproviderDriver\unsecapp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3460
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 9 /tr "'C:\blockSurrogateproviderDriver\unsecapp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1100
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3968
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3560
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4512
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\blockSurrogateproviderDriver\taskhostw.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2036
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\blockSurrogateproviderDriver\taskhostw.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4452
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\blockSurrogateproviderDriver\taskhostw.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:732
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:520
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2268
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4924
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3496
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:684
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1688
    • C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe
      "C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2996
    • C:\blockSurrogateproviderDriver\unsecapp.exe
      C:\blockSurrogateproviderDriver\unsecapp.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4112
    • C:\blockSurrogateproviderDriver\taskhostw.exe
      C:\blockSurrogateproviderDriver\taskhostw.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4908
    • C:\Recovery\WindowsRE\SppExtComObj.exe
      C:\Recovery\WindowsRE\SppExtComObj.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3500
    • C:\Recovery\WindowsRE\upfc.exe
      C:\Recovery\WindowsRE\upfc.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:100
    • C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe
      "C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2452
    • C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe
      "C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1732
    • C:\blockSurrogateproviderDriver\unsecapp.exe
      C:\blockSurrogateproviderDriver\unsecapp.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4208
    • C:\blockSurrogateproviderDriver\taskhostw.exe
      C:\blockSurrogateproviderDriver\taskhostw.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4740
    • C:\Recovery\WindowsRE\SppExtComObj.exe
      C:\Recovery\WindowsRE\SppExtComObj.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4928
    • C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe
      "C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2136
    • C:\Recovery\WindowsRE\upfc.exe
      C:\Recovery\WindowsRE\upfc.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4612
    • C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe
      "C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1952
    • C:\blockSurrogateproviderDriver\unsecapp.exe
      C:\blockSurrogateproviderDriver\unsecapp.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4052
    • C:\blockSurrogateproviderDriver\taskhostw.exe
      C:\blockSurrogateproviderDriver\taskhostw.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:944
    • C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe
      "C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1100
    • C:\Recovery\WindowsRE\SppExtComObj.exe
      C:\Recovery\WindowsRE\SppExtComObj.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2192

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\upfc.exe.log

      Filesize

      1KB

      MD5

      baf55b95da4a601229647f25dad12878

      SHA1

      abc16954ebfd213733c4493fc1910164d825cac8

      SHA256

      ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

      SHA512

      24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

    • C:\Users\Admin\AppData\Local\Temp\XFk51gP3Gp.bat

      Filesize

      44B

      MD5

      d22873a432ee310a81b55f9ed9076a35

      SHA1

      6634f60bd1c924a0c4161912a9671e2f55dee4ac

      SHA256

      8a4f4e4f942104f2a61a587767f560fe2cfce39eae69bf1b971ca0776ff2fd23

      SHA512

      31a0dd03ee4c113287a484425736d921f87ce705d5062d7f7af56d1a7539f9ef6e05904adb10ab162672c52e63df064c34b6f5d8bb431031735e042e186b6eae

    • C:\blockSurrogateproviderDriver\BnIRrLeddeMqLEk8Oz77030QB.bat

      Filesize

      45B

      MD5

      aade567d575a20d4cd32465999a0a616

      SHA1

      1557e726501a9bc68b39433318c6068ac398b974

      SHA256

      ac261f0e3cb9b69deb773ec6ed38a3c31fe254b8719f686364f9f72b0458ef0b

      SHA512

      55042546300dd8cfe3ee0c4302eedd199331249c262b3c0c29a854621953efd3cfac401228e48ee03e8e39bd411de119de5ee3191f8d9d668465fc59bc3916ce

    • C:\blockSurrogateproviderDriver\portWeb.exe

      Filesize

      827KB

      MD5

      d361a74aa9f84d0c66083ef19fd60aa1

      SHA1

      a73b6068d1e052759c40a72ca371eb2f3cabf340

      SHA256

      34e8398110cca41b98248521e131484f9d3a203dba09a5a97f18d252bbb0cd82

      SHA512

      9fdf085f90aadd77b50c76296cd96cecd9573edb0fe7470f7e1800c232d494da0811e1ddb8beeb907a20051ed22b6a1c879e6f2ba5ca9d00281df373c11f0d85

    • C:\blockSurrogateproviderDriver\yxVFrgHnPUQhIhJ9dInhupQ.vbe

      Filesize

      230B

      MD5

      f9709c347a5df84085285a6c9e2e1198

      SHA1

      39d766f701bd6f1324513ecbbf0975d4ebdd4cd4

      SHA256

      e332c5e30bd1c4bdaa0422c27d2c26089a9a9cf52b1303a41a8600a614ac5f12

      SHA512

      9753519a72b5b8de527a17cf8848afb81091dab7d9adb518154a7ea7af817c1384cdfc2d831b687c90a775895b549ba1b7f313393a856efd6c15890cedbd4436

    • memory/2176-39-0x0000000001320000-0x0000000001330000-memory.dmp

      Filesize

      64KB

    • memory/2176-40-0x0000000001250000-0x0000000001260000-memory.dmp

      Filesize

      64KB

    • memory/2176-41-0x00000000012B0000-0x00000000012FA000-memory.dmp

      Filesize

      296KB

    • memory/4644-12-0x00007FF9D21B3000-0x00007FF9D21B5000-memory.dmp

      Filesize

      8KB

    • memory/4644-13-0x0000000000FE0000-0x00000000010B6000-memory.dmp

      Filesize

      856KB