Analysis
-
max time kernel
90s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 00:37
Behavioral task
behavioral1
Sample
308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe
Resource
win10v2004-20241007-en
General
-
Target
308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe
-
Size
2.3MB
-
MD5
8856304a8bad8f3c4132c28042b8df80
-
SHA1
82adc02d2ccdc3485e6edb00ac36f71f2d804158
-
SHA256
308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61
-
SHA512
c5ab3dca5ad9c0577dcce69a6941259e67066141dc297e07a53b487ea0a51a68c9b79934ce443dc4a3f5e7eee65521cbc13b2f7afe7f594ee7ec5db59f484499
-
SSDEEP
49152:UbA300qL5o66QwgVAVph9QBoyycpwgPGdnDq3IEPU:UbV7oh9yycFODq3vPU
Malware Config
Signatures
-
DcRat 10 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe 1384 schtasks.exe 596 schtasks.exe 1088 schtasks.exe 2648 schtasks.exe 2916 schtasks.exe 2844 schtasks.exe 2596 schtasks.exe 2848 schtasks.exe 1104 schtasks.exe -
Dcrat family
-
Process spawned unexpected child process 9 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2648 2804 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2916 2804 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2844 2804 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2596 2804 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2848 2804 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1384 2804 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1104 2804 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1088 2804 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 596 2804 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x0008000000016d3a-9.dat dcrat behavioral1/memory/2672-13-0x00000000012D0000-0x00000000014E2000-memory.dmp dcrat behavioral1/memory/2292-38-0x0000000001150000-0x0000000001362000-memory.dmp dcrat -
Executes dropped EXE 2 IoCs
pid Process 2672 brokerDhcpdriverref.exe 2292 csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 2624 cmd.exe 2624 cmd.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Windows\\System32\\NOISE\\taskhost.exe\"" brokerDhcpdriverref.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\System32\\NlsData002a\\winlogon.exe\"" brokerDhcpdriverref.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Windows\\System32\\PresentationNative_v0300\\services.exe\"" brokerDhcpdriverref.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Windows\\System32\\mfc140jpn\\services.exe\"" brokerDhcpdriverref.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\brokerDhcp\\smss.exe\"" brokerDhcpdriverref.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\Storprop\\csrss.exe\"" brokerDhcpdriverref.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\System32\\RMActivate_ssp_isv\\lsm.exe\"" brokerDhcpdriverref.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Windows\\SysWOW64\\softpub\\cmd.exe\"" brokerDhcpdriverref.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\dmvscres\\dwm.exe\"" brokerDhcpdriverref.exe -
Drops file in System32 directory 17 IoCs
description ioc Process File created C:\Windows\System32\dmvscres\dwm.exe brokerDhcpdriverref.exe File opened for modification C:\Windows\System32\dmvscres\dwm.exe brokerDhcpdriverref.exe File created C:\Windows\System32\dmvscres\6cb0b6c459d5d3455a3da700e713f2e2529862ff brokerDhcpdriverref.exe File created C:\Windows\SysWOW64\softpub\cmd.exe brokerDhcpdriverref.exe File created C:\Windows\System32\PresentationNative_v0300\services.exe brokerDhcpdriverref.exe File created C:\Windows\System32\Storprop\886983d96e3d3e31032c679b2d4ea91b6c05afef brokerDhcpdriverref.exe File created C:\Windows\System32\NOISE\taskhost.exe brokerDhcpdriverref.exe File created C:\Windows\System32\NOISE\b75386f1303e64d8139363b71e44ac16341adf4e brokerDhcpdriverref.exe File created C:\Windows\System32\RMActivate_ssp_isv\101b941d020240259ca4912829b53995ad543df6 brokerDhcpdriverref.exe File created C:\Windows\System32\PresentationNative_v0300\c5b4cb5e9653cce737f29f72ba880dd4c4bab27d brokerDhcpdriverref.exe File created C:\Windows\System32\mfc140jpn\c5b4cb5e9653cce737f29f72ba880dd4c4bab27d brokerDhcpdriverref.exe File created C:\Windows\System32\mfc140jpn\services.exe brokerDhcpdriverref.exe File created C:\Windows\System32\Storprop\csrss.exe brokerDhcpdriverref.exe File created C:\Windows\System32\RMActivate_ssp_isv\lsm.exe brokerDhcpdriverref.exe File created C:\Windows\SysWOW64\softpub\ebf1f9fa8afd6d1932bd65bc4cc3af89a4c8e228 brokerDhcpdriverref.exe File created C:\Windows\System32\NlsData002a\winlogon.exe brokerDhcpdriverref.exe File created C:\Windows\System32\NlsData002a\cc11b995f2a76da408ea6a601e682e64743153ad brokerDhcpdriverref.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2648 schtasks.exe 2916 schtasks.exe 1384 schtasks.exe 1104 schtasks.exe 1088 schtasks.exe 596 schtasks.exe 2844 schtasks.exe 2596 schtasks.exe 2848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2672 brokerDhcpdriverref.exe 2672 brokerDhcpdriverref.exe 2672 brokerDhcpdriverref.exe 2292 csrss.exe 2292 csrss.exe 2292 csrss.exe 2292 csrss.exe 2292 csrss.exe 2292 csrss.exe 2292 csrss.exe 2292 csrss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2672 brokerDhcpdriverref.exe Token: SeDebugPrivilege 2292 csrss.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2472 2100 308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe 31 PID 2100 wrote to memory of 2472 2100 308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe 31 PID 2100 wrote to memory of 2472 2100 308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe 31 PID 2100 wrote to memory of 2472 2100 308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe 31 PID 2472 wrote to memory of 2624 2472 WScript.exe 32 PID 2472 wrote to memory of 2624 2472 WScript.exe 32 PID 2472 wrote to memory of 2624 2472 WScript.exe 32 PID 2472 wrote to memory of 2624 2472 WScript.exe 32 PID 2624 wrote to memory of 2672 2624 cmd.exe 34 PID 2624 wrote to memory of 2672 2624 cmd.exe 34 PID 2624 wrote to memory of 2672 2624 cmd.exe 34 PID 2624 wrote to memory of 2672 2624 cmd.exe 34 PID 2672 wrote to memory of 2292 2672 brokerDhcpdriverref.exe 45 PID 2672 wrote to memory of 2292 2672 brokerDhcpdriverref.exe 45 PID 2672 wrote to memory of 2292 2672 brokerDhcpdriverref.exe 45 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe"C:\Users\Admin\AppData\Local\Temp\308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe"1⤵
- DcRat
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\brokerDhcp\S0tGSQFMCx6Y.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\brokerDhcp\ZZ2hXACs.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\brokerDhcp\brokerDhcpdriverref.exe"C:\brokerDhcp\brokerDhcpdriverref.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\System32\Storprop\csrss.exe"C:\Windows\System32\Storprop\csrss.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\dmvscres\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\System32\PresentationNative_v0300\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\System32\mfc140jpn\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\brokerDhcp\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\Storprop\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\NOISE\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\RMActivate_ssp_isv\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Windows\SysWOW64\softpub\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\NlsData002a\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:596
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195B
MD50272bf47a2ead1950910e1629e35e5b5
SHA174b43b7ce5697d8bfddd3ed416b03ba61b81fbac
SHA25645547e2ed9186e7405f394fe1e3b58d61106b205d78c3dcbe8f80dd0c8e13fdd
SHA5129a02cb88ef7e8d1ee80e4c5cb6612d933b11ce8f63c6518ebe8a58bfdbd08046666a1ebedd509ad0a1b7652d361fbb610008835a823737cb7421d81e19104465
-
Filesize
39B
MD57336dff7322860e242cf39fd2067a903
SHA1b97bdf53351221778777388168217a736b9670bc
SHA256f875da2b44bb1c16ae7ad33e3ac89f235bd1c85445672e8ee092f1a540fd4cea
SHA512fb5e86ca89e961c5df3d6a0e4e6d30b8ab7f5d4445efa71e7706ce86f3201267a3bd8b45af80d8f5a694e451cd0f0d51a70954e0a5f8d6aec0ee5bc31139a687
-
Filesize
2.0MB
MD5c07cdd8d27b5b968b06166ceddcfd35a
SHA1419905135ad7276f36edd5654ff50643875d52b3
SHA2566b350fefc7d6ca79ca3e4cef39b4e71e7459d98ef213693ae3cec2c1b1d03863
SHA51201ddba53ed10452aeefde7aa2bcb289d75d5ce90fe0771183d5abc5f3a178d20b5495381084e75e858130bf31dbdd33edf82d51c96d1e4a99ee4c21bf97327ed