Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 00:41
Behavioral task
behavioral1
Sample
308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe
Resource
win10v2004-20241007-en
General
-
Target
308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe
-
Size
2.3MB
-
MD5
8856304a8bad8f3c4132c28042b8df80
-
SHA1
82adc02d2ccdc3485e6edb00ac36f71f2d804158
-
SHA256
308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61
-
SHA512
c5ab3dca5ad9c0577dcce69a6941259e67066141dc297e07a53b487ea0a51a68c9b79934ce443dc4a3f5e7eee65521cbc13b2f7afe7f594ee7ec5db59f484499
-
SSDEEP
49152:UbA300qL5o66QwgVAVph9QBoyycpwgPGdnDq3IEPU:UbV7oh9yycFODq3vPU
Malware Config
Signatures
-
DcRat 7 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe 4016 schtasks.exe 844 schtasks.exe 4312 schtasks.exe 4756 schtasks.exe 3944 schtasks.exe 700 schtasks.exe -
Dcrat family
-
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4016 4344 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 844 4344 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4312 4344 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4756 4344 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3944 4344 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 700 4344 schtasks.exe 89 -
resource yara_rule behavioral2/files/0x0007000000023c9d-10.dat dcrat behavioral2/memory/2308-13-0x00000000003F0000-0x0000000000602000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation brokerDhcpdriverref.exe -
Executes dropped EXE 2 IoCs
pid Process 2308 brokerDhcpdriverref.exe 4356 unsecapp.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" brokerDhcpdriverref.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\unsecapp = "\"C:\\Windows\\System32\\wbem\\netttcim_uninstall\\unsecapp.exe\"" brokerDhcpdriverref.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Documents and Settings\\lsass.exe\"" brokerDhcpdriverref.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\System32\\DeliveryOptimizationMIProvUninstall\\lsass.exe\"" brokerDhcpdriverref.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\brokerDhcpdriverref = "\"C:\\brokerDhcp\\ZZ2hXACs\\brokerDhcpdriverref.exe\"" brokerDhcpdriverref.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Recovery\\WindowsRE\\Registry.exe\"" brokerDhcpdriverref.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\System32\wbem\netttcim_uninstall\unsecapp.exe brokerDhcpdriverref.exe File created C:\Windows\System32\wbem\netttcim_uninstall\29c1c3cc0f76855c7e7456076a4ffc27e4947119 brokerDhcpdriverref.exe File created C:\Windows\System32\DeliveryOptimizationMIProvUninstall\lsass.exe brokerDhcpdriverref.exe File created C:\Windows\System32\DeliveryOptimizationMIProvUninstall\6203df4a6bafc7c328ee7f6f8ca0a8a838a8a1b9 brokerDhcpdriverref.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings brokerDhcpdriverref.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4312 schtasks.exe 4756 schtasks.exe 3944 schtasks.exe 700 schtasks.exe 4016 schtasks.exe 844 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2308 brokerDhcpdriverref.exe 2308 brokerDhcpdriverref.exe 2308 brokerDhcpdriverref.exe 2308 brokerDhcpdriverref.exe 2308 brokerDhcpdriverref.exe 2308 brokerDhcpdriverref.exe 4356 unsecapp.exe 4356 unsecapp.exe 4356 unsecapp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2308 brokerDhcpdriverref.exe Token: SeDebugPrivilege 4356 unsecapp.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 660 wrote to memory of 3504 660 308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe 83 PID 660 wrote to memory of 3504 660 308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe 83 PID 660 wrote to memory of 3504 660 308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe 83 PID 3504 wrote to memory of 4496 3504 WScript.exe 93 PID 3504 wrote to memory of 4496 3504 WScript.exe 93 PID 3504 wrote to memory of 4496 3504 WScript.exe 93 PID 4496 wrote to memory of 2308 4496 cmd.exe 95 PID 4496 wrote to memory of 2308 4496 cmd.exe 95 PID 2308 wrote to memory of 4824 2308 brokerDhcpdriverref.exe 102 PID 2308 wrote to memory of 4824 2308 brokerDhcpdriverref.exe 102 PID 4824 wrote to memory of 4764 4824 cmd.exe 104 PID 4824 wrote to memory of 4764 4824 cmd.exe 104 PID 4824 wrote to memory of 4356 4824 cmd.exe 110 PID 4824 wrote to memory of 4356 4824 cmd.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe"C:\Users\Admin\AppData\Local\Temp\308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe"1⤵
- DcRat
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\brokerDhcp\S0tGSQFMCx6Y.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\brokerDhcp\ZZ2hXACs.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\brokerDhcp\brokerDhcpdriverref.exe"C:\brokerDhcp\brokerDhcpdriverref.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qISrJGotlN.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:4764
-
-
C:\Windows\System32\wbem\netttcim_uninstall\unsecapp.exe"C:\Windows\System32\wbem\netttcim_uninstall\unsecapp.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Windows\System32\wbem\netttcim_uninstall\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Documents and Settings\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\DeliveryOptimizationMIProvUninstall\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "brokerDhcpdriverref" /sc ONLOGON /tr "'C:\brokerDhcp\ZZ2hXACs\brokerDhcpdriverref.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:700
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220B
MD5ad2262eb9b9089f53cc190dc6e40a345
SHA1fb38782bbbd70f42031875a1e31d63bc72eb2df3
SHA2562365134525eeeca67f43494363df50e496c08dec653701680de1360d0b79cf72
SHA512f2bb83328b0923ad1c2437c1bcb576cd734181b35a8f3836f5a9b4bb94980db2757a9ae911dc77107e25ff40d748d204482a2c5426c737470e2a300f2c557f0b
-
Filesize
195B
MD50272bf47a2ead1950910e1629e35e5b5
SHA174b43b7ce5697d8bfddd3ed416b03ba61b81fbac
SHA25645547e2ed9186e7405f394fe1e3b58d61106b205d78c3dcbe8f80dd0c8e13fdd
SHA5129a02cb88ef7e8d1ee80e4c5cb6612d933b11ce8f63c6518ebe8a58bfdbd08046666a1ebedd509ad0a1b7652d361fbb610008835a823737cb7421d81e19104465
-
Filesize
39B
MD57336dff7322860e242cf39fd2067a903
SHA1b97bdf53351221778777388168217a736b9670bc
SHA256f875da2b44bb1c16ae7ad33e3ac89f235bd1c85445672e8ee092f1a540fd4cea
SHA512fb5e86ca89e961c5df3d6a0e4e6d30b8ab7f5d4445efa71e7706ce86f3201267a3bd8b45af80d8f5a694e451cd0f0d51a70954e0a5f8d6aec0ee5bc31139a687
-
Filesize
2.0MB
MD5c07cdd8d27b5b968b06166ceddcfd35a
SHA1419905135ad7276f36edd5654ff50643875d52b3
SHA2566b350fefc7d6ca79ca3e4cef39b4e71e7459d98ef213693ae3cec2c1b1d03863
SHA51201ddba53ed10452aeefde7aa2bcb289d75d5ce90fe0771183d5abc5f3a178d20b5495381084e75e858130bf31dbdd33edf82d51c96d1e4a99ee4c21bf97327ed