Analysis

  • max time kernel
    18s
  • max time network
    23s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 13:57

General

  • Target

    a9c9416b056e0834e13cc89adf3f8960fac7d0314a7474368df1a56a3404e8ae.exe

  • Size

    10.1MB

  • MD5

    2ee8eb2b3997b0cce6cc7c562a785719

  • SHA1

    b2d31d2a30815fa0c6dd1e637d7276bfb0547411

  • SHA256

    a9c9416b056e0834e13cc89adf3f8960fac7d0314a7474368df1a56a3404e8ae

  • SHA512

    34ee0171c041205b4b6bb631e0b72fb2f4d3056892281839f0b2e63b9f1997e037755cedd0d56dd64d96ddc878874148611f6eb4ee83238dd560ed59848e8059

  • SSDEEP

    24576:W+O4GptFtiU9SsYm1oO9teGnlcZ/uIO0EdZX0usIW6fgtixy4s+8BIbT19h8OCht:x5o9Y+Iu0u+YoAgO9kK4XyWDAyH6eB

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9c9416b056e0834e13cc89adf3f8960fac7d0314a7474368df1a56a3404e8ae.exe
    "C:\Users\Admin\AppData\Local\Temp\a9c9416b056e0834e13cc89adf3f8960fac7d0314a7474368df1a56a3404e8ae.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RKRAazGsEW.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2184
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2464
        • C:\Users\Admin\Desktop\services.exe
          "C:\Users\Admin\Desktop\services.exe"
          3⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:796
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Admin\Desktop\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3056
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\System32\wshom\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2564
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\NlsData0010\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3032
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2896
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\usercpl\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2776
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\debug\WIA\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1016

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RKRAazGsEW.bat

      Filesize

      199B

      MD5

      1b47697b6696f68ddf80056bd6c96bab

      SHA1

      396267ef633fda1bdb62f26f4dcafbbb4a1dbc02

      SHA256

      6e5627a0ff056ccf47d66240bcf5a878e7612b9733a58d5c2b2d2bfde9fae542

      SHA512

      36758ea52084f91fad5c5a59fe1f4092295f7576301fb0d2dd855c73edd54740955b7d211606ad43d1f01b39d4e5649742e074c8266d9e66b0975d368a9522d9

    • C:\Windows\System32\usercpl\dllhost.exe

      Filesize

      10.1MB

      MD5

      2ee8eb2b3997b0cce6cc7c562a785719

      SHA1

      b2d31d2a30815fa0c6dd1e637d7276bfb0547411

      SHA256

      a9c9416b056e0834e13cc89adf3f8960fac7d0314a7474368df1a56a3404e8ae

      SHA512

      34ee0171c041205b4b6bb631e0b72fb2f4d3056892281839f0b2e63b9f1997e037755cedd0d56dd64d96ddc878874148611f6eb4ee83238dd560ed59848e8059

    • memory/796-23-0x0000000001240000-0x0000000001C6A000-memory.dmp

      Filesize

      10.2MB

    • memory/796-24-0x0000000000140000-0x000000000014C000-memory.dmp

      Filesize

      48KB

    • memory/796-25-0x0000000000150000-0x000000000015C000-memory.dmp

      Filesize

      48KB

    • memory/796-26-0x00000000001B0000-0x00000000001BC000-memory.dmp

      Filesize

      48KB

    • memory/796-28-0x0000000000180000-0x000000000018A000-memory.dmp

      Filesize

      40KB

    • memory/796-27-0x00000000003D0000-0x00000000003D8000-memory.dmp

      Filesize

      32KB

    • memory/2164-0-0x000007FEF5A73000-0x000007FEF5A74000-memory.dmp

      Filesize

      4KB

    • memory/2164-1-0x0000000001300000-0x0000000001D2A000-memory.dmp

      Filesize

      10.2MB

    • memory/2164-2-0x000007FEF5A70000-0x000007FEF645C000-memory.dmp

      Filesize

      9.9MB

    • memory/2164-20-0x000007FEF5A70000-0x000007FEF645C000-memory.dmp

      Filesize

      9.9MB