Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 01:35
Behavioral task
behavioral1
Sample
72bb30456f1873536a0a8ef30670ba7ec4bd04c0687daa1fced08e5ec323da65.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
72bb30456f1873536a0a8ef30670ba7ec4bd04c0687daa1fced08e5ec323da65.exe
Resource
win10v2004-20240910-en
General
-
Target
72bb30456f1873536a0a8ef30670ba7ec4bd04c0687daa1fced08e5ec323da65.exe
-
Size
1.2MB
-
MD5
286f2a2e636d212bf2e934c1ae50a187
-
SHA1
7acb1e23adb769de5f0022b58dff13a2179e18ee
-
SHA256
72bb30456f1873536a0a8ef30670ba7ec4bd04c0687daa1fced08e5ec323da65
-
SHA512
c20a42ff22127751bf272ecebc97559f4acaa4656bc424301b8119848b3ab0d841ce12a04bf2729403a43766a3af7a1b75801407714b6ba2b27966864419ceec
-
SSDEEP
24576:Q2G/nvxW3WKYTZAhaFWRsPwQeM+gZ6lZr0vuK3o:QbA3OWhaFWReJ7Z6p
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 21 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 220 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1864 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1284 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4052 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2484 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3972 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1448 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2268 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4604 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 516 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3868 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3116 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1900 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4720 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1192 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2868 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1852 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4656 3948 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3912 3948 schtasks.exe 92 -
resource yara_rule behavioral2/files/0x000a000000023ba2-10.dat dcrat behavioral2/memory/1700-13-0x00000000008E0000-0x00000000009B6000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 72bb30456f1873536a0a8ef30670ba7ec4bd04c0687daa1fced08e5ec323da65.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation surrogateFontwin.exe -
Executes dropped EXE 2 IoCs
pid Process 1700 surrogateFontwin.exe 4128 upfc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Windows Portable Devices\RuntimeBroker.exe surrogateFontwin.exe File created C:\Program Files\Windows Portable Devices\9e8d7a4ca61bd9 surrogateFontwin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72bb30456f1873536a0a8ef30670ba7ec4bd04c0687daa1fced08e5ec323da65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings 72bb30456f1873536a0a8ef30670ba7ec4bd04c0687daa1fced08e5ec323da65.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings surrogateFontwin.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 21 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1192 schtasks.exe 2868 schtasks.exe 1852 schtasks.exe 4656 schtasks.exe 1736 schtasks.exe 4052 schtasks.exe 1448 schtasks.exe 2268 schtasks.exe 3868 schtasks.exe 4720 schtasks.exe 3912 schtasks.exe 2640 schtasks.exe 220 schtasks.exe 1864 schtasks.exe 1284 schtasks.exe 2484 schtasks.exe 3116 schtasks.exe 3972 schtasks.exe 4604 schtasks.exe 516 schtasks.exe 1900 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 1700 surrogateFontwin.exe 4128 upfc.exe 4128 upfc.exe 4128 upfc.exe 4128 upfc.exe 4128 upfc.exe 4128 upfc.exe 4128 upfc.exe 4128 upfc.exe 4128 upfc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4128 upfc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1700 surrogateFontwin.exe Token: SeDebugPrivilege 4128 upfc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 552 wrote to memory of 3756 552 72bb30456f1873536a0a8ef30670ba7ec4bd04c0687daa1fced08e5ec323da65.exe 85 PID 552 wrote to memory of 3756 552 72bb30456f1873536a0a8ef30670ba7ec4bd04c0687daa1fced08e5ec323da65.exe 85 PID 552 wrote to memory of 3756 552 72bb30456f1873536a0a8ef30670ba7ec4bd04c0687daa1fced08e5ec323da65.exe 85 PID 3756 wrote to memory of 4152 3756 WScript.exe 88 PID 3756 wrote to memory of 4152 3756 WScript.exe 88 PID 3756 wrote to memory of 4152 3756 WScript.exe 88 PID 4152 wrote to memory of 1700 4152 cmd.exe 91 PID 4152 wrote to memory of 1700 4152 cmd.exe 91 PID 1700 wrote to memory of 4492 1700 surrogateFontwin.exe 114 PID 1700 wrote to memory of 4492 1700 surrogateFontwin.exe 114 PID 4492 wrote to memory of 2864 4492 cmd.exe 116 PID 4492 wrote to memory of 2864 4492 cmd.exe 116 PID 4492 wrote to memory of 4128 4492 cmd.exe 117 PID 4492 wrote to memory of 4128 4492 cmd.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\72bb30456f1873536a0a8ef30670ba7ec4bd04c0687daa1fced08e5ec323da65.exe"C:\Users\Admin\AppData\Local\Temp\72bb30456f1873536a0a8ef30670ba7ec4bd04c0687daa1fced08e5ec323da65.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\portwin\WxtRdL0.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\portwin\ZLt1PtUq.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\portwin\surrogateFontwin.exe"C:\portwin\surrogateFontwin.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\gjLfkDMpB5.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2864
-
-
C:\Users\All Users\Desktop\upfc.exe"C:\Users\All Users\Desktop\upfc.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4128
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Default User\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Desktop\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Users\All Users\Desktop\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Desktop\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 12 /tr "'C:\Users\Default\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Default\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 5 /tr "'C:\Users\Default\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\portwin\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\portwin\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\portwin\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Portable Devices\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Portable Devices\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\portwin\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\portwin\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\portwin\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\Default User\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200B
MD5f41d965dc4cf82cecbf80e229dc39241
SHA1331ed4e5163927490c8ba2ecae47a882548470d1
SHA2562961b0a2227f9f2ed905f9f323ff431f9417469d2a51ba9d29bd266c38db7824
SHA512a7581d1e79938a4cad7c366d63af8334c502e9aac42b722ea7f3628e5306191f773e69148c8b99907410250c1b970c371c26d180ac859f5341567428fb0f5e52
-
Filesize
192B
MD579c290f69a1e803c1e27f15ec38c2c4d
SHA1070cefd116bebdc1c937c5e4f0fb82b1b252c841
SHA25672c03e533a77883003e36fb418231593ac3716f68524f802e6a457ecd06adcef
SHA512e96b120f1db68bd3b49e279cc074487867668e950600ae5f4f978ddee99cb11828b743ec565b98bcb1728587065fb313ceba62886f29a0becbaead8c339144f7
-
Filesize
33B
MD51664acb69894f5a5cda523a89135755d
SHA177c2eef1ab4951f8ede3a52ff133075e5ac2f847
SHA256291d23afcfb0e04624a2ec0090c0de8e86d3a50ef9045a597e807b9eb6be29f3
SHA512709b2debea310d6dee27fa1338d04347279223d9ed0ef70ac4149cec4e917d783bf4ed984705570d2bff57839945269a73056bf36064bf58645e3c3be783b120
-
Filesize
827KB
MD558ab7df8ad61e51b96fe00e1e8858d9c
SHA1b1f528b964e6d74de47c6b1a001db2ca4f198615
SHA2564e0e1516b3e3b645e1dd0efcd10f695eac636f3fe18b3dae782c035e3bcd15ae
SHA512c40dbacc1bf46456751ff02271296c7aab90743c42d4aebd19e56ba8f90f9d4d14a1c9759967f95612ea7bbab5ea093dedf9880f9695add6307595997a82a745