Analysis
-
max time kernel
10s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 04:46
Static task
static1
Behavioral task
behavioral1
Sample
$RH9VZ2N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
$RH9VZ2N.exe
Resource
win10v2004-20241007-en
General
-
Target
$RH9VZ2N.exe
-
Size
1.8MB
-
MD5
42b89874d3138f40f32285be945f2ceb
-
SHA1
1766b4c4a040ba19afc4318e9b2eab775fee88d7
-
SHA256
619f85e67208f3639eacc3121636208ce043ce5cf1f5204b86857cb03b5a004a
-
SHA512
df44c7f5677a0b8e181f52b5c865315672b7c90b37f99c3b5e31714bdbb47d32d652073c42f1e614d2911faddc0394411aa3e1b8c3f832549c0d52f409722ca9
-
SSDEEP
49152:QdBn+oix+Z7vL4tzzQVGVzDd3Omjq+FLof:QdB+jx+Jv6zQVy1FLof
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4960 1128 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1960 1128 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1812 1128 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4264 1128 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1696 1128 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2444 1128 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4544 1128 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2716 1128 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4504 1128 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1816 1128 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3252 1128 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4496 1128 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4268 1128 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1876 1128 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5076 1128 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3164 1128 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5052 1128 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 640 1128 schtasks.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
$RH9VZ2N.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation $RH9VZ2N.exe -
Drops file in Program Files directory 9 IoCs
Processes:
$RH9VZ2N.exedescription ioc process File created C:\Program Files (x86)\Windows Sidebar\Gadgets\ea9f0e6c9e2dcd $RH9VZ2N.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\dllhost.exe $RH9VZ2N.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\5940a34987c991 $RH9VZ2N.exe File created C:\Program Files\Uninstall Information\TextInputHost.exe $RH9VZ2N.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\taskhostw.exe $RH9VZ2N.exe File created C:\Program Files (x86)\Windows Media Player\it-IT\SppExtComObj.exe $RH9VZ2N.exe File created C:\Program Files (x86)\Windows Media Player\it-IT\e1ef82546f0b02 $RH9VZ2N.exe File opened for modification C:\Program Files\Uninstall Information\TextInputHost.exe $RH9VZ2N.exe File created C:\Program Files\Uninstall Information\22eafd247d37c3 $RH9VZ2N.exe -
Drops file in Windows directory 2 IoCs
Processes:
$RH9VZ2N.exedescription ioc process File created C:\Windows\bcastdvr\csrss.exe $RH9VZ2N.exe File created C:\Windows\bcastdvr\886983d96e3d3e $RH9VZ2N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Modifies registry class 1 IoCs
Processes:
$RH9VZ2N.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings $RH9VZ2N.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1816 schtasks.exe 4496 schtasks.exe 3164 schtasks.exe 5052 schtasks.exe 1960 schtasks.exe 2444 schtasks.exe 2716 schtasks.exe 4544 schtasks.exe 1876 schtasks.exe 4960 schtasks.exe 4264 schtasks.exe 1696 schtasks.exe 5076 schtasks.exe 640 schtasks.exe 1812 schtasks.exe 4504 schtasks.exe 4268 schtasks.exe 3252 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
$RH9VZ2N.exepid process 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe 3492 $RH9VZ2N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
$RH9VZ2N.exedescription pid process Token: SeDebugPrivilege 3492 $RH9VZ2N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
$RH9VZ2N.execmd.exedescription pid process target process PID 3492 wrote to memory of 3264 3492 $RH9VZ2N.exe cmd.exe PID 3492 wrote to memory of 3264 3492 $RH9VZ2N.exe cmd.exe PID 3264 wrote to memory of 2412 3264 cmd.exe chcp.com PID 3264 wrote to memory of 2412 3264 cmd.exe chcp.com PID 3264 wrote to memory of 4712 3264 cmd.exe PING.EXE PID 3264 wrote to memory of 4712 3264 cmd.exe PING.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\$RH9VZ2N.exe"C:\Users\Admin\AppData\Local\Temp\$RH9VZ2N.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\IxwNap7d7D.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2412
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4712
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Media Player\it-IT\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\it-IT\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Media Player\it-IT\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Windows\bcastdvr\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\bcastdvr\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Windows\bcastdvr\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Program Files\Uninstall Information\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 11 /tr "'C:\Program Files\Uninstall Information\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "$RH9VZ2N$" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\AppData\Local\Temp\$RH9VZ2N.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "$RH9VZ2N" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\$RH9VZ2N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "$RH9VZ2N$" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\AppData\Local\Temp\$RH9VZ2N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD542b89874d3138f40f32285be945f2ceb
SHA11766b4c4a040ba19afc4318e9b2eab775fee88d7
SHA256619f85e67208f3639eacc3121636208ce043ce5cf1f5204b86857cb03b5a004a
SHA512df44c7f5677a0b8e181f52b5c865315672b7c90b37f99c3b5e31714bdbb47d32d652073c42f1e614d2911faddc0394411aa3e1b8c3f832549c0d52f409722ca9
-
Filesize
184B
MD5c4df44860ac5b614b3950d022bec8c2a
SHA16e54ba09ebe6baff0067ede4c76030732dac4ead
SHA256cf54503c733202fbf6f4c786e24e4b0e7225eb2dd2145b89aeec6d65ac3e822a
SHA5122d4a0128bd47adc9391301f13ed599896232362132aec14a4d79892361d2fc3c57e72ed2c3b21bea8b92faa9173029e756e11bfd559d5099c3b52700302d8b19