Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 03:26

General

  • Target

    b0c1b143e23bdbcaeb5916b4ecb941fe5072023136e157394df8d1e1c306bf84.exe

  • Size

    2.7MB

  • MD5

    93b41bde029ee047568eaf23be8cf599

  • SHA1

    50ce44062008f18a3127522e5fa94d373c97ca8f

  • SHA256

    b0c1b143e23bdbcaeb5916b4ecb941fe5072023136e157394df8d1e1c306bf84

  • SHA512

    8744ac0e952e5e1d9f40dc89a9131353c475d8eeb309d34e68209e985e16fff80e1df3a16282ad48e95e3f27380e6b47e89d2e6df1ac5b652ab8a4b5b85eecf3

  • SSDEEP

    49152:ZVIR0tEKCS4NSvq428wJW2KU3wvEGXFdRp8uM4BQdIFo11IQu:TIR0tWTS5wJW2viXHR65XOi11ID

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 30 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 30 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0c1b143e23bdbcaeb5916b4ecb941fe5072023136e157394df8d1e1c306bf84.exe
    "C:\Users\Admin\AppData\Local\Temp\b0c1b143e23bdbcaeb5916b4ecb941fe5072023136e157394df8d1e1c306bf84.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:436
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2HVdYORdue.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2036
        • C:\Windows\TAPI\smss.exe
          "C:\Windows\TAPI\smss.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:3200
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4440
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:5060
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2876
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 10 /tr "'C:\Program Files\Mozilla Firefox\defaults\pref\sysmon.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3444
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\defaults\pref\sysmon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4908
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 14 /tr "'C:\Program Files\Mozilla Firefox\defaults\pref\sysmon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2408
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\RuntimeBroker.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4028
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2736
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3412
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3416
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:628
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3372
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Windows\TAPI\smss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:916
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\TAPI\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2940
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Windows\TAPI\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4808
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files\Common Files\System\dllhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3288
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Common Files\System\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:376
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Program Files\Common Files\System\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2828
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Documents\My Videos\TextInputHost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:368
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Users\Admin\Documents\My Videos\TextInputHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2432
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Documents\My Videos\TextInputHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:100
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Windows\Help\en-US\backgroundTaskHost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1636
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\Help\en-US\backgroundTaskHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:464
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 7 /tr "'C:\Windows\Help\en-US\backgroundTaskHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3552
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Windows\Speech\Engines\Registry.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1216
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Windows\Speech\Engines\Registry.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1692
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 8 /tr "'C:\Windows\Speech\Engines\Registry.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4524
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft\sppsvc.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4460
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1288
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3408

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Common Files\System\dllhost.exe

      Filesize

      2.7MB

      MD5

      1d5284e7be9719a57af56e2c7023ed7a

      SHA1

      d695d25fce3d6ddc1a889f6d8c925f03e261296d

      SHA256

      d20ed1c89a7e3eb899acfceacb181d5c23be64aebb3a2704d1b933ba507bf4b0

      SHA512

      e7c4dc71423bfc48040199d5fd913eb4a86dc3a9cc4a8921294e68b6cfa4b9d9ca397508c90f25d6595722b3162601fbbffaf024d05ff9ad469ecda259d7db9e

    • C:\Users\Admin\AppData\Local\Temp\2HVdYORdue.bat

      Filesize

      189B

      MD5

      2931b4655b9fe531af681c7e7336842e

      SHA1

      e015eff0bc48bce2fc99ffcd6aec58e9d3c62ff7

      SHA256

      1fea705d22be06e14b0b83c6db68f5e4bb177b2652147e91cbc0441830e7cb1e

      SHA512

      b24c4b8967a713bdb4940ecdac2c944e6950298c4e09fb978b669ef69627f82fe60aee03affcabc44c665a458c5af9ba9c8a77b26345764cfc39484b3028bc4e

    • C:\Windows\TAPI\smss.exe

      Filesize

      2.7MB

      MD5

      93b41bde029ee047568eaf23be8cf599

      SHA1

      50ce44062008f18a3127522e5fa94d373c97ca8f

      SHA256

      b0c1b143e23bdbcaeb5916b4ecb941fe5072023136e157394df8d1e1c306bf84

      SHA512

      8744ac0e952e5e1d9f40dc89a9131353c475d8eeb309d34e68209e985e16fff80e1df3a16282ad48e95e3f27380e6b47e89d2e6df1ac5b652ab8a4b5b85eecf3

    • memory/436-14-0x000000001C800000-0x000000001CD28000-memory.dmp

      Filesize

      5.2MB

    • memory/436-16-0x000000001C550000-0x000000001C558000-memory.dmp

      Filesize

      32KB

    • memory/436-5-0x000000001C210000-0x000000001C260000-memory.dmp

      Filesize

      320KB

    • memory/436-7-0x00000000030A0000-0x00000000030B0000-memory.dmp

      Filesize

      64KB

    • memory/436-6-0x0000000001820000-0x0000000001828000-memory.dmp

      Filesize

      32KB

    • memory/436-8-0x00000000031C0000-0x00000000031D6000-memory.dmp

      Filesize

      88KB

    • memory/436-9-0x00000000031E0000-0x00000000031E8000-memory.dmp

      Filesize

      32KB

    • memory/436-10-0x0000000003210000-0x000000000321A000-memory.dmp

      Filesize

      40KB

    • memory/436-11-0x000000001C260000-0x000000001C2B6000-memory.dmp

      Filesize

      344KB

    • memory/436-12-0x00000000031F0000-0x00000000031F8000-memory.dmp

      Filesize

      32KB

    • memory/436-13-0x0000000003200000-0x0000000003212000-memory.dmp

      Filesize

      72KB

    • memory/436-0-0x00007FFB89CE3000-0x00007FFB89CE5000-memory.dmp

      Filesize

      8KB

    • memory/436-15-0x000000001C2D0000-0x000000001C2DC000-memory.dmp

      Filesize

      48KB

    • memory/436-4-0x0000000003080000-0x000000000309C000-memory.dmp

      Filesize

      112KB

    • memory/436-17-0x000000001C3E0000-0x000000001C3EE000-memory.dmp

      Filesize

      56KB

    • memory/436-18-0x000000001C3F0000-0x000000001C3FE000-memory.dmp

      Filesize

      56KB

    • memory/436-19-0x000000001C400000-0x000000001C40C000-memory.dmp

      Filesize

      48KB

    • memory/436-20-0x000000001C510000-0x000000001C51A000-memory.dmp

      Filesize

      40KB

    • memory/436-21-0x000000001C520000-0x000000001C52C000-memory.dmp

      Filesize

      48KB

    • memory/436-3-0x0000000001810000-0x000000000181E000-memory.dmp

      Filesize

      56KB

    • memory/436-2-0x00007FFB89CE0000-0x00007FFB8A7A1000-memory.dmp

      Filesize

      10.8MB

    • memory/436-164-0x00007FFB89CE3000-0x00007FFB89CE5000-memory.dmp

      Filesize

      8KB

    • memory/436-1-0x0000000000C80000-0x0000000000F44000-memory.dmp

      Filesize

      2.8MB

    • memory/436-172-0x00007FFB89CE0000-0x00007FFB8A7A1000-memory.dmp

      Filesize

      10.8MB

    • memory/3200-176-0x000000001D5F0000-0x000000001D602000-memory.dmp

      Filesize

      72KB