Analysis

  • max time kernel
    119s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2024, 01:22

General

  • Target

    84ffe1fe9ff878e3cf0a4f91a9a57964845dc96634fc11e95ee0ef8edb2ce719.exe

  • Size

    2.1MB

  • MD5

    24f297e399f1471c6dbdcc3963e5d66f

  • SHA1

    5abc4979b83ca42241e55299e0ebf93c97a54c23

  • SHA256

    84ffe1fe9ff878e3cf0a4f91a9a57964845dc96634fc11e95ee0ef8edb2ce719

  • SHA512

    0c9adbaedde18b2213aab82bfabcad4af71a943751b434669c9df6b4c0fe13ca17e579ac6240bc2c966b8db26c85404af10fb1565953a101471062baf68af498

  • SSDEEP

    24576:2TbBv5rUyXVlO8V8ikUJRQnpkPtG4HYy5hJoiJ4BUUCMmX8yvYs+UYFtaSlr3:IBJleiLOQNMbNqQs+UYF7

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\84ffe1fe9ff878e3cf0a4f91a9a57964845dc96634fc11e95ee0ef8edb2ce719.exe
    "C:\Users\Admin\AppData\Local\Temp\84ffe1fe9ff878e3cf0a4f91a9a57964845dc96634fc11e95ee0ef8edb2ce719.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Providerinto\jxEdxGsN64kiOqEUGJ67IuxvNwoevsckopc9pvSU.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Providerinto\Bn5IdhR1tUpuTxK5hmOWWYzImaYN1V5cjqGFLj.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1036
        • C:\Providerinto\webrefSession.exe
          "C:\Providerinto/webrefSession.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2692
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yex3oiac\yex3oiac.cmdline"
            5⤵
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:972
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES290.tmp" "c:\Windows\System32\CSCFF2D0AEFFB704E71A430E9A86860D9B3.TMP"
              6⤵
                PID:1516
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\i6xrkkiY6W.bat"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2304
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:1692
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:628
                • C:\Program Files (x86)\Windows Portable Devices\cmd.exe
                  "C:\Program Files (x86)\Windows Portable Devices\cmd.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1508
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\cmd.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2552
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\cmd.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2592
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 7 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\cmd.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3000
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Windows\AppPatch\de-DE\audiodg.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1984
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\AppPatch\de-DE\audiodg.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2392
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Windows\AppPatch\de-DE\audiodg.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1300
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Windows\Fonts\dllhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1196
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Fonts\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1288
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Windows\Fonts\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1032
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\lsass.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1336
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\lsass.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1344
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\lsass.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:380
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Portable Devices\cmd.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2844
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\cmd.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2156
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Portable Devices\cmd.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2384
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "webrefSessionw" /sc MINUTE /mo 6 /tr "'C:\Providerinto\webrefSession.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2072
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "webrefSession" /sc ONLOGON /tr "'C:\Providerinto\webrefSession.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2940
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "webrefSessionw" /sc MINUTE /mo 8 /tr "'C:\Providerinto\webrefSession.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2336

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Providerinto\Bn5IdhR1tUpuTxK5hmOWWYzImaYN1V5cjqGFLj.bat

        Filesize

        77B

        MD5

        53d8109386eeba065202d0cf2138f459

        SHA1

        d5972faee3997246c7ffa5c53e1c2d8cc2b3803a

        SHA256

        3e551e685fa443e19c1cef210062d7c4b960c9c5d538e692ac0eaeb47e09ee4f

        SHA512

        55a0633b1d9c9d1b30f9efb0acff436c2a591f55c2dcf56c67038794ed31e06cb384ab8e1a0969903956789279a7d9b28c20a5e51c837b0c3bf24aa33ed23313

      • C:\Providerinto\jxEdxGsN64kiOqEUGJ67IuxvNwoevsckopc9pvSU.vbe

        Filesize

        229B

        MD5

        e9b28a6c1dcf0251811da0e9b23eaa4b

        SHA1

        9cee1ece8bf61d4088e604697b0ef0662e27dce3

        SHA256

        cfc6ef18996e238555dad4daa17f08ee502bc3e8f6a4c315939522b3944c54b0

        SHA512

        eba575e7ff8ddacf8f2dad24ef99dc448b4abccaad05904c1a7156a1a04f5df87c8997795858ca980f340f11e4be9236fe7ffdd5f858634a0cf9a118d66f760c

      • C:\Users\Admin\AppData\Local\Temp\RES290.tmp

        Filesize

        1KB

        MD5

        f9850e7d16eaa34c18e3b10ddc2a81a2

        SHA1

        9af49d7e279a8648dd57eccc149b0b9bce5ce823

        SHA256

        98d60d036f7ab1f9e0c1162dbefe5552d8447597cce710283a7602a412538ee8

        SHA512

        c42e12365c38e7e7d0d5d184042527c4c49146216d9d962441483e26978155e33d42153c9efccfded115a1c0d8d54a6aa0573b03a8fafebc42f1581642b908f4

      • C:\Users\Admin\AppData\Local\Temp\i6xrkkiY6W.bat

        Filesize

        183B

        MD5

        262a3f5408dbbc20b47837c0dcd1e29f

        SHA1

        4bbc27661934f8c458fa72f956b54c5a7a81c049

        SHA256

        fdc9cbede1c99b0022ce6f1579c5582d77d88447e6d9bce70c80a64e2be4f919

        SHA512

        b67c4e584ec1095d5aa3136f1aa5d470efa379313b4fd1c42c6a0309823bd4dd9e164dc864489ec9b484fe9b9556b9fab2dcc1a040b8b3bf60c45806c7c73eac

      • \??\c:\Users\Admin\AppData\Local\Temp\yex3oiac\yex3oiac.0.cs

        Filesize

        388B

        MD5

        e3df5601863256a9b43e21371c366a20

        SHA1

        1ec3a12c2a14d4f736320c6e2a5be638bf156c3c

        SHA256

        80fcbf02d928fa0cfbe4fbdb0f3b260cefe98878a1069446b3a330bfd5c55745

        SHA512

        7bae45fbb5f1f1b581e0bec5adbc5ec5a425d0f1cf479bb33d883ca664c9bc12a6cf93b22064f09677ac826e2ba7e5acaf0befa5985e17a1209044d86e1e9736

      • \??\c:\Users\Admin\AppData\Local\Temp\yex3oiac\yex3oiac.cmdline

        Filesize

        235B

        MD5

        b999b4aba5d61934ed663054ff9eb6ba

        SHA1

        13dac50ef4e690329a72da2c3312db32a5619fad

        SHA256

        7d33ef1d124c7d04464466dfe173e4a81c05f68bd9c06ca04c8b5468111f7b5d

        SHA512

        e4fd3646e72fe9cd51c876e9d11e9885fcd3459e6edbd99d12a7430f5d3cb7483512a244b7036695667718609df69fe2833bf6a659f7c6f0df21b4ba7148e088

      • \??\c:\Windows\System32\CSCFF2D0AEFFB704E71A430E9A86860D9B3.TMP

        Filesize

        1KB

        MD5

        8c85ef91c6071d33745325a8fa351c3e

        SHA1

        e3311ceef28823eec99699cc35be27c94eca52d2

        SHA256

        8db3e3a5515da1933036688a9b1918cfc3339fc687008c5325461271904b2d41

        SHA512

        2bb89b07fe46b1c406ed6a560e88cb2b8402b1d61bb71e10887bad661751f64f1e5317fd6c1b301ea4766785b915da31b64e0475cfe36c1f950b32915b5dab7d

      • \Providerinto\webrefSession.exe

        Filesize

        1.8MB

        MD5

        aa47cc8dc99f5a7b574343c64bb23044

        SHA1

        047dbd74b8beaf914c5ca58ab53a6cae2e33e603

        SHA256

        27cc2a9fb4fce7185c7a3ff203e7bfe7133fa3f489aab93bf63534b1b2615b99

        SHA512

        7790eacbf8973d000e6e35210b165e7569446445c438a3761987d2fe90553218e5f999efe862ffeacd2d3065b6c4972cb045030b3f3ee0ce32772f532c34d628

      • memory/1508-52-0x00000000010D0000-0x00000000012AC000-memory.dmp

        Filesize

        1.9MB

      • memory/2692-13-0x0000000000D40000-0x0000000000F1C000-memory.dmp

        Filesize

        1.9MB

      • memory/2692-21-0x00000000004A0000-0x00000000004AE000-memory.dmp

        Filesize

        56KB

      • memory/2692-19-0x00000000004E0000-0x00000000004F8000-memory.dmp

        Filesize

        96KB

      • memory/2692-17-0x00000000004C0000-0x00000000004DC000-memory.dmp

        Filesize

        112KB

      • memory/2692-15-0x0000000000310000-0x000000000031E000-memory.dmp

        Filesize

        56KB