Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 17:30
Behavioral task
behavioral1
Sample
F7361ED3503F11A56E8CC53AD6C277B8.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
F7361ED3503F11A56E8CC53AD6C277B8.exe
Resource
win10v2004-20241007-en
General
-
Target
F7361ED3503F11A56E8CC53AD6C277B8.exe
-
Size
1.2MB
-
MD5
f7361ed3503f11a56e8cc53ad6c277b8
-
SHA1
bfa62d30d715bf866d5a2a6198a474c316b3dc04
-
SHA256
a64e0fad64514c66bc6750432d8c3ef96932f9902886f540cca217031d1cfc44
-
SHA512
9828478b57e85a2341262127e3149f5a9e48523198665b99634738627f107c1f5ab0c30ad80819bd9c4920836585397f4caef83c6d955cca6f0074b212fa96a4
-
SSDEEP
24576:q2G/nvxW3WXlB6Fh3rXTamAQ8uwoqTWy1Y7i887KtU:qbA3q4h3rD5DiT1T2O
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 24 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1092 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4544 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 964 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4364 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5100 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2208 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4748 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1356 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1940 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1752 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4664 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4348 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2884 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4984 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1936 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1552 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2832 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5084 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1248 996 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3980 996 schtasks.exe 93 -
Processes:
resource yara_rule behavioral2/files/0x000a000000023b53-10.dat dcrat behavioral2/memory/3416-13-0x0000000000CA0000-0x0000000000D76000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
F7361ED3503F11A56E8CC53AD6C277B8.exeWScript.exeAgentserver.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation F7361ED3503F11A56E8CC53AD6C277B8.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Agentserver.exe -
Executes dropped EXE 2 IoCs
Processes:
Agentserver.execmd.exepid Process 3416 Agentserver.exe 2036 cmd.exe -
Drops file in System32 directory 2 IoCs
Processes:
Agentserver.exedescription ioc Process File created C:\Windows\SysWOW64\th-TH\RuntimeBroker.exe Agentserver.exe File created C:\Windows\SysWOW64\th-TH\9e8d7a4ca61bd9 Agentserver.exe -
Drops file in Program Files directory 4 IoCs
Processes:
Agentserver.exedescription ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\Registry.exe Agentserver.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\ee2ad38f3d4382 Agentserver.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\csrss.exe Agentserver.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\886983d96e3d3e Agentserver.exe -
Drops file in Windows directory 2 IoCs
Processes:
Agentserver.exedescription ioc Process File created C:\Windows\Sun\Java\fontdrvhost.exe Agentserver.exe File created C:\Windows\Sun\Java\5b884080fd4f94 Agentserver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
F7361ED3503F11A56E8CC53AD6C277B8.exeWScript.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F7361ED3503F11A56E8CC53AD6C277B8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
Processes:
F7361ED3503F11A56E8CC53AD6C277B8.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings F7361ED3503F11A56E8CC53AD6C277B8.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 24 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 5100 schtasks.exe 2208 schtasks.exe 1356 schtasks.exe 4348 schtasks.exe 1692 schtasks.exe 1248 schtasks.exe 4544 schtasks.exe 4364 schtasks.exe 2328 schtasks.exe 1552 schtasks.exe 5084 schtasks.exe 2860 schtasks.exe 1092 schtasks.exe 1752 schtasks.exe 4984 schtasks.exe 1936 schtasks.exe 2832 schtasks.exe 3980 schtasks.exe 964 schtasks.exe 2776 schtasks.exe 4664 schtasks.exe 2884 schtasks.exe 4748 schtasks.exe 1940 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
Agentserver.execmd.exepid Process 3416 Agentserver.exe 3416 Agentserver.exe 3416 Agentserver.exe 3416 Agentserver.exe 3416 Agentserver.exe 3416 Agentserver.exe 3416 Agentserver.exe 3416 Agentserver.exe 3416 Agentserver.exe 3416 Agentserver.exe 3416 Agentserver.exe 3416 Agentserver.exe 3416 Agentserver.exe 2036 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Agentserver.execmd.exedescription pid Process Token: SeDebugPrivilege 3416 Agentserver.exe Token: SeDebugPrivilege 2036 cmd.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
F7361ED3503F11A56E8CC53AD6C277B8.exeWScript.execmd.exeAgentserver.exedescription pid Process procid_target PID 916 wrote to memory of 4340 916 F7361ED3503F11A56E8CC53AD6C277B8.exe 85 PID 916 wrote to memory of 4340 916 F7361ED3503F11A56E8CC53AD6C277B8.exe 85 PID 916 wrote to memory of 4340 916 F7361ED3503F11A56E8CC53AD6C277B8.exe 85 PID 4340 wrote to memory of 2040 4340 WScript.exe 97 PID 4340 wrote to memory of 2040 4340 WScript.exe 97 PID 4340 wrote to memory of 2040 4340 WScript.exe 97 PID 2040 wrote to memory of 3416 2040 cmd.exe 99 PID 2040 wrote to memory of 3416 2040 cmd.exe 99 PID 3416 wrote to memory of 2036 3416 Agentserver.exe 124 PID 3416 wrote to memory of 2036 3416 Agentserver.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\F7361ED3503F11A56E8CC53AD6C277B8.exe"C:\Users\Admin\AppData\Local\Temp\F7361ED3503F11A56E8CC53AD6C277B8.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\surrogateserverreviewsession\pmMvwz3lY7qlA.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\surrogateserverreviewsession\cAWYZg0ZdjD2dKs6hjKja7TASB4qz.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\surrogateserverreviewsession\Agentserver.exe"C:\surrogateserverreviewsession\Agentserver.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\surrogateserverreviewsession\cmd.exe"C:\surrogateserverreviewsession\cmd.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\surrogateserverreviewsession\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\surrogateserverreviewsession\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\surrogateserverreviewsession\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Windows\Sun\Java\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\Sun\Java\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Windows\Sun\Java\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Microsoft OneDrive\setup\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft OneDrive\setup\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Microsoft OneDrive\setup\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Windows\SysWOW64\th-TH\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\SysWOW64\th-TH\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Windows\SysWOW64\th-TH\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 5 /tr "'C:\surrogateserverreviewsession\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\surrogateserverreviewsession\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 12 /tr "'C:\surrogateserverreviewsession\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
829KB
MD5f1aaac4c20df683e3596c8a7cd3da07e
SHA1928e098dea596d12e22ed56f85cf028bcf27b31f
SHA256f3dd651e1ee7ab505f52e2c269a70e661d06e0eb51285ab41f89b3736352fa89
SHA512613387cc5d808dd7a9199212476a2ff34a92f5919d1ea353b204aa931248b2fbf0efe9261bfca6ddb804621a8d6234df4558cffc326050a9424957de3b05c6e2
-
Filesize
49B
MD592e94bdecb9521be3a47f97d2e66384e
SHA1eee4fd6f12d9d0194d0bcc5703e11dfc23a3ad5b
SHA256e248596953f8a96baf8a2d3f4eb134b005aeddeb7f2a7d5943c2788face1ca15
SHA512b5a418ab94b9a8be9d667411e838ee7b16be373aa68d73f5c8bed8f47dc9bc4c38abc8dec7f06f4f778c9aa72abdd0060293c573ad94832e24605ebf60991224
-
Filesize
234B
MD594c156c40c9fa1a17ea1d1be3e874aa1
SHA195b81d6f87a35f34f81d01c31465c2fe0f743a7b
SHA25633abe968c7250e8fe61d27e7507f8271a989c0bf4ff42133159503f2a4719b5a
SHA512a52e0fcbefed81b7590ceed9b44762520580d946d72a5c3ac36fc6d07a964253a812e75d3ceba42f83dddd15fbe2114f65f7148975fcdd20c78547a59de132ab