Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 18:44
Behavioral task
behavioral1
Sample
295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe
Resource
win10v2004-20241007-en
General
-
Target
295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe
-
Size
2.4MB
-
MD5
b3678e32183a7aeb4c8bce890f9898de
-
SHA1
922e6553a8ed9b7e11206c73a2db30f98db91077
-
SHA256
295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205
-
SHA512
1ec5f3709d6b3bc5d64416e939eaa1adeb840025706d68fa8c812fe3469b3f8177bdb508524d097c9d8518cee229e0c73e502b6e87c3235a053b3e33594b118a
-
SSDEEP
49152:PbA3uqwj3o71JZAB3jBn8cjcdPH/+yDMu3JgHzCueUTG4:PbMBLZABTF8Ic94u3YveX4
Malware Config
Signatures
-
DcRat 5 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 4568 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe 2120 schtasks.exe 2856 schtasks.exe 3968 schtasks.exe -
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\SettingsHandlers_UserAccount\\RuntimeBroker.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\SettingsHandlers_UserAccount\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\Nlsdl\\RuntimeBroker.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\SettingsHandlers_UserAccount\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\Nlsdl\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\VoiceActivationManager\\conhost.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\SettingsHandlers_UserAccount\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\Nlsdl\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\VoiceActivationManager\\conhost.exe\", \"C:\\Documents and Settings\\Perfmonitorfontinto.exe\"" Perfmonitorfontinto.exe -
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2120 768 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2856 768 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3968 768 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4568 768 schtasks.exe 86 -
resource yara_rule behavioral2/files/0x000a000000023b98-10.dat dcrat behavioral2/memory/3332-13-0x00000000002B0000-0x00000000004BE000-memory.dmp dcrat -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Perfmonitorfontinto.exe -
Executes dropped EXE 2 IoCs
pid Process 3332 Perfmonitorfontinto.exe 4904 RuntimeBroker.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Windows\\System32\\VoiceActivationManager\\conhost.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Perfmonitorfontinto = "\"C:\\Documents and Settings\\Perfmonitorfontinto.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Perfmonitorfontinto = "\"C:\\Documents and Settings\\Perfmonitorfontinto.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\SettingsHandlers_UserAccount\\RuntimeBroker.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\SettingsHandlers_UserAccount\\RuntimeBroker.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\Nlsdl\\RuntimeBroker.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\Nlsdl\\RuntimeBroker.exe\"" Perfmonitorfontinto.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Windows\\System32\\VoiceActivationManager\\conhost.exe\"" Perfmonitorfontinto.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\System32\SettingsHandlers_UserAccount\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d Perfmonitorfontinto.exe File created C:\Windows\System32\Nlsdl\RuntimeBroker.exe Perfmonitorfontinto.exe File created C:\Windows\System32\Nlsdl\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d Perfmonitorfontinto.exe File created C:\Windows\System32\VoiceActivationManager\conhost.exe Perfmonitorfontinto.exe File created C:\Windows\System32\VoiceActivationManager\088424020bedd6b28ac7fd22ee35dcd7322895ce Perfmonitorfontinto.exe File created C:\Windows\System32\SettingsHandlers_UserAccount\RuntimeBroker.exe Perfmonitorfontinto.exe File opened for modification C:\Windows\System32\SettingsHandlers_UserAccount\RuntimeBroker.exe Perfmonitorfontinto.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings Perfmonitorfontinto.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3256 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4568 schtasks.exe 2120 schtasks.exe 2856 schtasks.exe 3968 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3332 Perfmonitorfontinto.exe 3332 Perfmonitorfontinto.exe 3332 Perfmonitorfontinto.exe 4904 RuntimeBroker.exe 4904 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3332 Perfmonitorfontinto.exe Token: SeDebugPrivilege 4904 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1396 wrote to memory of 3580 1396 295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe 82 PID 1396 wrote to memory of 3580 1396 295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe 82 PID 1396 wrote to memory of 3580 1396 295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe 82 PID 3580 wrote to memory of 2956 3580 WScript.exe 88 PID 3580 wrote to memory of 2956 3580 WScript.exe 88 PID 3580 wrote to memory of 2956 3580 WScript.exe 88 PID 2956 wrote to memory of 3332 2956 cmd.exe 90 PID 2956 wrote to memory of 3332 2956 cmd.exe 90 PID 3332 wrote to memory of 4432 3332 Perfmonitorfontinto.exe 95 PID 3332 wrote to memory of 4432 3332 Perfmonitorfontinto.exe 95 PID 2956 wrote to memory of 3256 2956 cmd.exe 97 PID 2956 wrote to memory of 3256 2956 cmd.exe 97 PID 2956 wrote to memory of 3256 2956 cmd.exe 97 PID 4432 wrote to memory of 4360 4432 cmd.exe 98 PID 4432 wrote to memory of 4360 4432 cmd.exe 98 PID 4432 wrote to memory of 4904 4432 cmd.exe 101 PID 4432 wrote to memory of 4904 4432 cmd.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe"C:\Users\Admin\AppData\Local\Temp\295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe"1⤵
- DcRat
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Perfmonitor\lNQQOstPqxiFMmsYvmB.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Perfmonitor\O0mpFdbBjdm7srZfGtzhIPYG.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Perfmonitor\Perfmonitorfontinto.exe"C:\Perfmonitor\Perfmonitorfontinto.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CKITq2l3U5.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:4360
-
-
C:\Windows\System32\Nlsdl\RuntimeBroker.exe"C:\Windows\System32\Nlsdl\RuntimeBroker.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3256
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\SettingsHandlers_UserAccount\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\Nlsdl\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\System32\VoiceActivationManager\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Perfmonitorfontinto" /sc ONLOGON /tr "'C:\Documents and Settings\Perfmonitorfontinto.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4568
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50766bee941f5489c2a24060aa12da278
SHA1cc8dd7a812c5089f9ee259e0b877e33e2246203a
SHA25602b87d654cc308a9628dbce66d9a5c2585eeaf85dbecadd02bea72116f2c4967
SHA512c77bf28da7ea054152974b281de47d7d64e73eb66af96613fffbbaeffbb65a266ee7e5cfc0460cdc1ff220e7d7397241c3d3293d5d64784ed73181b17d41799e
-
Filesize
2.0MB
MD5de80b75daf9e3549c0d61166fbe0f147
SHA1445c7a4e543c319dff09d12b77b9aa33bfccc5ff
SHA2567a89d7167264d77656b8cac1cef82a3e16f3dd51d679b178833a953a5cb11235
SHA51283f8b92ef215e0398ee38963bcedce1590384b0f1a8f17cb09749c887c78ede374890965a01cb475ac0794a4eafb5ac7c0b48e347a6df7eda58b2fe1cbe657d1
-
Filesize
212B
MD5c8e9ef06df615850dd97024f6b0afd27
SHA14b52ceec0e0daa0569cf8d4538cfd1ffa6cd6151
SHA2561b2e5af3efd2f7d71c218fb9843ddc8ceae4af239559f928f4841d90a2e14ad1
SHA512351901ded3974d2b25b832d3880a174ba9d4ff7f1c7b1f0246545007d67bc180b9a255106446a7a8e404fd1eac8a833c62b2a2581d312d6e80fbc7a6cd24ed32
-
Filesize
207B
MD5b7f8a62204cceda00c43eb917c447292
SHA10adbc49de02094c001e1097ec684d5ffb63ddc7d
SHA2560af84b6f14b194f74cd0f81c5a81e158a38bcc372e6ffce9b6774b0ae2423dee
SHA51283fd7beb6b64cdca695a751e3a50268261d099e5afd381dd7a0d63c972fe374bc1e9439f6cd857a84affad423c750bbf53cd2999f1b339482607f75f1073e595