Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 01:14

General

  • Target

    44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe

  • Size

    1002KB

  • MD5

    207bc42f918e624c6cbb55afd7838f36

  • SHA1

    e807453a5d2aa9408af19e056d232f1308d4a61d

  • SHA256

    44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd

  • SHA512

    8384b670f55ad02224bc01643dc157481b177b57deaaee7782a1b948edc9babe1e9885b17c82af3abad1eb7a3485290f41f236aa45a5a324469c1c90d93a7490

  • SSDEEP

    24576:0HblYzEUfgfAF78QWWQx+oPmLdaqgFlInS9:w2lNtdaqGD

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 12 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe
    "C:\Users\Admin\AppData\Local\Temp\44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:760
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\sm3dfVlr9M.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1504
        • C:\Users\Public\Downloads\fontdrvhost.exe
          "C:\Users\Public\Downloads\fontdrvhost.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5096
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Downloads\fontdrvhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:840
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\Public\Downloads\fontdrvhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1612
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Downloads\fontdrvhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3604
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Windows\INF\smss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1664
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\INF\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4324
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Windows\INF\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3684
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Program Files\WindowsPowerShell\Configuration\services.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1500
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Configuration\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4228
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Program Files\WindowsPowerShell\Configuration\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4532
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\ssh\unsecapp.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4932
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Users\All Users\ssh\unsecapp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3720
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\ssh\unsecapp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3020

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\sm3dfVlr9M.bat

      Filesize

      206B

      MD5

      a820a06724979cf4ba40106c4f753fd0

      SHA1

      886209cda4e0bc23fddf208822e24c6bfcfd43b7

      SHA256

      8925b7b1f93037296d953fe3c40f4f1d75861bf49f9ec851e4efbf9569d04045

      SHA512

      1f49e5fbe38c13ad763d253fe9b271bebfe929f351889acddcd63d78d8e0a658a6539c81d9824b15c6c0ee75ce901ff0399d14ba344141bcfbb8f2c349adce05

    • C:\Users\Public\Downloads\fontdrvhost.exe

      Filesize

      1002KB

      MD5

      207bc42f918e624c6cbb55afd7838f36

      SHA1

      e807453a5d2aa9408af19e056d232f1308d4a61d

      SHA256

      44c0a9eca72bba742f1b8018e870c51b079b76496a34ca1605788cf2c5c3c1bd

      SHA512

      8384b670f55ad02224bc01643dc157481b177b57deaaee7782a1b948edc9babe1e9885b17c82af3abad1eb7a3485290f41f236aa45a5a324469c1c90d93a7490

    • memory/760-0-0x00007FFC72B73000-0x00007FFC72B75000-memory.dmp

      Filesize

      8KB

    • memory/760-1-0x0000000000F20000-0x0000000001022000-memory.dmp

      Filesize

      1.0MB

    • memory/760-2-0x00007FFC72B70000-0x00007FFC73631000-memory.dmp

      Filesize

      10.8MB

    • memory/760-3-0x0000000003200000-0x000000000321C000-memory.dmp

      Filesize

      112KB

    • memory/760-4-0x000000001C2F0000-0x000000001C340000-memory.dmp

      Filesize

      320KB

    • memory/760-19-0x00007FFC72B70000-0x00007FFC73631000-memory.dmp

      Filesize

      10.8MB