Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:14
Behavioral task
behavioral1
Sample
44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe
Resource
win10v2004-20240802-en
General
-
Target
44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe
-
Size
1002KB
-
MD5
207bc42f918e624c6cbb55afd7838f36
-
SHA1
e807453a5d2aa9408af19e056d232f1308d4a61d
-
SHA256
44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd
-
SHA512
8384b670f55ad02224bc01643dc157481b177b57deaaee7782a1b948edc9babe1e9885b17c82af3abad1eb7a3485290f41f236aa45a5a324469c1c90d93a7490
-
SSDEEP
24576:0HblYzEUfgfAF78QWWQx+oPmLdaqgFlInS9:w2lNtdaqGD
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2108 2304 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1884 2304 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2424 2304 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 2304 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1824 2304 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1896 2304 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1040 2304 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2228 2304 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2648 2304 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 2304 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2656 2304 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2900 2304 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2052 2304 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2384 2304 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 2304 schtasks.exe 28 -
resource yara_rule behavioral1/memory/2292-1-0x00000000012D0000-0x00000000013D2000-memory.dmp dcrat behavioral1/files/0x0006000000015f4e-12.dat dcrat behavioral1/memory/2644-20-0x0000000000320000-0x0000000000422000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2644 wininit.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\ja-JP\wininit.exe 44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe File opened for modification C:\Program Files\Windows Sidebar\ja-JP\wininit.exe 44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe File created C:\Program Files\Windows Sidebar\ja-JP\56085415360792 44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Migration\winlogon.exe 44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe File created C:\Windows\Migration\cc11b995f2a76d 44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe File created C:\Windows\RemotePackages\RemoteApps\dllhost.exe 44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe File created C:\Windows\RemotePackages\RemoteApps\5940a34987c991 44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe File created C:\Windows\PLA\System\dllhost.exe 44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe File created C:\Windows\PLA\System\5940a34987c991 44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2108 schtasks.exe 2900 schtasks.exe 2776 schtasks.exe 1884 schtasks.exe 2424 schtasks.exe 1040 schtasks.exe 2648 schtasks.exe 2656 schtasks.exe 2384 schtasks.exe 2228 schtasks.exe 2052 schtasks.exe 2860 schtasks.exe 2220 schtasks.exe 1824 schtasks.exe 1896 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2292 44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe 2644 wininit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2292 44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe Token: SeDebugPrivilege 2644 wininit.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2644 2292 44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe 44 PID 2292 wrote to memory of 2644 2292 44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe 44 PID 2292 wrote to memory of 2644 2292 44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe"C:\Users\Admin\AppData\Local\Temp\44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files\Windows Sidebar\ja-JP\wininit.exe"C:\Program Files\Windows Sidebar\ja-JP\wininit.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Sidebar\ja-JP\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\ja-JP\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Sidebar\ja-JP\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Windows\RemotePackages\RemoteApps\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\RemotePackages\RemoteApps\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Windows\RemotePackages\RemoteApps\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Windows\PLA\System\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\PLA\System\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Windows\PLA\System\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Windows\Migration\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\Migration\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Windows\Migration\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1002KB
MD5207bc42f918e624c6cbb55afd7838f36
SHA1e807453a5d2aa9408af19e056d232f1308d4a61d
SHA25644c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd
SHA5128384b670f55ad02224bc01643dc157481b177b57deaaee7782a1b948edc9babe1e9885b17c82af3abad1eb7a3485290f41f236aa45a5a324469c1c90d93a7490