Analysis

  • max time kernel
    114s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/10/2024, 03:13

General

  • Target

    545ec0cff0698c5502aa7a7727d67c8de1546f2435f94e4a845d4d65dbfb1008N.exe

  • Size

    1.8MB

  • MD5

    cdfe4113f2d0e3d04921aaf02a61f4c0

  • SHA1

    f6677353b59a891a2fe06dc2971ec383154c3094

  • SHA256

    545ec0cff0698c5502aa7a7727d67c8de1546f2435f94e4a845d4d65dbfb1008

  • SHA512

    6892293e3a3856fd10161970e1ff149ea320bc6fc1e57c7d636d7dde25b82a9715344a5638f5d55ed4b0224cbe7af2fc8a55e6367ad3f1d5272104c7777f5404

  • SSDEEP

    24576:opSTNuxSGxU+s8DpWgdOK5QX/aJfaOtdnDc0GcWiJHMTJd6dFdoQQDymYPj9rnWC:o/Uo5QigOMPy2TzyF2Qj9WJ

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\545ec0cff0698c5502aa7a7727d67c8de1546f2435f94e4a845d4d65dbfb1008N.exe
    "C:\Users\Admin\AppData\Local\Temp\545ec0cff0698c5502aa7a7727d67c8de1546f2435f94e4a845d4d65dbfb1008N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4t5ecc5p\4t5ecc5p.cmdline"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:4740
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES737A.tmp" "c:\Windows\System32\CSCA72222686E6A4F5BAE366EF3DDDB527.TMP"
        3⤵
          PID:1192
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\g5S83u7t2J.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1848
        • C:\Windows\system32\chcp.com
          chcp 65001
          3⤵
            PID:4296
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:5008
          • C:\Users\Admin\Recent\backgroundTaskHost.exe
            "C:\Users\Admin\Recent\backgroundTaskHost.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4012
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 14 /tr "'C:\Windows\SoftwareDistribution\SLS\9482F4B4-E343-43B6-B170-9A65BC822C77\Registry.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:628
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Windows\SoftwareDistribution\SLS\9482F4B4-E343-43B6-B170-9A65BC822C77\Registry.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1076
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Windows\SoftwareDistribution\SLS\9482F4B4-E343-43B6-B170-9A65BC822C77\Registry.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1092
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\SppExtComObj.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1232
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\SppExtComObj.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4448
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\SppExtComObj.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:764
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\NetHood\taskhostw.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4204
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\Admin\NetHood\taskhostw.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4536
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\NetHood\taskhostw.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4904
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Recent\backgroundTaskHost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:5024
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Users\Admin\Recent\backgroundTaskHost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4468
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Recent\backgroundTaskHost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3176
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Office\PackageManifests\winlogon.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:668
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\PackageManifests\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2472
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Program Files\Microsoft Office\PackageManifests\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4960
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "545ec0cff0698c5502aa7a7727d67c8de1546f2435f94e4a845d4d65dbfb1008N5" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\AppData\Local\Temp\545ec0cff0698c5502aa7a7727d67c8de1546f2435f94e4a845d4d65dbfb1008N.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2572
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "545ec0cff0698c5502aa7a7727d67c8de1546f2435f94e4a845d4d65dbfb1008N" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\545ec0cff0698c5502aa7a7727d67c8de1546f2435f94e4a845d4d65dbfb1008N.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2764
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "545ec0cff0698c5502aa7a7727d67c8de1546f2435f94e4a845d4d65dbfb1008N5" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\AppData\Local\Temp\545ec0cff0698c5502aa7a7727d67c8de1546f2435f94e4a845d4d65dbfb1008N.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2356

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RES737A.tmp

        Filesize

        1KB

        MD5

        bff7a91937fd2a77f60b5a1eb24d6b76

        SHA1

        a985f6aca0fefb70ee9a4f279f7b0b9cee9aadd5

        SHA256

        0e6266073e401aca0ab2ec4613a61cfc5f95c74bd920794ae4e6f353a6c6afc3

        SHA512

        dadf3e50669ac1d3106355d37750331654c040c8269041ea4932e44066be1217c0ee7abd0679bb14849d94bb8fd29b6c81bdbcea6050ba319aa8c45d8bc3527a

      • C:\Users\Admin\AppData\Local\Temp\g5S83u7t2J.bat

        Filesize

        172B

        MD5

        7d289f2237267569bcb05f647d9eee41

        SHA1

        d21f497a223b7d0968e5ff32493adad551dcbab3

        SHA256

        6070ceca7f136b09cde917638638384bb4a0e01e57a42c98389316485a8505a3

        SHA512

        798c0cd4a68db71dbbae9422f9abe4d1b5f179e186101f6b34093901ac740f535a4e181c9bef16f0cd8e2dbfe52e1a8e31c108de55b4bb9b9264353c4f105e0f

      • C:\Windows\SoftwareDistribution\SLS\9482F4B4-E343-43B6-B170-9A65BC822C77\Registry.exe

        Filesize

        1.8MB

        MD5

        cdfe4113f2d0e3d04921aaf02a61f4c0

        SHA1

        f6677353b59a891a2fe06dc2971ec383154c3094

        SHA256

        545ec0cff0698c5502aa7a7727d67c8de1546f2435f94e4a845d4d65dbfb1008

        SHA512

        6892293e3a3856fd10161970e1ff149ea320bc6fc1e57c7d636d7dde25b82a9715344a5638f5d55ed4b0224cbe7af2fc8a55e6367ad3f1d5272104c7777f5404

      • \??\c:\Users\Admin\AppData\Local\Temp\4t5ecc5p\4t5ecc5p.0.cs

        Filesize

        417B

        MD5

        78c37edc30a65bf3d92993eb6bb5bf01

        SHA1

        9f00622c18e742416437340093724a394d29c129

        SHA256

        82dd94a8af55ea315f0a31862cf5cd792c06c082ef6bc702fa1c303b84fcb01d

        SHA512

        d73932dde6d9dc1cc28d5c82e65bacb012c8aa794de5812bd1120099e950758132c75b2a8890279f7b375cf7b3bef3eb068ef470ddc6245d9c94b7d55efef72e

      • \??\c:\Users\Admin\AppData\Local\Temp\4t5ecc5p\4t5ecc5p.cmdline

        Filesize

        235B

        MD5

        8a97944b590d895a4b37e88bd5d9a135

        SHA1

        9e3fdcbcaf75a053b074ca76146e6a460b3428ce

        SHA256

        89f177483fd805a90d77a5a17a35a19cf6b3e6a7cc952e522d3b5d04b7e7b987

        SHA512

        dca4ff159f40bcd025820f0374baee0da0c4efe4127ee79eb13d7bf3646948aa831b704c37a31a919609d67e0e12eef58a46b2f2add50b7e7fc282f7f779c4a7

      • \??\c:\Windows\System32\CSCA72222686E6A4F5BAE366EF3DDDB527.TMP

        Filesize

        1KB

        MD5

        82a7b8ef3bc275711e3b27c6df93c7ff

        SHA1

        bdac909f26475c94c74145576bcf22adb0f8203c

        SHA256

        582921e5e6617cb736006c46c9c8576d8fdefb8763469bdbf305d52d298f6124

        SHA512

        f2100bca60280f6ad93f40254d6fe69bd9917a44973516874aa54c28042796503daac5c51869924f5ecd17615f461dda6441f479e1201c44ad07f5a7728af248

      • memory/1144-7-0x00007FF989B40000-0x00007FF98A601000-memory.dmp

        Filesize

        10.8MB

      • memory/1144-29-0x00007FF989B40000-0x00007FF98A601000-memory.dmp

        Filesize

        10.8MB

      • memory/1144-10-0x000000001B900000-0x000000001B950000-memory.dmp

        Filesize

        320KB

      • memory/1144-12-0x00000000012B0000-0x00000000012C8000-memory.dmp

        Filesize

        96KB

      • memory/1144-15-0x0000000001270000-0x000000000127C000-memory.dmp

        Filesize

        48KB

      • memory/1144-13-0x00007FF989B40000-0x00007FF98A601000-memory.dmp

        Filesize

        10.8MB

      • memory/1144-16-0x00007FF989B40000-0x00007FF98A601000-memory.dmp

        Filesize

        10.8MB

      • memory/1144-22-0x00007FF989B40000-0x00007FF98A601000-memory.dmp

        Filesize

        10.8MB

      • memory/1144-0-0x00007FF989B43000-0x00007FF989B45000-memory.dmp

        Filesize

        8KB

      • memory/1144-9-0x0000000001290000-0x00000000012AC000-memory.dmp

        Filesize

        112KB

      • memory/1144-33-0x00007FF989B40000-0x00007FF98A601000-memory.dmp

        Filesize

        10.8MB

      • memory/1144-6-0x0000000001220000-0x000000000122E000-memory.dmp

        Filesize

        56KB

      • memory/1144-4-0x00007FF989B40000-0x00007FF98A601000-memory.dmp

        Filesize

        10.8MB

      • memory/1144-36-0x00007FF989B40000-0x00007FF98A601000-memory.dmp

        Filesize

        10.8MB

      • memory/1144-3-0x00007FF989B40000-0x00007FF98A601000-memory.dmp

        Filesize

        10.8MB

      • memory/1144-2-0x00007FF989B40000-0x00007FF98A601000-memory.dmp

        Filesize

        10.8MB

      • memory/1144-49-0x00007FF989B40000-0x00007FF98A601000-memory.dmp

        Filesize

        10.8MB

      • memory/1144-1-0x0000000000710000-0x00000000008EA000-memory.dmp

        Filesize

        1.9MB

      • memory/4012-58-0x00000000029B0000-0x00000000029B8000-memory.dmp

        Filesize

        32KB