Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 11:38

General

  • Target

    e4ddc55ae7aa7e087eadaa449eeed1a7de253565f7b2ef53c2e9bfec5d55dcfc.exe

  • Size

    1.4MB

  • MD5

    0745161ebca7b94e13caca7a0f89b7fb

  • SHA1

    9dfb820c738616a08042081cda0c4dcbdbb4a970

  • SHA256

    e4ddc55ae7aa7e087eadaa449eeed1a7de253565f7b2ef53c2e9bfec5d55dcfc

  • SHA512

    d7bfe29f1e5a73c1dc8e31d148dd4e62265f5d7a3897061cba9d63bfa6541cab77aabfb17f89c090092f980f132a55f7eab5e6da99a2eece21afde3db02a67be

  • SSDEEP

    24576:z2G/nvxW3WwL+zdHJ2zljtfM8zCxqY3+SiSals+S5WhqN7+4H:zbA3f+hp4Zle+SIqNqo

Malware Config

Signatures

  • DcRat 9 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 8 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4ddc55ae7aa7e087eadaa449eeed1a7de253565f7b2ef53c2e9bfec5d55dcfc.exe
    "C:\Users\Admin\AppData\Local\Temp\e4ddc55ae7aa7e087eadaa449eeed1a7de253565f7b2ef53c2e9bfec5d55dcfc.exe"
    1⤵
    • DcRat
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Reviewsessionbrokerdll\lVMLXJBAdPIapT.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Reviewsessionbrokerdll\A6Eco3zU0RirI70.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Reviewsessionbrokerdll\ReviewsessionbrokerdllBrokerhostNet.exe
          "C:\Reviewsessionbrokerdll\ReviewsessionbrokerdllBrokerhostNet.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rxRoajrxua.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2144
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:2092
              • C:\Reviewsessionbrokerdll\ReviewsessionbrokerdllBrokerhostNet.exe
                "C:\Reviewsessionbrokerdll\ReviewsessionbrokerdllBrokerhostNet.exe"
                6⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2020
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HYkHlAuNWh.bat"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1884
                  • C:\Windows\system32\w32tm.exe
                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                    8⤵
                      PID:2284
                    • C:\Windows\System32\xpsservices\taskhost.exe
                      "C:\Windows\System32\xpsservices\taskhost.exe"
                      8⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3064
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\WindowsShell\explorer.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1020
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Java\jdk1.7.0_80\Idle.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1168
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\joy\wininit.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2728
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\de-DE\services.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1628
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\xpsservices\taskhost.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1784
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\softkbd\spoolsv.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:572
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPCEXT\OSPPSVC.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2724
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\avicap32\spoolsv.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1988

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Reviewsessionbrokerdll\A6Eco3zU0RirI70.bat

        Filesize

        67B

        MD5

        88c29e093073e22265a1b092448f78ff

        SHA1

        7562a360c1ec30c93f3897fef165265e9b83c641

        SHA256

        1c948ec9ca40c8a579471b1a7353c3c06cb4c961993962304fb0f60cfaee7333

        SHA512

        51447ebfe6eaa496eb449bf8ff5184389a6d89ed36042e8916663587e1e0a2b563e8a977adab3d1e7c6c32d7d74eb0b1c7ee21d68b68202d114d877269a76f1e

      • C:\Reviewsessionbrokerdll\lVMLXJBAdPIapT.vbe

        Filesize

        214B

        MD5

        f3e2d57473806af2657d0ecc4d9776cb

        SHA1

        8d215aef321e642586cbdf25d251b60a42aa41c3

        SHA256

        e05139fb41a25ef9796b27b604fb54b27394e5f5b33874d4b15445d9de2fbcca

        SHA512

        0d7b22cc29c82c175309ea5da45ce6f159022cc45e21f950add7ce24b3cde62c74b4eb598300bab1e1244fb8a963be29388baa2f6333033fd0dce6c3fcca04db

      • C:\Users\Admin\AppData\Local\Temp\HYkHlAuNWh.bat

        Filesize

        208B

        MD5

        5aa5f3ee83646b08ec72ed1b19a25814

        SHA1

        df3fb454675aeb3420bc1cb178f68e2a498f9fb3

        SHA256

        8116ee605acc6368cac2f5db0cb741cd9d76a5e81f9e27ea6f7eae45746ff690

        SHA512

        bf707f31f468fb7bf1f2acc26df4d9347cf5f25eaa8a2ed0f6825b1f856b6a73626064f199991197a61c041863e817c13e6fcfcfa301d0824e661d8eefb1e416

      • C:\Users\Admin\AppData\Local\Temp\rxRoajrxua.bat

        Filesize

        229B

        MD5

        1af317ddfff5184b34d570dc4d6d492e

        SHA1

        94d01435c49ef296a4318c431b31eb107b93206e

        SHA256

        36caade3ec15d13010c657880ae5a59c5bbc4a6961cdce8f1f9eecdb68923841

        SHA512

        87b00be8859aab4c53cf2f38e83e604fdb2835741a911e5696e84c2e58f95b3f2608cdca7434a7a5e438b9cc462d4e4986892c920dd5afed004abfb06e9f87ac

      • \Reviewsessionbrokerdll\ReviewsessionbrokerdllBrokerhostNet.exe

        Filesize

        1.1MB

        MD5

        1612f102a43924196f6c67852264eee8

        SHA1

        49b0ca8d344345a84622d020b1b8d4057ab02868

        SHA256

        cd7d786f6ffe4622aad7f8f7bba9de05c09cf37ed9a4c21a398e92808bd13d35

        SHA512

        f32d5d110ac8c1356a70fe204c9e12663db2df4f35943532d81b277d597b28da92ec8550957479cb1a070564e8518839469a2a2dac4477b60fa1a203e5b371d4

      • memory/2020-28-0x0000000000FF0000-0x000000000110E000-memory.dmp

        Filesize

        1.1MB

      • memory/2704-13-0x0000000000D10000-0x0000000000E2E000-memory.dmp

        Filesize

        1.1MB

      • memory/3064-45-0x0000000000240000-0x0000000000248000-memory.dmp

        Filesize

        32KB

      • memory/3064-44-0x00000000003C0000-0x00000000004DE000-memory.dmp

        Filesize

        1.1MB

      • memory/3064-46-0x0000000000250000-0x000000000025A000-memory.dmp

        Filesize

        40KB

      • memory/3064-47-0x0000000000260000-0x000000000026C000-memory.dmp

        Filesize

        48KB

      • memory/3064-48-0x0000000000280000-0x000000000028E000-memory.dmp

        Filesize

        56KB

      • memory/3064-49-0x0000000000290000-0x0000000000298000-memory.dmp

        Filesize

        32KB

      • memory/3064-50-0x0000000000360000-0x0000000000368000-memory.dmp

        Filesize

        32KB

      • memory/3064-51-0x0000000000380000-0x0000000000388000-memory.dmp

        Filesize

        32KB

      • memory/3064-52-0x0000000000390000-0x0000000000398000-memory.dmp

        Filesize

        32KB

      • memory/3064-53-0x00000000003A0000-0x00000000003A8000-memory.dmp

        Filesize

        32KB