Analysis

  • max time kernel
    114s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    05-11-2024 21:05

General

  • Target

    a444fc3ab26aefc4b10cdafa754b75d4677396f2ca92a4d670ee78f51c0e80e7N.exe

  • Size

    952KB

  • MD5

    33070246887bc29db6b8b0a07808cc10

  • SHA1

    6f29033bd3d2f3be700b77c6bd40ffafd9888ac3

  • SHA256

    a444fc3ab26aefc4b10cdafa754b75d4677396f2ca92a4d670ee78f51c0e80e7

  • SHA512

    2f11ec5ad30c036437de720700f97f620b7e58b7eb3785e964f5b804931be8a9b9e1d0f776fe955cc1c8da1ab0719f485c4de91ce5af664c66a8a5b7e80ea587

  • SSDEEP

    24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 9 IoCs
  • Process spawned unexpected child process 9 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 18 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 25 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a444fc3ab26aefc4b10cdafa754b75d4677396f2ca92a4d670ee78f51c0e80e7N.exe
    "C:\Users\Admin\AppData\Local\Temp\a444fc3ab26aefc4b10cdafa754b75d4677396f2ca92a4d670ee78f51c0e80e7N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2332
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LNDf0kMIbB.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:936
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1168
        • C:\Windows\System32\NAPCLCFG\sppsvc.exe
          "C:\Windows\System32\NAPCLCFG\sppsvc.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:288
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2736
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\deskperf\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2756
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\kbdibm02\wininit.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2892
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\WMIADAP.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2708
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Documents and Settings\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2608
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\NlsData081a\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2288
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\System32\NAPCLCFG\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2372
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\RegisterIEPKEYs\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2572
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\debug\WIA\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2956

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\LNDf0kMIbB.bat

      Filesize

      203B

      MD5

      fafb9d611b7d7166d33ed5aa952a023c

      SHA1

      5b4c44f86330eebc812020fb6da610753321b095

      SHA256

      d9caeaa51f5d1000aed7dddbe0d3b3d71e9761b69e473f7c5faae157422dc649

      SHA512

      afc9f7333e9bc9dc655f7dbb65f6c3c355754843d1808885fa9bdd60058fdd6404b32b1f02a3d92d1cf029e80e8db831f7f098a016f586717afa3fce619c2fb0

    • C:\Users\lsm.exe

      Filesize

      952KB

      MD5

      33070246887bc29db6b8b0a07808cc10

      SHA1

      6f29033bd3d2f3be700b77c6bd40ffafd9888ac3

      SHA256

      a444fc3ab26aefc4b10cdafa754b75d4677396f2ca92a4d670ee78f51c0e80e7

      SHA512

      2f11ec5ad30c036437de720700f97f620b7e58b7eb3785e964f5b804931be8a9b9e1d0f776fe955cc1c8da1ab0719f485c4de91ce5af664c66a8a5b7e80ea587

    • C:\Users\lsm.exe

      Filesize

      952KB

      MD5

      3bab8946b1c0075dfae67131fb1f2673

      SHA1

      c91e8f44cb930c420f586ee297e8705b797481c5

      SHA256

      1490420a8cb5a51d4032c6276e4cdce63ea4689c4095d3b5f1ac0c2c5c3d775c

      SHA512

      a4014bf1c338ce6aa710d931794f45020f6b86e67464b3f6fbfc90b335ddcb88e39e9510c26352af797f02edb5e02384015a8bff2042d075edd790f0491b593c

    • C:\Windows\System32\NAPCLCFG\sppsvc.exe

      Filesize

      952KB

      MD5

      f09ee2a084c2c013fed4c7e32e9037e2

      SHA1

      c24eec1b34bba111aa76d404aaa2b692d2f44a2b

      SHA256

      53814be85ad0585c5693d3e19ae20e1e6eec0be281670dafdd29ce0db3ffa4e5

      SHA512

      9dc41cafb64a353f167cfcfb0a50d7d618d85c7e1b5cd53d6d07af72c8e4b18fd12dda59cba7937efccbb648b76b368aa20bc03ba9025a7d99a8b466e68511ef

    • C:\Windows\System32\RegisterIEPKEYs\dllhost.exe

      Filesize

      952KB

      MD5

      fa61dd68f410051d8fa0e56b84190298

      SHA1

      84646432fa27a4611b41b00323a330acf971f697

      SHA256

      29d78b75beae5a4ab73007e7af681993a205b18091ede562ba344444a4be8f39

      SHA512

      2e105950c64d66f83b614236e38897679943d42e07ef8f1a95b4a9d8a2d01e29e80b3f899c8489a6580a9487a161d8c6fdb64fc3f1303382a4027f287236f155

    • memory/288-147-0x0000000001020000-0x0000000001114000-memory.dmp

      Filesize

      976KB

    • memory/2332-4-0x00000000003E0000-0x00000000003F0000-memory.dmp

      Filesize

      64KB

    • memory/2332-7-0x00000000005E0000-0x00000000005EA000-memory.dmp

      Filesize

      40KB

    • memory/2332-8-0x0000000000B80000-0x0000000000B88000-memory.dmp

      Filesize

      32KB

    • memory/2332-9-0x0000000000600000-0x000000000060A000-memory.dmp

      Filesize

      40KB

    • memory/2332-10-0x0000000000610000-0x000000000061C000-memory.dmp

      Filesize

      48KB

    • memory/2332-11-0x0000000000620000-0x000000000062C000-memory.dmp

      Filesize

      48KB

    • memory/2332-5-0x00000000003F0000-0x00000000003FA000-memory.dmp

      Filesize

      40KB

    • memory/2332-6-0x0000000000410000-0x000000000041C000-memory.dmp

      Filesize

      48KB

    • memory/2332-0-0x000007FEF5833000-0x000007FEF5834000-memory.dmp

      Filesize

      4KB

    • memory/2332-3-0x00000000003C0000-0x00000000003D0000-memory.dmp

      Filesize

      64KB

    • memory/2332-2-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

      Filesize

      9.9MB

    • memory/2332-144-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

      Filesize

      9.9MB

    • memory/2332-1-0x0000000000B90000-0x0000000000C84000-memory.dmp

      Filesize

      976KB