Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 15:55

General

  • Target

    14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe

  • Size

    973KB

  • MD5

    9e2d06b56585b3d7cf2453d98c53de20

  • SHA1

    5858c3ae6bdf0e1a2f4d15d02094cf0172946c52

  • SHA256

    14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041

  • SHA512

    c6b32a070a557c3bc23c807a419305f6bf91033a9d4a010c110c1221962718c3d0bb582ac20ff9e0344caa504545ea5aacfc17979003327fda1c192b962d4010

  • SSDEEP

    12288:/hhBMuext92N3cit1RGJV/H0uQ1PjmzBd5EBy10cgZMc29ZxasnLlDD:/5E92NRzO/UFdmBchH29Zsg9

Malware Config

Signatures

  • DcRat 8 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe
    "C:\Users\Admin\AppData\Local\Temp\14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe"
    1⤵
    • DcRat
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3kUzIpK7rW.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2580
        • C:\Windows\PFRO\explorer.exe
          "C:\Windows\PFRO\explorer.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1312
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\PFRO\explorer.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2760
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N" /sc ONLOGON /tr "'C:\Documents and Settings\14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2592
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\ProgramData\Documents\smss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2656
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\csrss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3036
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\PerfLogs\Admin\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:380
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\ose00000\14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PerfLogs\Admin\winlogon.exe

      Filesize

      973KB

      MD5

      9e2d06b56585b3d7cf2453d98c53de20

      SHA1

      5858c3ae6bdf0e1a2f4d15d02094cf0172946c52

      SHA256

      14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041

      SHA512

      c6b32a070a557c3bc23c807a419305f6bf91033a9d4a010c110c1221962718c3d0bb582ac20ff9e0344caa504545ea5aacfc17979003327fda1c192b962d4010

    • C:\Users\Admin\AppData\Local\Temp\3kUzIpK7rW.bat

      Filesize

      192B

      MD5

      094271227a9095c74a3f0a1adb377442

      SHA1

      61ca9164ad741652d2b09469d9b9d4129fb9da97

      SHA256

      8376c060c82974b10df582d9a71d84098b44f04332ba94f331705fe7237bc581

      SHA512

      ec37252bc4de31f0a926ac22dec9219534143c4fe138774222865729e086946b0c03a6ea8ad6f97d3d3081f335da721ac604171d7dac579b89d8977ddab84134

    • C:\Windows\PFRO\explorer.exe

      Filesize

      973KB

      MD5

      77941a912b8924c5e8a0332819feba9c

      SHA1

      35143209431fad92732be779ad1e83c05b8a5453

      SHA256

      cdcb85ad2b89927c65fe562bde5ecd4e3ef77ccbe963cc8f81d074ba1a059fb6

      SHA512

      082aa21cd9f1e8f7e52f5c1e238585ab7d48f853df3fe4ebf31b2c68b9de1bca55fa04b38f8dce1d1c980e53d9f61b8a27a96c87e56e9c3ff6b64b2228964fde

    • memory/1312-70-0x0000000001340000-0x000000000143A000-memory.dmp

      Filesize

      1000KB

    • memory/2876-3-0x0000000000570000-0x0000000000578000-memory.dmp

      Filesize

      32KB

    • memory/2876-5-0x0000000001F30000-0x0000000001F3C000-memory.dmp

      Filesize

      48KB

    • memory/2876-6-0x0000000001F40000-0x0000000001F4C000-memory.dmp

      Filesize

      48KB

    • memory/2876-7-0x0000000001F50000-0x0000000001F58000-memory.dmp

      Filesize

      32KB

    • memory/2876-4-0x0000000000920000-0x0000000000930000-memory.dmp

      Filesize

      64KB

    • memory/2876-0-0x000007FEF5453000-0x000007FEF5454000-memory.dmp

      Filesize

      4KB

    • memory/2876-67-0x000007FEF5450000-0x000007FEF5E3C000-memory.dmp

      Filesize

      9.9MB

    • memory/2876-2-0x000007FEF5450000-0x000007FEF5E3C000-memory.dmp

      Filesize

      9.9MB

    • memory/2876-1-0x0000000000930000-0x0000000000A2A000-memory.dmp

      Filesize

      1000KB