Analysis

  • max time kernel
    136s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-11-2024 02:19

General

  • Target

    4b1967b04039c9b7a23651043b38c895cca2eb560de30a960368f82549079605.exe

  • Size

    855KB

  • MD5

    5780dbae6ac61a88c8d89f216f324146

  • SHA1

    cebcebedc7aaea3a4dd1fbec933cd169bf92e9dc

  • SHA256

    4b1967b04039c9b7a23651043b38c895cca2eb560de30a960368f82549079605

  • SHA512

    8a595384247649e31ef0c69a63243199d224334d75b66fd486a8e6ba0ac3c2b5521e1ead4b64fb9c968c21a4836581dde10e78f36217b62862c40bed2d105920

  • SSDEEP

    12288:I/TnPz84JfpflKH6qHJJMA+7pW3Ari4VVyZC0+1cp9rcDNpTWDTQGCZ6:I/TnzfS6qpJMA+73iE0nTr66

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b1967b04039c9b7a23651043b38c895cca2eb560de30a960368f82549079605.exe
    "C:\Users\Admin\AppData\Local\Temp\4b1967b04039c9b7a23651043b38c895cca2eb560de30a960368f82549079605.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\shylgo2i\shylgo2i.cmdline"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES38A.tmp" "c:\Windows\System32\CSCB3049ED5A69F4BEBA5CDB4969F6ED5B0.TMP"
        3⤵
          PID:2644
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5hVQyYPYW5.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:408
        • C:\Windows\system32\chcp.com
          chcp 65001
          3⤵
            PID:2232
          • C:\Windows\system32\w32tm.exe
            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
            3⤵
              PID:1144
            • C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\sppsvc.exe
              "C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\sppsvc.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: CmdExeWriteProcessMemorySpam
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:948
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\sppsvc.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2820
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2568
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2624
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\explorer.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:776
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\explorer.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1124
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\explorer.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2872
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\Idle.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1948
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\Idle.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2852
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\Idle.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2860
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\NetHood\csrss.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:324
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Admin\NetHood\csrss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2744
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\NetHood\csrss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2956
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\lsm.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:568
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\lsm.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2480
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\lsm.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1768
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "4b1967b04039c9b7a23651043b38c895cca2eb560de30a960368f825490796054" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\AppData\Local\Temp\4b1967b04039c9b7a23651043b38c895cca2eb560de30a960368f82549079605.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2920
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "4b1967b04039c9b7a23651043b38c895cca2eb560de30a960368f82549079605" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\4b1967b04039c9b7a23651043b38c895cca2eb560de30a960368f82549079605.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3004
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "4b1967b04039c9b7a23651043b38c895cca2eb560de30a960368f825490796054" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\AppData\Local\Temp\4b1967b04039c9b7a23651043b38c895cca2eb560de30a960368f82549079605.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2276

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\sppsvc.exe

          Filesize

          855KB

          MD5

          5780dbae6ac61a88c8d89f216f324146

          SHA1

          cebcebedc7aaea3a4dd1fbec933cd169bf92e9dc

          SHA256

          4b1967b04039c9b7a23651043b38c895cca2eb560de30a960368f82549079605

          SHA512

          8a595384247649e31ef0c69a63243199d224334d75b66fd486a8e6ba0ac3c2b5521e1ead4b64fb9c968c21a4836581dde10e78f36217b62862c40bed2d105920

        • C:\Users\Admin\AppData\Local\Temp\5hVQyYPYW5.bat

          Filesize

          235B

          MD5

          00bd6fb0f45bc116e26075caec78f742

          SHA1

          a27e184a92e517f2c6310145b8df5a96820a7a2d

          SHA256

          0219ed22f8302bd149ef5e905901b7513296d9a45d56c69c3044aa8523b9b0e4

          SHA512

          5879973bfabfec1e842bcdc26c4f0af15517cf1766c5c1c26849fcc9be14dfdaedf5f45033d19e4681fe6d1c8596d53673316ac1ba24fc4bedbd1266cdd9cd79

        • C:\Users\Admin\AppData\Local\Temp\RES38A.tmp

          Filesize

          1KB

          MD5

          6be15cda64a929a5fd3f15022dc2b5d1

          SHA1

          0e59842607f0f93737711fef2d60ea4b289340ed

          SHA256

          d4b9bc4c0df46ef6c8adcdcd12a45b40fd619770f4e87966e4adda8c143776ad

          SHA512

          ab1fe84cdcad651d590a16704254fb02f280758c94fe61313ed576f4c4673e3b1a82dbf010568c3eee7b738bc971732358effe19a511b1763f0b2ae530e7f184

        • \??\c:\Users\Admin\AppData\Local\Temp\shylgo2i\shylgo2i.0.cs

          Filesize

          391B

          MD5

          0828c26cb24a857c5dc77baa8642df0a

          SHA1

          e406af17391177b3bb57b2168dd953ebf2065935

          SHA256

          23daad27616492bc51b45facbab9e68c1b17143eac88eabb8f0552653f4b85bd

          SHA512

          140d4a2298c8504d5d6568c67bd449a31040e1852650df241097d3860b8c6d28e57564bf4d912488f4096ddd38130bba74561bd171b599692d0c694c34b4a1d1

        • \??\c:\Users\Admin\AppData\Local\Temp\shylgo2i\shylgo2i.cmdline

          Filesize

          235B

          MD5

          d9a91b56df004b6f8f0e3f309fdc7910

          SHA1

          2be49b9eccbd49e845c415a55680d9351ff2967c

          SHA256

          ddf00b062a0950c7ebe562503f2f355b06f4b744a5d4d63f483e19db35ae1cbe

          SHA512

          6e1eb05d545a7196050e7a88ed0af34c5407dd8937e051164f5661891fe8f445200f333bf80c81cb41d1770e8389189de7948ebe1fdd12bd3cefa6806eecfbdf

        • \??\c:\Windows\System32\CSCB3049ED5A69F4BEBA5CDB4969F6ED5B0.TMP

          Filesize

          1KB

          MD5

          02b6f6024c0f35b2dfb735e30d40ea59

          SHA1

          9e28d1d16523aab5845e09fdecf27759375f9b5a

          SHA256

          17491f9c7a135563b4c9dd20e2113e934070166146005e0f97ab301f4a5ef4aa

          SHA512

          a8a734f3d0f4d6a8904a8faa5638db91e9034c55306f153fdf321731cdfaaa58847d731ee64b226df0bd6cd4b8e6ed6d2ed1af77f510e079755f7159af433672

        • memory/948-55-0x0000000000DC0000-0x0000000000E9C000-memory.dmp

          Filesize

          880KB

        • memory/1812-31-0x000007FEF5B30000-0x000007FEF651C000-memory.dmp

          Filesize

          9.9MB

        • memory/1812-33-0x000007FEF5B30000-0x000007FEF651C000-memory.dmp

          Filesize

          9.9MB

        • memory/1812-15-0x00000000003F0000-0x00000000003F8000-memory.dmp

          Filesize

          32KB

        • memory/1812-17-0x00000000003E0000-0x00000000003EC000-memory.dmp

          Filesize

          48KB

        • memory/1812-18-0x000007FEF5B30000-0x000007FEF651C000-memory.dmp

          Filesize

          9.9MB

        • memory/1812-4-0x0000000000150000-0x000000000015E000-memory.dmp

          Filesize

          56KB

        • memory/1812-30-0x000007FEF5B30000-0x000007FEF651C000-memory.dmp

          Filesize

          9.9MB

        • memory/1812-6-0x0000000000390000-0x00000000003AC000-memory.dmp

          Filesize

          112KB

        • memory/1812-32-0x000007FEF5B30000-0x000007FEF651C000-memory.dmp

          Filesize

          9.9MB

        • memory/1812-13-0x00000000003D0000-0x00000000003DE000-memory.dmp

          Filesize

          56KB

        • memory/1812-11-0x000007FEF5B30000-0x000007FEF651C000-memory.dmp

          Filesize

          9.9MB

        • memory/1812-0-0x000007FEF5B33000-0x000007FEF5B34000-memory.dmp

          Filesize

          4KB

        • memory/1812-39-0x000007FEF5B30000-0x000007FEF651C000-memory.dmp

          Filesize

          9.9MB

        • memory/1812-10-0x0000000000180000-0x000000000018C000-memory.dmp

          Filesize

          48KB

        • memory/1812-2-0x000007FEF5B30000-0x000007FEF651C000-memory.dmp

          Filesize

          9.9MB

        • memory/1812-1-0x0000000000D60000-0x0000000000E3C000-memory.dmp

          Filesize

          880KB

        • memory/1812-52-0x000007FEF5B30000-0x000007FEF651C000-memory.dmp

          Filesize

          9.9MB

        • memory/1812-8-0x00000000003B0000-0x00000000003C8000-memory.dmp

          Filesize

          96KB