Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2024 16:04

General

  • Target

    2c239b6669c4153041e6419d21f83b40bb8da60bb9c1596b8230855669f89e45N.exe

  • Size

    952KB

  • MD5

    b6b6b9deddd4eb954adbf89fb10868e0

  • SHA1

    6def03ac5431eab6aeb6a026b7616576b16eeb68

  • SHA256

    2c239b6669c4153041e6419d21f83b40bb8da60bb9c1596b8230855669f89e45

  • SHA512

    ef79a70d058a759bdfa55dd944b65699959b471075e0f1465e5ccc3a163ddcebb2dba7be7fc8a2d8124110e7272c94e860d9de389d31992a03519029dfe5633f

  • SSDEEP

    24576:u+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:p8/KfRTK

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c239b6669c4153041e6419d21f83b40bb8da60bb9c1596b8230855669f89e45N.exe
    "C:\Users\Admin\AppData\Local\Temp\2c239b6669c4153041e6419d21f83b40bb8da60bb9c1596b8230855669f89e45N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2464
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7kchHMyqQB.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:648
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1632
        • C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\wininit.exe
          "C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\wininit.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:1532
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\splwow64\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2648
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2796
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Documents and Settings\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2632
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\en-US\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2440
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppobjs-spp-plugin-manifest-signed\OSPPSVC.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2452
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\mcmde\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2416

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppobjs-spp-plugin-manifest-signed\OSPPSVC.exe

      Filesize

      952KB

      MD5

      b6b6b9deddd4eb954adbf89fb10868e0

      SHA1

      6def03ac5431eab6aeb6a026b7616576b16eeb68

      SHA256

      2c239b6669c4153041e6419d21f83b40bb8da60bb9c1596b8230855669f89e45

      SHA512

      ef79a70d058a759bdfa55dd944b65699959b471075e0f1465e5ccc3a163ddcebb2dba7be7fc8a2d8124110e7272c94e860d9de389d31992a03519029dfe5633f

    • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppobjs-spp-plugin-manifest-signed\OSPPSVC.exe

      Filesize

      952KB

      MD5

      ab30910595b52110485f6649a1e87eaf

      SHA1

      96d29c6149312800da23f137e856b239d83816e6

      SHA256

      e28de7176e6138e33b5095d506e41f301399e4cb6d95494ab622eb8b09a139ac

      SHA512

      30902d29899a3c16e89df1279b6bace41757bbd6e5f1480362e6c54b3d3f496ec3b17b2dc5bb68b4079db1d1aaae97e5af3ba0b089c309a284e52e86fb37a234

    • C:\Users\Admin\AppData\Local\Temp\7kchHMyqQB.bat

      Filesize

      238B

      MD5

      0d29e741c9f1c14579fb2ec8a1e86263

      SHA1

      80e6455b4c063010a3e008ec916f6c31f5172f9c

      SHA256

      c7711ab39702a7f8e0ceff361b681359abf558af5eea88286ecc7c6bbaa7704c

      SHA512

      8033d11546c15fcfe726f485087f08c535b1d919fce1910e734b184b0246984077e4a525cfe23240ae4a6c6da6099db7eb1449ba51cb25871201c1b8d6e40bba

    • C:\Windows\System32\mcmde\lsm.exe

      Filesize

      952KB

      MD5

      b2793793c0e8fe4231e424b93ffea9cd

      SHA1

      d500e15985df908bf509b72f7cb2bcad66d56f86

      SHA256

      a1dcebe2a8bb4bef15a6a56b0bece89ceda5e3868d847eed6bec9977d74b62c8

      SHA512

      efe9bc0b49d90ba0e63db8545d76a00720ec393878ef436823cd7b851cb6d91914b10d2fc0c12131279c3e6e21625be9b99bdf9784d89f9aea14fc04a30183d9

    • memory/1532-105-0x00000000002B0000-0x00000000003A4000-memory.dmp

      Filesize

      976KB

    • memory/2464-4-0x00000000003E0000-0x00000000003F0000-memory.dmp

      Filesize

      64KB

    • memory/2464-5-0x0000000000480000-0x000000000048A000-memory.dmp

      Filesize

      40KB

    • memory/2464-7-0x00000000004C0000-0x00000000004CA000-memory.dmp

      Filesize

      40KB

    • memory/2464-8-0x0000000000C30000-0x0000000000C38000-memory.dmp

      Filesize

      32KB

    • memory/2464-10-0x0000000000B70000-0x0000000000B7C000-memory.dmp

      Filesize

      48KB

    • memory/2464-9-0x00000000004E0000-0x00000000004EA000-memory.dmp

      Filesize

      40KB

    • memory/2464-11-0x0000000000B80000-0x0000000000B8C000-memory.dmp

      Filesize

      48KB

    • memory/2464-6-0x0000000000490000-0x000000000049C000-memory.dmp

      Filesize

      48KB

    • memory/2464-0-0x000007FEF4F13000-0x000007FEF4F14000-memory.dmp

      Filesize

      4KB

    • memory/2464-3-0x00000000003D0000-0x00000000003E0000-memory.dmp

      Filesize

      64KB

    • memory/2464-101-0x000007FEF4F10000-0x000007FEF58FC000-memory.dmp

      Filesize

      9.9MB

    • memory/2464-2-0x000007FEF4F10000-0x000007FEF58FC000-memory.dmp

      Filesize

      9.9MB

    • memory/2464-1-0x0000000000DD0000-0x0000000000EC4000-memory.dmp

      Filesize

      976KB