Analysis

  • max time kernel
    119s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 23:15

General

  • Target

    6c7fde4165740cae2be470e3560d4600N.exe

  • Size

    1.7MB

  • MD5

    6c7fde4165740cae2be470e3560d4600

  • SHA1

    5598a613d702d5cf9eb578eab6b28f5d61ff3d63

  • SHA256

    553e75e0d6c35cb71667c45af798ceaefd6468961a73562142536fe3e633136e

  • SHA512

    61fa46b84fedfeb60f1ef2b3f232eca85e1d70dcbde049486614cbb9f5159e2278dd652da7c5f7dc5fd2de1eba4644a5e15af77d4cdf62351cc62134f2d3722f

  • SSDEEP

    24576:Pqfj/pKWIEcpP2WtjiLjrjCv8AAaIJr2CuLpZ6dqCevofVOhZjgw9pmF8wQOToDX:yU1u5yvZABRgNgECevvsc/wQO0Dx

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c7fde4165740cae2be470e3560d4600N.exe
    "C:\Users\Admin\AppData\Local\Temp\6c7fde4165740cae2be470e3560d4600N.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\6c7fde4165740cae2be470e3560d4600N.exe
      "C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\6c7fde4165740cae2be470e3560d4600N.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2908
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "6c7fde4165740cae2be470e3560d4600N6" /sc MINUTE /mo 14 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\6c7fde4165740cae2be470e3560d4600N.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2544
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "6c7fde4165740cae2be470e3560d4600N" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\6c7fde4165740cae2be470e3560d4600N.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2560
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "6c7fde4165740cae2be470e3560d4600N6" /sc MINUTE /mo 5 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\6c7fde4165740cae2be470e3560d4600N.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2664
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Sidebar\es-ES\csrss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2596
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\es-ES\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1260
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Sidebar\es-ES\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2532

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\6c7fde4165740cae2be470e3560d4600N.exe

          Filesize

          1.7MB

          MD5

          6c7fde4165740cae2be470e3560d4600

          SHA1

          5598a613d702d5cf9eb578eab6b28f5d61ff3d63

          SHA256

          553e75e0d6c35cb71667c45af798ceaefd6468961a73562142536fe3e633136e

          SHA512

          61fa46b84fedfeb60f1ef2b3f232eca85e1d70dcbde049486614cbb9f5159e2278dd652da7c5f7dc5fd2de1eba4644a5e15af77d4cdf62351cc62134f2d3722f

        • memory/2692-8-0x0000000000740000-0x0000000000750000-memory.dmp

          Filesize

          64KB

        • memory/2692-10-0x0000000000890000-0x00000000008A0000-memory.dmp

          Filesize

          64KB

        • memory/2692-3-0x00000000004D0000-0x00000000004DE000-memory.dmp

          Filesize

          56KB

        • memory/2692-4-0x000007FEF61F0000-0x000007FEF6BDC000-memory.dmp

          Filesize

          9.9MB

        • memory/2692-5-0x000007FEF61F0000-0x000007FEF6BDC000-memory.dmp

          Filesize

          9.9MB

        • memory/2692-6-0x0000000000710000-0x000000000072C000-memory.dmp

          Filesize

          112KB

        • memory/2692-2-0x000007FEF61F0000-0x000007FEF6BDC000-memory.dmp

          Filesize

          9.9MB

        • memory/2692-7-0x0000000000730000-0x0000000000740000-memory.dmp

          Filesize

          64KB

        • memory/2692-9-0x0000000000860000-0x0000000000872000-memory.dmp

          Filesize

          72KB

        • memory/2692-0-0x000007FEF61F3000-0x000007FEF61F4000-memory.dmp

          Filesize

          4KB

        • memory/2692-11-0x0000000000870000-0x000000000087E000-memory.dmp

          Filesize

          56KB

        • memory/2692-12-0x0000000000880000-0x000000000088A000-memory.dmp

          Filesize

          40KB

        • memory/2692-1-0x00000000008B0000-0x0000000000A6E000-memory.dmp

          Filesize

          1.7MB

        • memory/2692-47-0x000007FEF61F0000-0x000007FEF6BDC000-memory.dmp

          Filesize

          9.9MB

        • memory/2692-55-0x000007FEF61F0000-0x000007FEF6BDC000-memory.dmp

          Filesize

          9.9MB

        • memory/2908-54-0x0000000000C90000-0x0000000000E4E000-memory.dmp

          Filesize

          1.7MB