Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 18:44
Behavioral task
behavioral1
Sample
295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe
Resource
win10v2004-20241007-en
General
-
Target
295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe
-
Size
2.4MB
-
MD5
b3678e32183a7aeb4c8bce890f9898de
-
SHA1
922e6553a8ed9b7e11206c73a2db30f98db91077
-
SHA256
295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205
-
SHA512
1ec5f3709d6b3bc5d64416e939eaa1adeb840025706d68fa8c812fe3469b3f8177bdb508524d097c9d8518cee229e0c73e502b6e87c3235a053b3e33594b118a
-
SSDEEP
49152:PbA3uqwj3o71JZAB3jBn8cjcdPH/+yDMu3JgHzCueUTG4:PbMBLZABTF8Ic94u3YveX4
Malware Config
Signatures
-
DcRat 7 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe 2924 schtasks.exe 3020 schtasks.exe 2968 schtasks.exe 2712 schtasks.exe 2860 schtasks.exe 2500 schtasks.exe -
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\SysWOW64\\msports\\cmd.exe\", \"C:\\Windows\\System32\\vpnike\\dllhost.exe\", \"C:\\Windows\\System32\\raschap\\csrss.exe\", \"C:\\Windows\\System32\\ucrtbase\\wininit.exe\", \"C:\\Documents and Settings\\conhost.exe\", \"C:\\Windows\\System32\\DeviceProperties\\dwm.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\SysWOW64\\msports\\cmd.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\SysWOW64\\msports\\cmd.exe\", \"C:\\Windows\\System32\\vpnike\\dllhost.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\SysWOW64\\msports\\cmd.exe\", \"C:\\Windows\\System32\\vpnike\\dllhost.exe\", \"C:\\Windows\\System32\\raschap\\csrss.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\SysWOW64\\msports\\cmd.exe\", \"C:\\Windows\\System32\\vpnike\\dllhost.exe\", \"C:\\Windows\\System32\\raschap\\csrss.exe\", \"C:\\Windows\\System32\\ucrtbase\\wininit.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\SysWOW64\\msports\\cmd.exe\", \"C:\\Windows\\System32\\vpnike\\dllhost.exe\", \"C:\\Windows\\System32\\raschap\\csrss.exe\", \"C:\\Windows\\System32\\ucrtbase\\wininit.exe\", \"C:\\Documents and Settings\\conhost.exe\"" Perfmonitorfontinto.exe -
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2924 2268 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 2268 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2968 2268 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2712 2268 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 2268 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2500 2268 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x0008000000016c66-9.dat dcrat behavioral1/memory/2296-13-0x0000000000BF0000-0x0000000000DFE000-memory.dmp dcrat behavioral1/memory/2760-33-0x0000000000E20000-0x000000000102E000-memory.dmp dcrat -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 2296 Perfmonitorfontinto.exe 2760 conhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2496 cmd.exe 2496 cmd.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Documents and Settings\\conhost.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Windows\\SysWOW64\\msports\\cmd.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\vpnike\\dllhost.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\vpnike\\dllhost.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\raschap\\csrss.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\raschap\\csrss.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\System32\\ucrtbase\\wininit.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Documents and Settings\\conhost.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Windows\\SysWOW64\\msports\\cmd.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\System32\\ucrtbase\\wininit.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\DeviceProperties\\dwm.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\DeviceProperties\\dwm.exe\"" Perfmonitorfontinto.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\System32\vpnike\dllhost.exe Perfmonitorfontinto.exe File created C:\Windows\System32\raschap\886983d96e3d3e31032c679b2d4ea91b6c05afef Perfmonitorfontinto.exe File created C:\Windows\System32\ucrtbase\wininit.exe Perfmonitorfontinto.exe File created C:\Windows\System32\ucrtbase\560854153607923c4c5f107085a7db67be01f252 Perfmonitorfontinto.exe File created C:\Windows\System32\DeviceProperties\dwm.exe Perfmonitorfontinto.exe File created C:\Windows\System32\DeviceProperties\6cb0b6c459d5d3455a3da700e713f2e2529862ff Perfmonitorfontinto.exe File created C:\Windows\SysWOW64\msports\cmd.exe Perfmonitorfontinto.exe File opened for modification C:\Windows\SysWOW64\msports\cmd.exe Perfmonitorfontinto.exe File created C:\Windows\SysWOW64\msports\ebf1f9fa8afd6d1932bd65bc4cc3af89a4c8e228 Perfmonitorfontinto.exe File created C:\Windows\System32\vpnike\5940a34987c99120d96dace90a3f93f329dcad63 Perfmonitorfontinto.exe File created C:\Windows\System32\raschap\csrss.exe Perfmonitorfontinto.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3048 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2860 schtasks.exe 2500 schtasks.exe 2924 schtasks.exe 3020 schtasks.exe 2968 schtasks.exe 2712 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2296 Perfmonitorfontinto.exe 2760 conhost.exe 2760 conhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2296 Perfmonitorfontinto.exe Token: SeDebugPrivilege 2760 conhost.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1736 2408 295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe 30 PID 2408 wrote to memory of 1736 2408 295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe 30 PID 2408 wrote to memory of 1736 2408 295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe 30 PID 2408 wrote to memory of 1736 2408 295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe 30 PID 1736 wrote to memory of 2496 1736 WScript.exe 32 PID 1736 wrote to memory of 2496 1736 WScript.exe 32 PID 1736 wrote to memory of 2496 1736 WScript.exe 32 PID 1736 wrote to memory of 2496 1736 WScript.exe 32 PID 2496 wrote to memory of 2296 2496 cmd.exe 34 PID 2496 wrote to memory of 2296 2496 cmd.exe 34 PID 2496 wrote to memory of 2296 2496 cmd.exe 34 PID 2496 wrote to memory of 2296 2496 cmd.exe 34 PID 2296 wrote to memory of 844 2296 Perfmonitorfontinto.exe 42 PID 2296 wrote to memory of 844 2296 Perfmonitorfontinto.exe 42 PID 2296 wrote to memory of 844 2296 Perfmonitorfontinto.exe 42 PID 2496 wrote to memory of 3048 2496 cmd.exe 44 PID 2496 wrote to memory of 3048 2496 cmd.exe 44 PID 2496 wrote to memory of 3048 2496 cmd.exe 44 PID 2496 wrote to memory of 3048 2496 cmd.exe 44 PID 844 wrote to memory of 1384 844 cmd.exe 45 PID 844 wrote to memory of 1384 844 cmd.exe 45 PID 844 wrote to memory of 1384 844 cmd.exe 45 PID 844 wrote to memory of 2760 844 cmd.exe 46 PID 844 wrote to memory of 2760 844 cmd.exe 46 PID 844 wrote to memory of 2760 844 cmd.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe"C:\Users\Admin\AppData\Local\Temp\295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe"1⤵
- DcRat
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Perfmonitor\lNQQOstPqxiFMmsYvmB.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Perfmonitor\O0mpFdbBjdm7srZfGtzhIPYG.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Perfmonitor\Perfmonitorfontinto.exe"C:\Perfmonitor\Perfmonitorfontinto.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2xDdx8lwTl.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1384
-
-
C:\Documents and Settings\conhost.exe"C:\Documents and Settings\conhost.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3048
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Windows\SysWOW64\msports\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\vpnike\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\raschap\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\ucrtbase\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Documents and Settings\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\DeviceProperties\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2500
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50766bee941f5489c2a24060aa12da278
SHA1cc8dd7a812c5089f9ee259e0b877e33e2246203a
SHA25602b87d654cc308a9628dbce66d9a5c2585eeaf85dbecadd02bea72116f2c4967
SHA512c77bf28da7ea054152974b281de47d7d64e73eb66af96613fffbbaeffbb65a266ee7e5cfc0460cdc1ff220e7d7397241c3d3293d5d64784ed73181b17d41799e
-
Filesize
212B
MD5c8e9ef06df615850dd97024f6b0afd27
SHA14b52ceec0e0daa0569cf8d4538cfd1ffa6cd6151
SHA2561b2e5af3efd2f7d71c218fb9843ddc8ceae4af239559f928f4841d90a2e14ad1
SHA512351901ded3974d2b25b832d3880a174ba9d4ff7f1c7b1f0246545007d67bc180b9a255106446a7a8e404fd1eac8a833c62b2a2581d312d6e80fbc7a6cd24ed32
-
Filesize
201B
MD5672eb2f930a19121cb3f2e814609e00d
SHA1d3cc7a1e919db01fdbc55436739384392c8569e8
SHA256c26f3edec19311292ade912bc297cd0e8ff49f9f6e7989c302a263ed498d58f7
SHA512dd2cae54f08b5d43491d3d8c6f8f80114c17c8b523754dbae393b5fbbc7f0cbae7b053dfe6cc56cfb7e25c455aaa94fcca30395a63886eae0ffe8575470fa46b
-
Filesize
2.0MB
MD5de80b75daf9e3549c0d61166fbe0f147
SHA1445c7a4e543c319dff09d12b77b9aa33bfccc5ff
SHA2567a89d7167264d77656b8cac1cef82a3e16f3dd51d679b178833a953a5cb11235
SHA51283f8b92ef215e0398ee38963bcedce1590384b0f1a8f17cb09749c887c78ede374890965a01cb475ac0794a4eafb5ac7c0b48e347a6df7eda58b2fe1cbe657d1