Analysis

  • max time kernel
    132s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/11/2024, 01:31

General

  • Target

    5780DBAE6AC61A88C8D89F216F324146.exe

  • Size

    855KB

  • MD5

    5780dbae6ac61a88c8d89f216f324146

  • SHA1

    cebcebedc7aaea3a4dd1fbec933cd169bf92e9dc

  • SHA256

    4b1967b04039c9b7a23651043b38c895cca2eb560de30a960368f82549079605

  • SHA512

    8a595384247649e31ef0c69a63243199d224334d75b66fd486a8e6ba0ac3c2b5521e1ead4b64fb9c968c21a4836581dde10e78f36217b62862c40bed2d105920

  • SSDEEP

    12288:I/TnPz84JfpflKH6qHJJMA+7pW3Ari4VVyZC0+1cp9rcDNpTWDTQGCZ6:I/TnzfS6qpJMA+73iE0nTr66

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5780DBAE6AC61A88C8D89F216F324146.exe
    "C:\Users\Admin\AppData\Local\Temp\5780DBAE6AC61A88C8D89F216F324146.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hzjz2uvg\hzjz2uvg.cmdline"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC34F.tmp" "c:\Windows\System32\CSCD06B1F1474E44FEC998A6F4B432D86E.TMP"
        3⤵
          PID:2760
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bNBdu6Md0n.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:340
        • C:\Windows\system32\chcp.com
          chcp 65001
          3⤵
            PID:496
          • C:\Windows\system32\w32tm.exe
            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
            3⤵
              PID:3064
            • C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\5780DBAE6AC61A88C8D89F216F324146.exe
              "C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\5780DBAE6AC61A88C8D89F216F324146.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:2272
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "5780DBAE6AC61A88C8D89F216F3241465" /sc MINUTE /mo 12 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\5780DBAE6AC61A88C8D89F216F324146.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2912
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "5780DBAE6AC61A88C8D89F216F324146" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\5780DBAE6AC61A88C8D89F216F324146.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2744
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "5780DBAE6AC61A88C8D89F216F3241465" /sc MINUTE /mo 9 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\5780DBAE6AC61A88C8D89F216F324146.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2464
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\explorer.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2612
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\explorer.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2696
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\explorer.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2324
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\audiodg.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1716
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\audiodg.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1288
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\audiodg.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2940
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\sppsvc.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2036
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2472
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2688
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\csrss.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2828
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Admin\csrss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2980
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\csrss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2008
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "5780DBAE6AC61A88C8D89F216F3241465" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\AppData\Local\Temp\5780DBAE6AC61A88C8D89F216F324146.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:768
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "5780DBAE6AC61A88C8D89F216F324146" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\5780DBAE6AC61A88C8D89F216F324146.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1148
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "5780DBAE6AC61A88C8D89F216F3241465" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\AppData\Local\Temp\5780DBAE6AC61A88C8D89F216F324146.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2520

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\5780DBAE6AC61A88C8D89F216F324146.exe

          Filesize

          855KB

          MD5

          5780dbae6ac61a88c8d89f216f324146

          SHA1

          cebcebedc7aaea3a4dd1fbec933cd169bf92e9dc

          SHA256

          4b1967b04039c9b7a23651043b38c895cca2eb560de30a960368f82549079605

          SHA512

          8a595384247649e31ef0c69a63243199d224334d75b66fd486a8e6ba0ac3c2b5521e1ead4b64fb9c968c21a4836581dde10e78f36217b62862c40bed2d105920

        • C:\Users\Admin\AppData\Local\Temp\RESC34F.tmp

          Filesize

          1KB

          MD5

          07536baeb67e5871c6ee53b5c1fc48b1

          SHA1

          f0294feb4056ff7b9ae9f1434b863a46c54c2cab

          SHA256

          b2df9dcd1fb463a2444fced8946fd366d5ade7dc45874aa0fe1a44205809e89a

          SHA512

          f630568f4809e8f270212ce9c8efe39d538cb6e0bf5165cfb8392746332a0f090e34a6661e9309c656942b2a0c3dec3d7a5ab970997eaee82db214fb3ce4821f

        • C:\Users\Admin\AppData\Local\Temp\bNBdu6Md0n.bat

          Filesize

          261B

          MD5

          2ac6a7b55dec7bdba9d449d1de9d5e40

          SHA1

          c6b8410b9b15d33d3aecebf3785d76251233a9a2

          SHA256

          8b402b29e2d59b286e4a33a5cc202d5af54e9c7622c9a4e1c07713d4a376b561

          SHA512

          69fa6a2ba14a8fa05b3c0c1c0a281063b1886be0ed5a2a23477b204924ffb7ab2872c2f0727ab7cd4fe066551f956dc7fd0077295276228d9fa66243590322bb

        • \??\c:\Users\Admin\AppData\Local\Temp\hzjz2uvg\hzjz2uvg.0.cs

          Filesize

          417B

          MD5

          99b79727e2a0ac829711b851c9b6cf7f

          SHA1

          7e73c925db717f22003f385fdee429a747f8dc00

          SHA256

          1aeea7eef59680299df6327e4693d3f4bb481068daeabee097f23a61bbc23ee0

          SHA512

          40cedc73891268030f92f3c5da6d15c56b24b3486571b6381e6ab2f9cc52b2cc335a1a72f813f8bb1396b1971b7c2215df01291b8affb9926f9b54fefc8600c7

        • \??\c:\Users\Admin\AppData\Local\Temp\hzjz2uvg\hzjz2uvg.cmdline

          Filesize

          235B

          MD5

          c632169ac1b122d24392960260f4f14c

          SHA1

          ed128e8eb046494671a2872dcc349fb4e1852e4a

          SHA256

          4ac2273c116d57a63193b3fa37877436cbea976bdf73562746b8b37a4242e858

          SHA512

          9e28a462c2174e6d2b3495e72ac494e23d64d8d2d47e330722d58c53508cd3883a53eab5d176d5e394934a88bebbacd982d18c0cc32599ea749699f4e33af6d9

        • \??\c:\Windows\System32\CSCD06B1F1474E44FEC998A6F4B432D86E.TMP

          Filesize

          1KB

          MD5

          9446a6998523ec187daa3d79bec9c8fa

          SHA1

          16c7f73aef03c8a15b4d9e8b1cfa5183caf7ca96

          SHA256

          f55f1bd2c1246cfb3b60cd8649fcc78b3837896bdf5132d6fc8ea0ecabf892d7

          SHA512

          fac3ad1b0c8663aaa94cd66b6ea0aa1848e570ff4a22b709cf2696abb76e28f42fb0d2a74316a7ad86bb6216177013c6b71ce2f4df139edc3054a03ee3467c9d

        • memory/2272-55-0x0000000000890000-0x000000000096C000-memory.dmp

          Filesize

          880KB

        • memory/2512-14-0x0000000000280000-0x000000000028E000-memory.dmp

          Filesize

          56KB

        • memory/2512-34-0x000007FEF5490000-0x000007FEF5E7C000-memory.dmp

          Filesize

          9.9MB

        • memory/2512-9-0x00000000002C0000-0x00000000002D8000-memory.dmp

          Filesize

          96KB

        • memory/2512-17-0x000007FEF5490000-0x000007FEF5E7C000-memory.dmp

          Filesize

          9.9MB

        • memory/2512-16-0x0000000000290000-0x0000000000298000-memory.dmp

          Filesize

          32KB

        • memory/2512-21-0x000007FEF5490000-0x000007FEF5E7C000-memory.dmp

          Filesize

          9.9MB

        • memory/2512-20-0x00000000004E0000-0x00000000004EC000-memory.dmp

          Filesize

          48KB

        • memory/2512-18-0x000007FEF5490000-0x000007FEF5E7C000-memory.dmp

          Filesize

          9.9MB

        • memory/2512-12-0x000007FEF5490000-0x000007FEF5E7C000-memory.dmp

          Filesize

          9.9MB

        • memory/2512-11-0x0000000000190000-0x000000000019C000-memory.dmp

          Filesize

          48KB

        • memory/2512-33-0x000007FEF5490000-0x000007FEF5E7C000-memory.dmp

          Filesize

          9.9MB

        • memory/2512-0-0x000007FEF5493000-0x000007FEF5494000-memory.dmp

          Filesize

          4KB

        • memory/2512-7-0x000007FEF5490000-0x000007FEF5E7C000-memory.dmp

          Filesize

          9.9MB

        • memory/2512-6-0x00000000002A0000-0x00000000002BC000-memory.dmp

          Filesize

          112KB

        • memory/2512-4-0x0000000000180000-0x000000000018E000-memory.dmp

          Filesize

          56KB

        • memory/2512-51-0x000007FEF5490000-0x000007FEF5E7C000-memory.dmp

          Filesize

          9.9MB

        • memory/2512-2-0x000007FEF5490000-0x000007FEF5E7C000-memory.dmp

          Filesize

          9.9MB

        • memory/2512-1-0x00000000001A0000-0x000000000027C000-memory.dmp

          Filesize

          880KB