Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 09:55
Behavioral task
behavioral1
Sample
f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe
Resource
win10v2004-20241007-en
General
-
Target
f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe
-
Size
1.2MB
-
MD5
d3b579a658327ea6b0b270989961d4a0
-
SHA1
4f973046dd649eb484960bb5decdcb1854eb759a
-
SHA256
f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cf
-
SHA512
0ed2079276cef4e973e2b0166f4f57ce124c43d2d866a772c78a8a801458256fdb1d233cb0a047dd2e8ee6b09ab66505f75073ed241f73f9944d14078b5d4468
-
SSDEEP
24576:v+r+6mj4wnm4qDfidSA440wOkTM5lcQANNVRIQPc2UWab:v++6mJqDuQd52QANNVRIQ8
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 30 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3960 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3956 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4720 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2224 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1836 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3980 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2744 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2436 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5096 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1060 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4224 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2132 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3140 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2372 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2932 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2704 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3236 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4088 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 544 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1184 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3712 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4980 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4108 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4428 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3096 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 244 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4276 3952 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 924 3952 schtasks.exe 84 -
resource yara_rule behavioral2/memory/2708-1-0x0000000000A00000-0x0000000000B32000-memory.dmp dcrat behavioral2/files/0x0007000000023cbe-15.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe -
Executes dropped EXE 1 IoCs
pid Process 4332 MusNotification.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files\Mozilla Firefox\backgroundTaskHost.exe f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe File created C:\Program Files\Uninstall Information\56085415360792 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe File created C:\Program Files\Microsoft Office\Office16\MusNotification.exe f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe File created C:\Program Files\Windows Photo Viewer\5b884080fd4f94 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\spoolsv.exe f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe File created C:\Program Files (x86)\MSBuild\ea1d8f6d871115 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe File created C:\Program Files (x86)\MSBuild\upfc.exe f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe File created C:\Program Files\Mozilla Firefox\eddb19405b7ce1 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe File created C:\Program Files\Uninstall Information\wininit.exe f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe File created C:\Program Files\Microsoft Office\Office16\aa97147c4c782d f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe File created C:\Program Files\Windows Photo Viewer\fontdrvhost.exe f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe File created C:\Program Files (x86)\Windows Defender\dllhost.exe f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe File created C:\Program Files (x86)\Windows Defender\5940a34987c991 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\diagnostics\sppsvc.exe f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 30 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 544 schtasks.exe 4980 schtasks.exe 4108 schtasks.exe 3956 schtasks.exe 4720 schtasks.exe 2436 schtasks.exe 1184 schtasks.exe 2224 schtasks.exe 2744 schtasks.exe 2372 schtasks.exe 3236 schtasks.exe 244 schtasks.exe 4276 schtasks.exe 924 schtasks.exe 3960 schtasks.exe 2704 schtasks.exe 2432 schtasks.exe 3712 schtasks.exe 3140 schtasks.exe 3980 schtasks.exe 1060 schtasks.exe 4224 schtasks.exe 2132 schtasks.exe 1836 schtasks.exe 2932 schtasks.exe 3096 schtasks.exe 2148 schtasks.exe 5096 schtasks.exe 4088 schtasks.exe 4428 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 4332 MusNotification.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe Token: SeDebugPrivilege 4332 MusNotification.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2708 wrote to memory of 4332 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 116 PID 2708 wrote to memory of 4332 2708 f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe"C:\Users\Admin\AppData\Local\Temp\f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Default\MusNotification.exe"C:\Users\Default\MusNotification.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Downloads\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Public\Downloads\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Downloads\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\Default User\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 9 /tr "'C:\Users\Default\MusNotification.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\Users\Default\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 5 /tr "'C:\Users\Default\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Defender\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Defender\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\MSBuild\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\MSBuild\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Program Files\Mozilla Firefox\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 14 /tr "'C:\Program Files\Mozilla Firefox\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Program Files\Uninstall Information\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Program Files\Uninstall Information\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office\Office16\MusNotification.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office16\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 12 /tr "'C:\Program Files\Microsoft Office\Office16\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Pictures\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Public\Pictures\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Pictures\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Photo Viewer\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Photo Viewer\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5d3b579a658327ea6b0b270989961d4a0
SHA14f973046dd649eb484960bb5decdcb1854eb759a
SHA256f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cf
SHA5120ed2079276cef4e973e2b0166f4f57ce124c43d2d866a772c78a8a801458256fdb1d233cb0a047dd2e8ee6b09ab66505f75073ed241f73f9944d14078b5d4468