Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 04:36
Behavioral task
behavioral1
Sample
fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe
Resource
win10v2004-20241007-en
General
-
Target
fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe
-
Size
1.5MB
-
MD5
3f46b4fc008b1267c97e905c89ca60bf
-
SHA1
05725fe5083fc1f15d61a052dc5d3bbab3e34742
-
SHA256
fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440
-
SHA512
d14ec2b39a4a3c906a3f3575a7e3667df33bcbc113eba0da98a906d94bab9f4ada71b79abfe01db28316035b1d87087518bcfd5bc45c094994b56a8efa603b9a
-
SSDEEP
24576:MeaMajUi+6C+mDjn7gbkFaSH7Wu4mIWGE1Sy/fBEXTHhaTEEER71RM4I13:Meaj9bHmMbkBHVdGE1Sy/ujhaIh+1
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 12 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3312 3996 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3608 3996 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4984 3996 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2780 3996 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4452 3996 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2388 3996 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4052 3996 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4368 3996 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5076 3996 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4792 3996 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2840 3996 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4856 3996 schtasks.exe 84 -
resource yara_rule behavioral2/memory/5056-1-0x00000000007F0000-0x000000000097E000-memory.dmp dcrat behavioral2/files/0x0009000000023c49-31.dat dcrat -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe -
Executes dropped EXE 1 IoCs
pid Process 5024 sihost.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Mail\sihost.exe fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe File opened for modification C:\Program Files (x86)\Windows Mail\sihost.exe fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe File created C:\Program Files (x86)\Windows Mail\66fc9ff0ee96c2 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe File opened for modification C:\Program Files (x86)\Windows Mail\RCX1A5B.tmp fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe File opened for modification C:\Program Files (x86)\Windows Mail\RCX1A6C.tmp fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Globalization\Time Zone\upfc.exe fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe File created C:\Windows\IdentityCRL\production\backgroundTaskHost.exe fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe File opened for modification C:\Windows\Globalization\Time Zone\upfc.exe fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe File opened for modification C:\Windows\IdentityCRL\production\RCX1E95.tmp fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe File opened for modification C:\Windows\IdentityCRL\production\RCX1E96.tmp fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe File created C:\Windows\Globalization\Time Zone\ea1d8f6d871115 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe File created C:\Windows\IdentityCRL\production\eddb19405b7ce1 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe File opened for modification C:\Windows\Globalization\Time Zone\RCX1C80.tmp fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe File opened for modification C:\Windows\Globalization\Time Zone\RCX1C81.tmp fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe File opened for modification C:\Windows\IdentityCRL\production\backgroundTaskHost.exe fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3608 schtasks.exe 4984 schtasks.exe 2780 schtasks.exe 4052 schtasks.exe 4368 schtasks.exe 4792 schtasks.exe 2840 schtasks.exe 3312 schtasks.exe 4856 schtasks.exe 2388 schtasks.exe 5076 schtasks.exe 4452 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe 5024 sihost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe Token: SeDebugPrivilege 5024 sihost.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5056 wrote to memory of 5024 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 100 PID 5056 wrote to memory of 5024 5056 fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe"C:\Users\Admin\AppData\Local\Temp\fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Program Files (x86)\Windows Mail\sihost.exe"C:\Program Files (x86)\Windows Mail\sihost.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Mail\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Mail\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 8 /tr "'C:\Windows\Globalization\Time Zone\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Windows\Globalization\Time Zone\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 14 /tr "'C:\Windows\Globalization\Time Zone\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Windows\IdentityCRL\production\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\IdentityCRL\production\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 14 /tr "'C:\Windows\IdentityCRL\production\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\AppData\Roaming\Sun\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Roaming\Sun\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\AppData\Roaming\Sun\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD53f46b4fc008b1267c97e905c89ca60bf
SHA105725fe5083fc1f15d61a052dc5d3bbab3e34742
SHA256fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440
SHA512d14ec2b39a4a3c906a3f3575a7e3667df33bcbc113eba0da98a906d94bab9f4ada71b79abfe01db28316035b1d87087518bcfd5bc45c094994b56a8efa603b9a