Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 22:49

General

  • Target

    0a5b531197542f39a3dd325cdf0ffe37d771a4c3620e6d5317c3c2c845b6a3bd.exe

  • Size

    2.7MB

  • MD5

    9ee80d36d88c45263efe383594c9e691

  • SHA1

    48474dc934a74661330f307b199581867f6baa7c

  • SHA256

    0a5b531197542f39a3dd325cdf0ffe37d771a4c3620e6d5317c3c2c845b6a3bd

  • SHA512

    ae1fab9d36bcef8c8e65c2e93e42ff83f8fc7641d1a1662b8ecd959fd2a28cd1c57cb751ce83c8d7f815cc10e8d226065b224303ef19b53508ba0a3601337f81

  • SSDEEP

    24576:S+O4GERsRRVgXtXzrTiJe48ySFtPNe5fO:lirO9P348yqb

Malware Config

Signatures

  • DcRat 36 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 14 IoCs
  • Process spawned unexpected child process 14 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 28 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 14 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a5b531197542f39a3dd325cdf0ffe37d771a4c3620e6d5317c3c2c845b6a3bd.exe
    "C:\Users\Admin\AppData\Local\Temp\0a5b531197542f39a3dd325cdf0ffe37d771a4c3620e6d5317c3c2c845b6a3bd.exe"
    1⤵
    • DcRat
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ylzBfwqiiK.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:64
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2016
        • C:\Users\Admin\AppData\Local\Temp\0a5b531197542f39a3dd325cdf0ffe37d771a4c3620e6d5317c3c2c845b6a3bd.exe
          "C:\Users\Admin\AppData\Local\Temp\0a5b531197542f39a3dd325cdf0ffe37d771a4c3620e6d5317c3c2c845b6a3bd.exe"
          3⤵
          • Modifies WinLogon for persistence
          • Checks computer location settings
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:648
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\r18DqsvVrj.bat"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:704
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              5⤵
                PID:1148
              • C:\Windows\System32\wbem\mstsc\WmiPrvSE.exe
                "C:\Windows\System32\wbem\mstsc\WmiPrvSE.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4924
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2148
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "0a5b531197542f39a3dd325cdf0ffe37d771a4c3620e6d5317c3c2c845b6a3bd" /sc ONLOGON /tr "'C:\Windows\Logs\WindowsUpdate\0a5b531197542f39a3dd325cdf0ffe37d771a4c3620e6d5317c3c2c845b6a3bd.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3120
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\PerfLogs\spoolsv.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4840
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\NetworkBindingEngineMigPlugin\lsass.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4008
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost\TextInputHost.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4796
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Windows\System32\wbem\WPDShServiceObj\unsecapp.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3080
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\PerfLogs\upfc.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4384
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\splwow64\explorer.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3428
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\PerfLogs\dwm.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2252
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "0a5b531197542f39a3dd325cdf0ffe37d771a4c3620e6d5317c3c2c845b6a3bd" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\OZMCVSQS-20241007-0916\0a5b531197542f39a3dd325cdf0ffe37d771a4c3620e6d5317c3c2c845b6a3bd.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3992
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\explorer.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2496
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\PrintDialog\microsoft.system.package.metadata\Autogen\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2908
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\mstsc\WmiPrvSE.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4760
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\notepad\sysmon.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1728

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\0a5b531197542f39a3dd325cdf0ffe37d771a4c3620e6d5317c3c2c845b6a3bd.exe.log

        Filesize

        1KB

        MD5

        b7c0c43fc7804baaa7dc87152cdc9554

        SHA1

        1bab62bd56af745678d4e967d91e1ccfdeed4038

        SHA256

        46386a61f3aaf1b1c2e6efc9fc7e9e9ff16cd13ae58b8d856835771fedb6d457

        SHA512

        9fda3dd00a3406137e0113f13f78e77b20a76512b35820d38df696842cbbf2e2ebabfb99a3846c9637ecb54af858ec1551521187e379872973006426a253f769

      • C:\Users\Admin\AppData\Local\Temp\r18DqsvVrj.bat

        Filesize

        207B

        MD5

        18bb4fda72f691002bcfcb7110f89d65

        SHA1

        66fa205eecd741db0f9f01eeb79e0f43a541026c

        SHA256

        ea27d697d6f46c0a6881872e86db02a5e1a2ae4818788cb2ed507a21bd75677c

        SHA512

        64c6984e1c5f31ba124854a766ad84ea5bfc5f5080853b65bf62b7c5f268880ece1bf5fa8c86dc7d7a836f753e10555b6535d47d03990672d8dcf4bd1287e4e1

      • C:\Users\Admin\AppData\Local\Temp\ylzBfwqiiK.bat

        Filesize

        266B

        MD5

        363a9c04327fdd946c11770a7108e430

        SHA1

        ee7dc1805234dd4fcfef0f70cc3455128e376340

        SHA256

        ecbe4565c4885a9a36222988156632ab6747e08c7e924707b6e0f44780ee3e89

        SHA512

        ee2151f545141b07bef843210d5327b79108f5a56d5e7d0e3494a510594b49e7b3f9cb97b69514b08fb368d41c35e8c61708044977cef8bc19d850605db89aab

      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost\TextInputHost.exe

        Filesize

        2.7MB

        MD5

        9ee80d36d88c45263efe383594c9e691

        SHA1

        48474dc934a74661330f307b199581867f6baa7c

        SHA256

        0a5b531197542f39a3dd325cdf0ffe37d771a4c3620e6d5317c3c2c845b6a3bd

        SHA512

        ae1fab9d36bcef8c8e65c2e93e42ff83f8fc7641d1a1662b8ecd959fd2a28cd1c57cb751ce83c8d7f815cc10e8d226065b224303ef19b53508ba0a3601337f81

      • memory/4900-24-0x00007FF816960000-0x00007FF817421000-memory.dmp

        Filesize

        10.8MB

      • memory/4900-0-0x00007FF816963000-0x00007FF816965000-memory.dmp

        Filesize

        8KB

      • memory/4900-4-0x00007FF816960000-0x00007FF817421000-memory.dmp

        Filesize

        10.8MB

      • memory/4900-1-0x0000000000090000-0x000000000033E000-memory.dmp

        Filesize

        2.7MB

      • memory/4924-47-0x0000000003350000-0x000000000335C000-memory.dmp

        Filesize

        48KB

      • memory/4924-48-0x0000000003360000-0x000000000336C000-memory.dmp

        Filesize

        48KB

      • memory/4924-49-0x000000001BE30000-0x000000001BE3C000-memory.dmp

        Filesize

        48KB

      • memory/4924-50-0x0000000003370000-0x0000000003378000-memory.dmp

        Filesize

        32KB

      • memory/4924-51-0x00000000034A0000-0x00000000034AA000-memory.dmp

        Filesize

        40KB