Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 15:55
Static task
static1
Behavioral task
behavioral1
Sample
14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe
Resource
win10v2004-20240802-en
General
-
Target
14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe
-
Size
973KB
-
MD5
9e2d06b56585b3d7cf2453d98c53de20
-
SHA1
5858c3ae6bdf0e1a2f4d15d02094cf0172946c52
-
SHA256
14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041
-
SHA512
c6b32a070a557c3bc23c807a419305f6bf91033a9d4a010c110c1221962718c3d0bb582ac20ff9e0344caa504545ea5aacfc17979003327fda1c192b962d4010
-
SSDEEP
12288:/hhBMuext92N3cit1RGJV/H0uQ1PjmzBd5EBy10cgZMc29ZxasnLlDD:/5E92NRzO/UFdmBchH29Zsg9
Malware Config
Signatures
-
DcRat 8 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 2656 schtasks.exe 3036 schtasks.exe 380 schtasks.exe 572 schtasks.exe File created C:\Windows\PFRO\explorer.exe 14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe File created C:\Windows\PFRO\7a0fd90576e088 14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe 2760 schtasks.exe 2592 schtasks.exe -
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2592 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2656 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3036 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 380 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 572 2692 schtasks.exe 30 -
Executes dropped EXE 1 IoCs
pid Process 1312 explorer.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Windows\\PFRO\\explorer.exe\"" 14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N = "\"C:\\Documents and Settings\\14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe\"" 14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\ProgramData\\Documents\\smss.exe\"" 14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\csrss.exe\"" 14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\PerfLogs\\Admin\\winlogon.exe\"" 14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ose00000\\14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe\"" 14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\PFRO\explorer.exe 14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe File opened for modification C:\Windows\PFRO\explorer.exe 14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe File created C:\Windows\PFRO\7a0fd90576e088 14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe File opened for modification C:\Windows\PFRO\RCX6ECB.tmp 14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2656 schtasks.exe 3036 schtasks.exe 380 schtasks.exe 572 schtasks.exe 2760 schtasks.exe 2592 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2876 14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2876 14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe Token: SeDebugPrivilege 1312 explorer.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2052 2876 14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe 37 PID 2876 wrote to memory of 2052 2876 14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe 37 PID 2876 wrote to memory of 2052 2876 14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe 37 PID 2052 wrote to memory of 2580 2052 cmd.exe 39 PID 2052 wrote to memory of 2580 2052 cmd.exe 39 PID 2052 wrote to memory of 2580 2052 cmd.exe 39 PID 2052 wrote to memory of 1312 2052 cmd.exe 40 PID 2052 wrote to memory of 1312 2052 cmd.exe 40 PID 2052 wrote to memory of 1312 2052 cmd.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe"C:\Users\Admin\AppData\Local\Temp\14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe"1⤵
- DcRat
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3kUzIpK7rW.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2580
-
-
C:\Windows\PFRO\explorer.exe"C:\Windows\PFRO\explorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\PFRO\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N" /sc ONLOGON /tr "'C:\Documents and Settings\14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\ProgramData\Documents\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\PerfLogs\Admin\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\ose00000\14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:572
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
973KB
MD59e2d06b56585b3d7cf2453d98c53de20
SHA15858c3ae6bdf0e1a2f4d15d02094cf0172946c52
SHA25614fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041
SHA512c6b32a070a557c3bc23c807a419305f6bf91033a9d4a010c110c1221962718c3d0bb582ac20ff9e0344caa504545ea5aacfc17979003327fda1c192b962d4010
-
Filesize
192B
MD5094271227a9095c74a3f0a1adb377442
SHA161ca9164ad741652d2b09469d9b9d4129fb9da97
SHA2568376c060c82974b10df582d9a71d84098b44f04332ba94f331705fe7237bc581
SHA512ec37252bc4de31f0a926ac22dec9219534143c4fe138774222865729e086946b0c03a6ea8ad6f97d3d3081f335da721ac604171d7dac579b89d8977ddab84134
-
Filesize
973KB
MD577941a912b8924c5e8a0332819feba9c
SHA135143209431fad92732be779ad1e83c05b8a5453
SHA256cdcb85ad2b89927c65fe562bde5ecd4e3ef77ccbe963cc8f81d074ba1a059fb6
SHA512082aa21cd9f1e8f7e52f5c1e238585ab7d48f853df3fe4ebf31b2c68b9de1bca55fa04b38f8dce1d1c980e53d9f61b8a27a96c87e56e9c3ff6b64b2228964fde