Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2024 19:35

General

  • Target

    097054f17509ff1370a6954f8d69c873d8013a9d8439cc623545d583f4b263de.exe

  • Size

    952KB

  • MD5

    80fd1427a8a08ad8f16a5a091d3080d5

  • SHA1

    16e6e7fdec42cdb1216c1ec28a3760135f6b5e1f

  • SHA256

    097054f17509ff1370a6954f8d69c873d8013a9d8439cc623545d583f4b263de

  • SHA512

    8f321556d6b2cc8a5605e928534d29034587de4af47df149153fa9f636c56afb730a55a1ad01f491d531c4315bc31aefadd09462257478416636b9aba8672612

  • SSDEEP

    24576:W+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:x8/KfRTK

Malware Config

Signatures

  • DcRat 23 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 10 IoCs
  • Process spawned unexpected child process 10 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 9 IoCs
  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 20 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops file in System32 directory 20 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\097054f17509ff1370a6954f8d69c873d8013a9d8439cc623545d583f4b263de.exe
    "C:\Users\Admin\AppData\Local\Temp\097054f17509ff1370a6954f8d69c873d8013a9d8439cc623545d583f4b263de.exe"
    1⤵
    • DcRat
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2960
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wPTDzgIrIb.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2324
        • C:\Users\Admin\AppData\Local\Temp\097054f17509ff1370a6954f8d69c873d8013a9d8439cc623545d583f4b263de.exe
          "C:\Users\Admin\AppData\Local\Temp\097054f17509ff1370a6954f8d69c873d8013a9d8439cc623545d583f4b263de.exe"
          3⤵
          • Modifies WinLogon for persistence
          • UAC bypass
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1668
          • C:\Windows\System32\wbem\drvinst\WmiPrvSE.exe
            "C:\Windows\System32\wbem\drvinst\WmiPrvSE.exe"
            4⤵
            • UAC bypass
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of AdjustPrivilegeToken
            • System policy modification
            PID:1292
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Documents and Settings\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2296
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\regedit\explorer.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2776
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\api-ms-win-core-heap-l1-1-0\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2780
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\PerfLogs\Admin\csrss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2588
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\mstscax\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1168
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\drvinst\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1428
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\mmcico\csrss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:752
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\ProgramData\Microsoft\MSDN\csrss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:576
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\pcl\smss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2428
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\licmgr10\csrss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2860

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PerfLogs\Admin\csrss.exe

      Filesize

      952KB

      MD5

      56c429a460be829c28d0b4cdc116f5a4

      SHA1

      c1ee48b33d9467330d50897cfd03b2ba7fc73621

      SHA256

      16cb1376d639951a3e07d29d4460938cd150a1ca112e1ab2dd6bba17624676fd

      SHA512

      ce004abd9b9b0191231f422b7e391bc34829c714f97591748ac10e4df7a9a79c72a896a3c43d98612afa22d955bf540e6e236a36fd2bf16d91c89195449f6a46

    • C:\Users\Admin\AppData\Local\Temp\RCXBFB8.tmp

      Filesize

      952KB

      MD5

      80fd1427a8a08ad8f16a5a091d3080d5

      SHA1

      16e6e7fdec42cdb1216c1ec28a3760135f6b5e1f

      SHA256

      097054f17509ff1370a6954f8d69c873d8013a9d8439cc623545d583f4b263de

      SHA512

      8f321556d6b2cc8a5605e928534d29034587de4af47df149153fa9f636c56afb730a55a1ad01f491d531c4315bc31aefadd09462257478416636b9aba8672612

    • C:\Users\Admin\AppData\Local\Temp\wPTDzgIrIb.bat

      Filesize

      266B

      MD5

      b9dc6ea612c272746c76599a5e6b4f15

      SHA1

      b69daf2651dd732f5e9b591c232e694e71954352

      SHA256

      3da50f0aa28cf904cd4f0cfa0dfdb51f72c748952bb5f12ecabec95d89edd6ed

      SHA512

      a1ff95bb0b705a265434f404d439cbe8a40cfe2f6acb9688876d99d2407546f32769ba17e3cfa1af5bd10dc872e27ea483f7b060e7b1fccec4e0e17cab4555a1

    • C:\Users\winlogon.exe

      Filesize

      952KB

      MD5

      b2b09be11b1e02501eb9a78929c9e696

      SHA1

      e0e8f5cb53d4c1c7e68cef1f95435b4ebcc44430

      SHA256

      f4560495ba26acad5353697aa9af4df723ee717da9d528e60087c74ea6297f5f

      SHA512

      0bb8f7ad127014cd5e175585313a63a0c66b8b9c4f8ca0ec51b84da5110b3a244e4affb4a535439719e14d24d144e454de005300b1ea9eeea8ec7e6c96d0b7e2

    • memory/1292-109-0x0000000000F70000-0x0000000001064000-memory.dmp

      Filesize

      976KB

    • memory/1668-78-0x00000000002D0000-0x00000000003C4000-memory.dmp

      Filesize

      976KB

    • memory/2960-4-0x0000000000250000-0x0000000000260000-memory.dmp

      Filesize

      64KB

    • memory/2960-5-0x0000000000280000-0x000000000028A000-memory.dmp

      Filesize

      40KB

    • memory/2960-8-0x0000000000590000-0x0000000000598000-memory.dmp

      Filesize

      32KB

    • memory/2960-11-0x0000000000570000-0x000000000057C000-memory.dmp

      Filesize

      48KB

    • memory/2960-10-0x00000000002A0000-0x00000000002AC000-memory.dmp

      Filesize

      48KB

    • memory/2960-9-0x0000000000580000-0x000000000058A000-memory.dmp

      Filesize

      40KB

    • memory/2960-6-0x0000000000260000-0x000000000026C000-memory.dmp

      Filesize

      48KB

    • memory/2960-7-0x0000000000270000-0x000000000027A000-memory.dmp

      Filesize

      40KB

    • memory/2960-0-0x000007FEF5CD3000-0x000007FEF5CD4000-memory.dmp

      Filesize

      4KB

    • memory/2960-75-0x000007FEF5CD0000-0x000007FEF66BC000-memory.dmp

      Filesize

      9.9MB

    • memory/2960-3-0x0000000000240000-0x0000000000250000-memory.dmp

      Filesize

      64KB

    • memory/2960-2-0x000007FEF5CD0000-0x000007FEF66BC000-memory.dmp

      Filesize

      9.9MB

    • memory/2960-1-0x0000000001040000-0x0000000001134000-memory.dmp

      Filesize

      976KB