Analysis
-
max time kernel
119s -
max time network
22s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
6c7fde4165740cae2be470e3560d4600N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6c7fde4165740cae2be470e3560d4600N.exe
Resource
win10v2004-20240802-en
General
-
Target
6c7fde4165740cae2be470e3560d4600N.exe
-
Size
1.7MB
-
MD5
6c7fde4165740cae2be470e3560d4600
-
SHA1
5598a613d702d5cf9eb578eab6b28f5d61ff3d63
-
SHA256
553e75e0d6c35cb71667c45af798ceaefd6468961a73562142536fe3e633136e
-
SHA512
61fa46b84fedfeb60f1ef2b3f232eca85e1d70dcbde049486614cbb9f5159e2278dd652da7c5f7dc5fd2de1eba4644a5e15af77d4cdf62351cc62134f2d3722f
-
SSDEEP
24576:Pqfj/pKWIEcpP2WtjiLjrjCv8AAaIJr2CuLpZ6dqCevofVOhZjgw9pmF8wQOToDX:yU1u5yvZABRgNgECevvsc/wQO0Dx
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2544 1632 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2560 1632 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2664 1632 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2596 1632 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1260 1632 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2532 1632 schtasks.exe 31 -
Executes dropped EXE 1 IoCs
pid Process 2908 6c7fde4165740cae2be470e3560d4600N.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\es-ES\csrss.exe 6c7fde4165740cae2be470e3560d4600N.exe File created C:\Program Files\Windows Sidebar\es-ES\886983d96e3d3e 6c7fde4165740cae2be470e3560d4600N.exe File opened for modification C:\Program Files\Windows Sidebar\es-ES\RCXF626.tmp 6c7fde4165740cae2be470e3560d4600N.exe File opened for modification C:\Program Files\Windows Sidebar\es-ES\RCXF627.tmp 6c7fde4165740cae2be470e3560d4600N.exe File opened for modification C:\Program Files\Windows Sidebar\es-ES\csrss.exe 6c7fde4165740cae2be470e3560d4600N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2544 schtasks.exe 2560 schtasks.exe 2664 schtasks.exe 2596 schtasks.exe 1260 schtasks.exe 2532 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2692 6c7fde4165740cae2be470e3560d4600N.exe 2692 6c7fde4165740cae2be470e3560d4600N.exe 2692 6c7fde4165740cae2be470e3560d4600N.exe 2692 6c7fde4165740cae2be470e3560d4600N.exe 2692 6c7fde4165740cae2be470e3560d4600N.exe 2692 6c7fde4165740cae2be470e3560d4600N.exe 2908 6c7fde4165740cae2be470e3560d4600N.exe 2908 6c7fde4165740cae2be470e3560d4600N.exe 2908 6c7fde4165740cae2be470e3560d4600N.exe 2908 6c7fde4165740cae2be470e3560d4600N.exe 2908 6c7fde4165740cae2be470e3560d4600N.exe 2908 6c7fde4165740cae2be470e3560d4600N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2692 6c7fde4165740cae2be470e3560d4600N.exe Token: SeDebugPrivilege 2908 6c7fde4165740cae2be470e3560d4600N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2908 2692 6c7fde4165740cae2be470e3560d4600N.exe 38 PID 2692 wrote to memory of 2908 2692 6c7fde4165740cae2be470e3560d4600N.exe 38 PID 2692 wrote to memory of 2908 2692 6c7fde4165740cae2be470e3560d4600N.exe 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c7fde4165740cae2be470e3560d4600N.exe"C:\Users\Admin\AppData\Local\Temp\6c7fde4165740cae2be470e3560d4600N.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\6c7fde4165740cae2be470e3560d4600N.exe"C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\6c7fde4165740cae2be470e3560d4600N.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6c7fde4165740cae2be470e3560d4600N6" /sc MINUTE /mo 14 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\6c7fde4165740cae2be470e3560d4600N.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6c7fde4165740cae2be470e3560d4600N" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\6c7fde4165740cae2be470e3560d4600N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6c7fde4165740cae2be470e3560d4600N6" /sc MINUTE /mo 5 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\6c7fde4165740cae2be470e3560d4600N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Sidebar\es-ES\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\es-ES\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Sidebar\es-ES\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD56c7fde4165740cae2be470e3560d4600
SHA15598a613d702d5cf9eb578eab6b28f5d61ff3d63
SHA256553e75e0d6c35cb71667c45af798ceaefd6468961a73562142536fe3e633136e
SHA51261fa46b84fedfeb60f1ef2b3f232eca85e1d70dcbde049486614cbb9f5159e2278dd652da7c5f7dc5fd2de1eba4644a5e15af77d4cdf62351cc62134f2d3722f