Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2024 19:10

General

  • Target

    f7d1ba849bec5c9f1761a6b420f793fa7c350be0e66d40788cde74650bf8a20b.exe

  • Size

    952KB

  • MD5

    2e9644402e12601f1d8161857c48a3ad

  • SHA1

    43b55976d438bc8273932f12a12b7f248165e8a9

  • SHA256

    f7d1ba849bec5c9f1761a6b420f793fa7c350be0e66d40788cde74650bf8a20b

  • SHA512

    4e1efd2ef2a9e9f062c3a9321cb28c34a56edc9b398e857eb3f14ecc6ded5660249a4523b8c21eccf3db524625b05ab1b075d7be20f68d0e27f91e7b403a1662

  • SSDEEP

    24576:Q+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:z8/KfRTK

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 5 IoCs
  • Process spawned unexpected child process 5 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7d1ba849bec5c9f1761a6b420f793fa7c350be0e66d40788cde74650bf8a20b.exe
    "C:\Users\Admin\AppData\Local\Temp\f7d1ba849bec5c9f1761a6b420f793fa7c350be0e66d40788cde74650bf8a20b.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1404
    • C:\PerfLogs\Admin\dllhost.exe
      "C:\PerfLogs\Admin\dllhost.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:1800
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2864
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\PerfLogs\Admin\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2172
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\PerfLogs\Admin\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2888
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Windows\PLA\Templates\OSPPSVC.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2688
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\stdole2\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\winlogon.exe

    Filesize

    952KB

    MD5

    e75ce634e9844c8ad616cc917d7bbbc3

    SHA1

    f4fc9d2efa38604f848f1b11d5fffe88e7ad64c1

    SHA256

    8b768d1ddeb801e5f13f9c62a029466af027f5d2422534ddea4bee809fd8ba07

    SHA512

    1f8ad69d4c80903fe23c20edf0de17edcabca8785d5c47a2879c0a22a9aa7523b2075eb4a700107a379a3c78129ef4d12762faec6f9d04fc4998f592abca17df

  • C:\Windows\System32\stdole2\smss.exe

    Filesize

    952KB

    MD5

    2e9644402e12601f1d8161857c48a3ad

    SHA1

    43b55976d438bc8273932f12a12b7f248165e8a9

    SHA256

    f7d1ba849bec5c9f1761a6b420f793fa7c350be0e66d40788cde74650bf8a20b

    SHA512

    4e1efd2ef2a9e9f062c3a9321cb28c34a56edc9b398e857eb3f14ecc6ded5660249a4523b8c21eccf3db524625b05ab1b075d7be20f68d0e27f91e7b403a1662

  • memory/1404-7-0x0000000000620000-0x000000000062A000-memory.dmp

    Filesize

    40KB

  • memory/1404-9-0x0000000000640000-0x000000000064A000-memory.dmp

    Filesize

    40KB

  • memory/1404-0-0x000007FEF57D3000-0x000007FEF57D4000-memory.dmp

    Filesize

    4KB

  • memory/1404-6-0x00000000003E0000-0x00000000003EC000-memory.dmp

    Filesize

    48KB

  • memory/1404-5-0x0000000000630000-0x000000000063A000-memory.dmp

    Filesize

    40KB

  • memory/1404-4-0x00000000005D0000-0x00000000005E0000-memory.dmp

    Filesize

    64KB

  • memory/1404-10-0x0000000000650000-0x000000000065C000-memory.dmp

    Filesize

    48KB

  • memory/1404-3-0x00000000003D0000-0x00000000003E0000-memory.dmp

    Filesize

    64KB

  • memory/1404-11-0x0000000000660000-0x000000000066C000-memory.dmp

    Filesize

    48KB

  • memory/1404-8-0x0000000000610000-0x0000000000618000-memory.dmp

    Filesize

    32KB

  • memory/1404-2-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

    Filesize

    9.9MB

  • memory/1404-1-0x00000000003F0000-0x00000000004E4000-memory.dmp

    Filesize

    976KB

  • memory/1404-94-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

    Filesize

    9.9MB

  • memory/1800-93-0x00000000012E0000-0x00000000013D4000-memory.dmp

    Filesize

    976KB