Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 13:50
Behavioral task
behavioral1
Sample
neverlosecrackinstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
neverlosecrackinstaller.exe
Resource
win10v2004-20240802-en
General
-
Target
neverlosecrackinstaller.exe
-
Size
1.1MB
-
MD5
eff2e9faef1c275db92ef2293b210765
-
SHA1
6f1270c4b3759f06504336721395e49196dda5e0
-
SHA256
4da8bf0ff149df3da52766ea9f3c064dad494445c28956d87268ea4cc6c5abee
-
SHA512
3ef3957146aaa6f3419fcc8483d76ab7e3678b75232479454ffb4205096864a906e3ad1f939e1aae10b863b5fd30b3ebe977dd2df181e6e8b2295937d33ce1f5
-
SSDEEP
24576:U2G/nvxW3Ww0t68Ryo5o0x/OMEyoMv6z4t+:UbA30vRyop/UzR
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 24 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3916 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4080 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1064 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5060 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4400 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2348 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 384 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2600 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2156 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4740 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2476 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1712 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4760 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4744 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2316 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3060 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3560 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2928 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4260 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1220 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5112 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2020 4128 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4840 4128 schtasks.exe 93 -
resource yara_rule behavioral2/files/0x0007000000023452-10.dat dcrat behavioral2/memory/460-13-0x00000000009D0000-0x0000000000AA6000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation neverlosecrackinstaller.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Browserrefperf.exe -
Executes dropped EXE 2 IoCs
pid Process 460 Browserrefperf.exe 4532 RuntimeBroker.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ipinfo.io 19 ipinfo.io -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\Windows Media Player\Media Renderer\RuntimeBroker.exe Browserrefperf.exe File created C:\Program Files\Windows Media Player\Media Renderer\9e8d7a4ca61bd9 Browserrefperf.exe File created C:\Program Files\Windows Media Player\en-US\SppExtComObj.exe Browserrefperf.exe File created C:\Program Files\Windows Media Player\en-US\e1ef82546f0b02 Browserrefperf.exe File created C:\Program Files (x86)\WindowsPowerShell\RuntimeBroker.exe Browserrefperf.exe File created C:\Program Files (x86)\WindowsPowerShell\9e8d7a4ca61bd9 Browserrefperf.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Globalization\Time Zone\27d1bcfc3c54e0 Browserrefperf.exe File created C:\Windows\TAPI\backgroundTaskHost.exe Browserrefperf.exe File opened for modification C:\Windows\TAPI\backgroundTaskHost.exe Browserrefperf.exe File created C:\Windows\TAPI\eddb19405b7ce1 Browserrefperf.exe File created C:\Windows\Globalization\Time Zone\System.exe Browserrefperf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neverlosecrackinstaller.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings neverlosecrackinstaller.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 24 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4760 schtasks.exe 3560 schtasks.exe 2928 schtasks.exe 5112 schtasks.exe 2348 schtasks.exe 4400 schtasks.exe 2600 schtasks.exe 1712 schtasks.exe 5060 schtasks.exe 4744 schtasks.exe 2316 schtasks.exe 3060 schtasks.exe 4260 schtasks.exe 2020 schtasks.exe 384 schtasks.exe 4080 schtasks.exe 1064 schtasks.exe 2156 schtasks.exe 4740 schtasks.exe 2476 schtasks.exe 1220 schtasks.exe 2616 schtasks.exe 3916 schtasks.exe 4840 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 460 Browserrefperf.exe 460 Browserrefperf.exe 460 Browserrefperf.exe 460 Browserrefperf.exe 460 Browserrefperf.exe 460 Browserrefperf.exe 460 Browserrefperf.exe 460 Browserrefperf.exe 460 Browserrefperf.exe 460 Browserrefperf.exe 460 Browserrefperf.exe 460 Browserrefperf.exe 460 Browserrefperf.exe 4532 RuntimeBroker.exe 4532 RuntimeBroker.exe 4532 RuntimeBroker.exe 4532 RuntimeBroker.exe 4532 RuntimeBroker.exe 4532 RuntimeBroker.exe 4532 RuntimeBroker.exe 4532 RuntimeBroker.exe 4532 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 460 Browserrefperf.exe Token: SeDebugPrivilege 4532 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4536 wrote to memory of 3420 4536 neverlosecrackinstaller.exe 88 PID 4536 wrote to memory of 3420 4536 neverlosecrackinstaller.exe 88 PID 4536 wrote to memory of 3420 4536 neverlosecrackinstaller.exe 88 PID 3420 wrote to memory of 5088 3420 WScript.exe 90 PID 3420 wrote to memory of 5088 3420 WScript.exe 90 PID 3420 wrote to memory of 5088 3420 WScript.exe 90 PID 5088 wrote to memory of 460 5088 cmd.exe 92 PID 5088 wrote to memory of 460 5088 cmd.exe 92 PID 460 wrote to memory of 4532 460 Browserrefperf.exe 118 PID 460 wrote to memory of 4532 460 Browserrefperf.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\neverlosecrackinstaller.exe"C:\Users\Admin\AppData\Local\Temp\neverlosecrackinstaller.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ServerbrowserfontCommon\Q5hCHFGU8l.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ServerbrowserfontCommon\UdiJPz86qHeBwQZjDMbGciKs.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\ServerbrowserfontCommon\Browserrefperf.exe"C:\ServerbrowserfontCommon\Browserrefperf.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Program Files\Windows Media Player\Media Renderer\RuntimeBroker.exe"C:\Program Files\Windows Media Player\Media Renderer\RuntimeBroker.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 8 /tr "'C:\Windows\TAPI\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\TAPI\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 7 /tr "'C:\Windows\TAPI\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Media Player\en-US\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\en-US\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Media Player\en-US\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Libraries\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Public\Libraries\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Libraries\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\ServerbrowserfontCommon\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\ServerbrowserfontCommon\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\ServerbrowserfontCommon\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\WindowsPowerShell\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\WindowsPowerShell\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Windows\Globalization\Time Zone\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\Globalization\Time Zone\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Windows\Globalization\Time Zone\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\ServerbrowserfontCommon\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\ServerbrowserfontCommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\ServerbrowserfontCommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Media Player\Media Renderer\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\Media Renderer\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Media Player\Media Renderer\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD555c74b4a27cdd137e92c5851a8da3d01
SHA18d558d8ac9d79ded12117f85408231babf295361
SHA25607832d9f3ada7a274116dccfde69897c2eefe72a1de4eb7131d58358d90fe422
SHA512ff80991354cb74bc9abfb7363a47d8bbc10c3a95eeb35de772f50fdf43fbb16e3153be9cb07636cc2d44dbe9c27ead056d0589b0a233677a08bb4dea43de7dcd
-
Filesize
224B
MD5da023c5203666d614738df690fed6a31
SHA11ebb7f94b4c113150652fa867c5dca0ff1b78c66
SHA2567d811e299d33805033841886dd4611c902c4332c5a2f87946ac42030eb06f247
SHA512c3b6bf19216c0333713ace584622e50ec802ac449182eb538ea309bbd83a7e10f87370f6d735750557ac595c005adca93467834f76d0d6ef35cd2b9b05faef64
-
Filesize
47B
MD51d2d5c41a2f3a9b263b8b7b4016347f4
SHA14a1cb79ebd8b16789cb3b81f074afaf7c17c974e
SHA256d99c06592d8e25dece6048fbb60875e5bbcf3e69c3f1857ab8395447f6b90b8d
SHA512a2fccd4cc2885f7e98af17ac2c77b0670fac2ed150e4d5accd81db85d1fca1bab9c7f83f1934da1aae851af008e920090371f5803273190591c443cb463f96d8