Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 23:07

General

  • Target

    59b9f54f927431d2cf31d3aa202a0843.exe

  • Size

    2.2MB

  • MD5

    59b9f54f927431d2cf31d3aa202a0843

  • SHA1

    b23d214605133dc8e930f9a9d473c7c7622b4b56

  • SHA256

    007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e9594

  • SHA512

    89106822646d8d412d5c956fd01ad37e4b1f34599497f8e362262f82d2d47f4460632019d6ec09da58c45d690ebd03f2812d5809743203be081702680bfb28f8

  • SSDEEP

    24576:9zyhnYISyKSBWpKCeCirC9CMz+052LEgPHQ944INbKK6uK5Ye6KBOO3op+kE9hk4:9zyt2DixLb4I5KKnK5zgdlKWky

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 5 IoCs
  • Process spawned unexpected child process 15 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\59b9f54f927431d2cf31d3aa202a0843.exe
    "C:\Users\Admin\AppData\Local\Temp\59b9f54f927431d2cf31d3aa202a0843.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Drops file in Drivers directory
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4036
    • C:\Recovery\WindowsRE\dwm.exe
      "C:\Recovery\WindowsRE\dwm.exe"
      2⤵
      • UAC bypass
      • Checks computer location settings
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:996
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e5c9fde6-e290-4dee-8455-9a9bb165f30e.vbs"
        3⤵
          PID:4308
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7c3720ff-80aa-43c8-88de-aaa295c70492.vbs"
          3⤵
            PID:2840
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Desktop\RuntimeBroker.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:5072
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\All Users\Desktop\RuntimeBroker.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4408
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Desktop\RuntimeBroker.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2760
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4620
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4880
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1532
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Windows\Microsoft.NET\Framework\1031\spoolsv.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2408
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\Microsoft.NET\Framework\1031\spoolsv.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4224
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Windows\Microsoft.NET\Framework\1031\spoolsv.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3888
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Users\Public\SppExtComObj.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2136
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Users\Public\SppExtComObj.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1664
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 11 /tr "'C:\Users\Public\SppExtComObj.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3616
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:5084
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3592
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4576
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1748
      • C:\Windows\system32\wbem\WmiApSrv.exe
        C:\Windows\system32\wbem\WmiApSrv.exe
        1⤵
          PID:1932

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Recovery\WindowsRE\RuntimeBroker.exe

          Filesize

          2.2MB

          MD5

          59b9f54f927431d2cf31d3aa202a0843

          SHA1

          b23d214605133dc8e930f9a9d473c7c7622b4b56

          SHA256

          007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e9594

          SHA512

          89106822646d8d412d5c956fd01ad37e4b1f34599497f8e362262f82d2d47f4460632019d6ec09da58c45d690ebd03f2812d5809743203be081702680bfb28f8

        • C:\Users\Admin\AppData\Local\Temp\7c3720ff-80aa-43c8-88de-aaa295c70492.vbs

          Filesize

          481B

          MD5

          232f700c34dac242b3de53c0a85315f3

          SHA1

          2916a6210e03e0e8675f5786bf3927f6459a3582

          SHA256

          28ff7dd8b4cf116ba2b3115e930794d9b91cc91ea592d479ea6a108f29a98eb0

          SHA512

          9f6cdf36b4b7ebe9e2b9128930d82b588d23a79d25c179d67ec817c392fb81cd00406f6e27a3d5fa99cdc25a01f3ca589ab58a750ec674dc6a1075f932d6849a

        • C:\Users\Admin\AppData\Local\Temp\e5c9fde6-e290-4dee-8455-9a9bb165f30e.vbs

          Filesize

          704B

          MD5

          d0a68ace366755530fba813404604362

          SHA1

          bbab074a18bf040944cff40ea632418252da9ed8

          SHA256

          a3cb223143040eeaf410576c11278737cc7681b5407003b9d4929333c32975f2

          SHA512

          50f1b272f7e86ceaea4b9fe84a2a2561a7d3dda796cdbe6e98526a344609cf0088206a769153b7a7f43144bb67acbfc0ffb4ebb13e376e86826a472fa0fb2196

        • C:\Users\Public\Desktop\RCXA377.tmp

          Filesize

          2.2MB

          MD5

          54b48d7611fb49892fd9f36e6c9eb58c

          SHA1

          ca6e1ff091ea3624afd344751886e9b4e655a6f3

          SHA256

          f8fd70996226e10c0e26187249fc0e156c5d5141f6db19e2cf070b75d0e800c8

          SHA512

          52312fb241f9c9a3e1978e64127e574e35130b052081ead8eeb3bc9361825738cab14d172e3651effc7b97615cfec9ca565726decb3b721c1754c4f7a84ae754

        • memory/996-175-0x000000001E520000-0x000000001E6E2000-memory.dmp

          Filesize

          1.8MB

        • memory/4036-19-0x000000001B9D0000-0x000000001B9E2000-memory.dmp

          Filesize

          72KB

        • memory/4036-23-0x000000001BA20000-0x000000001BA2C000-memory.dmp

          Filesize

          48KB

        • memory/4036-9-0x000000001B160000-0x000000001B176000-memory.dmp

          Filesize

          88KB

        • memory/4036-6-0x000000001B930000-0x000000001B980000-memory.dmp

          Filesize

          320KB

        • memory/4036-12-0x000000001B1A0000-0x000000001B1B0000-memory.dmp

          Filesize

          64KB

        • memory/4036-13-0x000000001B980000-0x000000001B98A000-memory.dmp

          Filesize

          40KB

        • memory/4036-11-0x000000001B190000-0x000000001B198000-memory.dmp

          Filesize

          32KB

        • memory/4036-8-0x000000001B150000-0x000000001B160000-memory.dmp

          Filesize

          64KB

        • memory/4036-7-0x0000000002660000-0x0000000002668000-memory.dmp

          Filesize

          32KB

        • memory/4036-14-0x000000001B990000-0x000000001B99C000-memory.dmp

          Filesize

          48KB

        • memory/4036-15-0x000000001B9A0000-0x000000001B9A8000-memory.dmp

          Filesize

          32KB

        • memory/4036-16-0x000000001B9B0000-0x000000001B9BC000-memory.dmp

          Filesize

          48KB

        • memory/4036-17-0x000000001B9C0000-0x000000001B9C8000-memory.dmp

          Filesize

          32KB

        • memory/4036-0-0x00007FFABFA63000-0x00007FFABFA65000-memory.dmp

          Filesize

          8KB

        • memory/4036-20-0x000000001BF30000-0x000000001C458000-memory.dmp

          Filesize

          5.2MB

        • memory/4036-21-0x000000001BA00000-0x000000001BA0C000-memory.dmp

          Filesize

          48KB

        • memory/4036-22-0x000000001BA10000-0x000000001BA1C000-memory.dmp

          Filesize

          48KB

        • memory/4036-10-0x000000001B180000-0x000000001B18C000-memory.dmp

          Filesize

          48KB

        • memory/4036-24-0x000000001BCA0000-0x000000001BCAA000-memory.dmp

          Filesize

          40KB

        • memory/4036-27-0x000000001BB40000-0x000000001BB4E000-memory.dmp

          Filesize

          56KB

        • memory/4036-25-0x000000001BCB0000-0x000000001BCBE000-memory.dmp

          Filesize

          56KB

        • memory/4036-26-0x000000001BB30000-0x000000001BB38000-memory.dmp

          Filesize

          32KB

        • memory/4036-28-0x000000001BB50000-0x000000001BB5C000-memory.dmp

          Filesize

          48KB

        • memory/4036-29-0x000000001BCC0000-0x000000001BCC8000-memory.dmp

          Filesize

          32KB

        • memory/4036-31-0x000000001BCD0000-0x000000001BCDC000-memory.dmp

          Filesize

          48KB

        • memory/4036-30-0x00007FFABFA60000-0x00007FFAC0521000-memory.dmp

          Filesize

          10.8MB

        • memory/4036-34-0x00007FFABFA60000-0x00007FFAC0521000-memory.dmp

          Filesize

          10.8MB

        • memory/4036-5-0x0000000002640000-0x000000000265C000-memory.dmp

          Filesize

          112KB

        • memory/4036-4-0x0000000000F70000-0x0000000000F7E000-memory.dmp

          Filesize

          56KB

        • memory/4036-160-0x00007FFABFA63000-0x00007FFABFA65000-memory.dmp

          Filesize

          8KB

        • memory/4036-165-0x00007FFABFA60000-0x00007FFAC0521000-memory.dmp

          Filesize

          10.8MB

        • memory/4036-3-0x0000000000F60000-0x0000000000F6E000-memory.dmp

          Filesize

          56KB

        • memory/4036-2-0x00007FFABFA60000-0x00007FFAC0521000-memory.dmp

          Filesize

          10.8MB

        • memory/4036-1-0x00000000002D0000-0x00000000004FE000-memory.dmp

          Filesize

          2.2MB