Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 02:01

General

  • Target

    007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e9594.exe

  • Size

    2.2MB

  • MD5

    59b9f54f927431d2cf31d3aa202a0843

  • SHA1

    b23d214605133dc8e930f9a9d473c7c7622b4b56

  • SHA256

    007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e9594

  • SHA512

    89106822646d8d412d5c956fd01ad37e4b1f34599497f8e362262f82d2d47f4460632019d6ec09da58c45d690ebd03f2812d5809743203be081702680bfb28f8

  • SSDEEP

    24576:9zyhnYISyKSBWpKCeCirC9CMz+052LEgPHQ944INbKK6uK5Ye6KBOO3op+kE9hk4:9zyt2DixLb4I5KKnK5zgdlKWky

Malware Config

Signatures

  • DcRat 29 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 9 IoCs
  • Process spawned unexpected child process 27 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 18 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 10 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 27 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e9594.exe
    "C:\Users\Admin\AppData\Local\Temp\007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e9594.exe"
    1⤵
    • DcRat
    • Modifies WinLogon for persistence
    • UAC bypass
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2848
    • C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e9594.exe
      "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e9594.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2164
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\46b367d6-838c-4ed7-9d9e-59f68d75bc80.vbs"
        3⤵
          PID:2344
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ef387c1d-fda3-4e92-a915-c874e9d23067.vbs"
          3⤵
            PID:2956
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e95940" /sc MINUTE /mo 10 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e9594.exe'" /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2680
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e9594" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e9594.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1972
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e95940" /sc MINUTE /mo 13 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e9594.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1068
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e95940" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Media Player\de-DE\007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e9594.exe'" /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1820
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e9594" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\de-DE\007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e9594.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2596
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e95940" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Media Player\de-DE\007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e9594.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3040
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\audiodg.exe'" /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:772
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\audiodg.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1444
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\audiodg.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1260
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\winlogon.exe'" /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2736
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2260
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2448
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\WmiPrvSE.exe'" /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1120
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\WmiPrvSE.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1140
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\WmiPrvSE.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2224
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Windows\SchCache\explorer.exe'" /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1204
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\SchCache\explorer.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1148
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Windows\SchCache\explorer.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:332
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Links\dllhost.exe'" /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1052
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Admin\Links\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2464
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Links\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2504
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\smss.exe'" /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1264
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:368
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2192
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Windows\AppCompat\Programs\csrss.exe'" /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2148
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\AppCompat\Programs\csrss.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2128
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Windows\AppCompat\Programs\csrss.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2292
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2188
      • C:\Windows\system32\wbem\WmiApSrv.exe
        C:\Windows\system32\wbem\WmiApSrv.exe
        1⤵
          PID:3036

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Windows Media Player\de-DE\RCX4C41.tmp

          Filesize

          2.2MB

          MD5

          54b48d7611fb49892fd9f36e6c9eb58c

          SHA1

          ca6e1ff091ea3624afd344751886e9b4e655a6f3

          SHA256

          f8fd70996226e10c0e26187249fc0e156c5d5141f6db19e2cf070b75d0e800c8

          SHA512

          52312fb241f9c9a3e1978e64127e574e35130b052081ead8eeb3bc9361825738cab14d172e3651effc7b97615cfec9ca565726decb3b721c1754c4f7a84ae754

        • C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\WmiPrvSE.exe

          Filesize

          2.2MB

          MD5

          59b9f54f927431d2cf31d3aa202a0843

          SHA1

          b23d214605133dc8e930f9a9d473c7c7622b4b56

          SHA256

          007c244b9dac3fecd6d8df49314f664afaa4c1c823574108f77189c2925e9594

          SHA512

          89106822646d8d412d5c956fd01ad37e4b1f34599497f8e362262f82d2d47f4460632019d6ec09da58c45d690ebd03f2812d5809743203be081702680bfb28f8

        • C:\Users\Admin\AppData\Local\Temp\46b367d6-838c-4ed7-9d9e-59f68d75bc80.vbs

          Filesize

          812B

          MD5

          b3c3844a598999dce20a4a87c74c7160

          SHA1

          68f14fe578cba0db894aba5248ec4d870d9d91fd

          SHA256

          9f5e3128c2078dcabf7b0715a3b7e39619a70d5a8b9919b327e5a76a5ed21e79

          SHA512

          05b1c228b4f1340b66b21435ab056aa4d47f6c68814797badd70312be15b6bd302f67522466d72d675de9fc6f0a52a534c1123a07bfae38849e40deb801bc6d7

        • C:\Users\Admin\AppData\Local\Temp\ef387c1d-fda3-4e92-a915-c874e9d23067.vbs

          Filesize

          588B

          MD5

          5dc6a8693267c29ea9c7b5ca52b2cf00

          SHA1

          21910e5d6352b2aeae8a55f114b468dafd0b4e4d

          SHA256

          0acdb1ca62f76a38f20234350f920827d94ed65fb63a4e73759660524bd72d6c

          SHA512

          aa2dbca8613c6d27bbc50e99931c0328950c9f67630d4bc3da377162f0d2107ef9fc2c87d9038f385390c1da1244cd73bc8e032c766b94c4eadee03a751143b4

        • C:\Windows\AppCompat\Programs\csrss.exe

          Filesize

          2.2MB

          MD5

          5e62e6ec1d5315051abe93b9d0794463

          SHA1

          1d27b8470bc6695f1078613da7370350323ccb0f

          SHA256

          0adb18ecb63257e1fbd08a1acba09b34fbc7030d55baedc1bdfc0b09ab0d3439

          SHA512

          b4c302d43539a88f3ad00080247300ee2f7a247600edeac0055954643d93ecefebd1d684f86fb94896cdc0ef2b5d2a14ee6c8b6e301cbe67bbe75328f3e6c8c3

        • memory/2164-169-0x0000000001140000-0x000000000136E000-memory.dmp

          Filesize

          2.2MB

        • memory/2848-19-0x0000000000E10000-0x0000000000E1C000-memory.dmp

          Filesize

          48KB

        • memory/2848-24-0x0000000002580000-0x0000000002588000-memory.dmp

          Filesize

          32KB

        • memory/2848-8-0x0000000000430000-0x0000000000446000-memory.dmp

          Filesize

          88KB

        • memory/2848-9-0x0000000000450000-0x000000000045C000-memory.dmp

          Filesize

          48KB

        • memory/2848-10-0x00000000004E0000-0x00000000004E8000-memory.dmp

          Filesize

          32KB

        • memory/2848-11-0x0000000000C00000-0x0000000000C10000-memory.dmp

          Filesize

          64KB

        • memory/2848-12-0x00000000004F0000-0x00000000004FA000-memory.dmp

          Filesize

          40KB

        • memory/2848-13-0x0000000000C10000-0x0000000000C1C000-memory.dmp

          Filesize

          48KB

        • memory/2848-14-0x0000000000C20000-0x0000000000C28000-memory.dmp

          Filesize

          32KB

        • memory/2848-15-0x0000000000C30000-0x0000000000C3C000-memory.dmp

          Filesize

          48KB

        • memory/2848-16-0x0000000000C40000-0x0000000000C48000-memory.dmp

          Filesize

          32KB

        • memory/2848-18-0x0000000000C50000-0x0000000000C62000-memory.dmp

          Filesize

          72KB

        • memory/2848-0-0x000007FEF5A53000-0x000007FEF5A54000-memory.dmp

          Filesize

          4KB

        • memory/2848-20-0x0000000002550000-0x000000000255C000-memory.dmp

          Filesize

          48KB

        • memory/2848-21-0x0000000002560000-0x000000000256C000-memory.dmp

          Filesize

          48KB

        • memory/2848-22-0x00000000025A0000-0x00000000025AA000-memory.dmp

          Filesize

          40KB

        • memory/2848-23-0x0000000002570000-0x000000000257E000-memory.dmp

          Filesize

          56KB

        • memory/2848-7-0x0000000000420000-0x0000000000430000-memory.dmp

          Filesize

          64KB

        • memory/2848-25-0x0000000002590000-0x000000000259E000-memory.dmp

          Filesize

          56KB

        • memory/2848-26-0x00000000025B0000-0x00000000025BC000-memory.dmp

          Filesize

          48KB

        • memory/2848-27-0x00000000025C0000-0x00000000025C8000-memory.dmp

          Filesize

          32KB

        • memory/2848-28-0x00000000025D0000-0x00000000025DC000-memory.dmp

          Filesize

          48KB

        • memory/2848-29-0x000007FEF5A50000-0x000007FEF643C000-memory.dmp

          Filesize

          9.9MB

        • memory/2848-32-0x000007FEF5A50000-0x000007FEF643C000-memory.dmp

          Filesize

          9.9MB

        • memory/2848-6-0x0000000000390000-0x0000000000398000-memory.dmp

          Filesize

          32KB

        • memory/2848-5-0x0000000000370000-0x000000000038C000-memory.dmp

          Filesize

          112KB

        • memory/2848-121-0x000007FEF5A53000-0x000007FEF5A54000-memory.dmp

          Filesize

          4KB

        • memory/2848-160-0x000007FEF5A50000-0x000007FEF643C000-memory.dmp

          Filesize

          9.9MB

        • memory/2848-4-0x0000000000360000-0x000000000036E000-memory.dmp

          Filesize

          56KB

        • memory/2848-168-0x000007FEF5A50000-0x000007FEF643C000-memory.dmp

          Filesize

          9.9MB

        • memory/2848-3-0x0000000000350000-0x000000000035E000-memory.dmp

          Filesize

          56KB

        • memory/2848-2-0x000007FEF5A50000-0x000007FEF643C000-memory.dmp

          Filesize

          9.9MB

        • memory/2848-1-0x0000000000E20000-0x000000000104E000-memory.dmp

          Filesize

          2.2MB