Analysis

  • max time kernel
    95s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 03:55

General

  • Target

    26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe

  • Size

    2.9MB

  • MD5

    19aefa5703872789a85c9c8e7c123aca

  • SHA1

    5207463f1ec2987e68c97399571c4ef52763bacc

  • SHA256

    26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e

  • SHA512

    5117be7adb0b42505ce453a3f6e3cb73ed5b71c186ff660d7cceb92b11ab89bbf897f48a3a05d19e63fe69361bc58276c99b1d93eb3173c01f379a11b0850c70

  • SSDEEP

    49152:7wefjxPCEjdphA8ZLUj+khAHYevjm7rDeqYQjmCYi78jFg:7zqCA85UuHYeLu0PCYi78a

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 13 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 9 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 13 IoCs
  • Drops file in System32 directory 16 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 13 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe
    "C:\Users\Admin\AppData\Local\Temp\26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Users\Admin\AppData\Local\Temp\26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe
      "C:\Users\Admin\AppData\Local\Temp\26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1524
      • C:\ProgramData\Templates\WmiPrvSE.exe
        "C:\ProgramData\Templates\WmiPrvSE.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2896
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\mciwave\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4020
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\System32\wmdmps\conhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4764
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\appcompat\taskhostw.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1980
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\OfficeClickToRun.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:5084
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\KBDCZ2\spoolsv.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:5076
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System32\KBDBE\fontdrvhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4696
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\mfc100chs\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2148
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20241007091301_001_dotnet_hostfxr_7.0.16_win_x64.msi\26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3728
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System32\RegCtrl\fontdrvhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3196
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.de-de\OfficeClickToRun.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2328
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\ProgramData\Templates\WmiPrvSE.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1972
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\System32\mssph\taskhostw.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1124
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\RemotePackages\RemoteDesktops\services.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe.log

    Filesize

    1KB

    MD5

    f5e93a467b0f78f860ff2ba798c5fd2c

    SHA1

    462b6677af76647b0c08fe91d019cb29d364f616

    SHA256

    fa2d2b185ce7cfa214b0c9a8b26c9d30ac325c924434f957c2f3e0bb74a749cf

    SHA512

    b50b1a0aeff65a77574897654ace4a3b518e5f9192c74e516c84ff6796e52ad811c23caa1ac7d52449601a1004c9cc3a734c3a10a94d67750eb771ca0a7f2e25

  • C:\Windows\SysWOW64\KBDCZ2\spoolsv.exe

    Filesize

    2.9MB

    MD5

    19aefa5703872789a85c9c8e7c123aca

    SHA1

    5207463f1ec2987e68c97399571c4ef52763bacc

    SHA256

    26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e

    SHA512

    5117be7adb0b42505ce453a3f6e3cb73ed5b71c186ff660d7cceb92b11ab89bbf897f48a3a05d19e63fe69361bc58276c99b1d93eb3173c01f379a11b0850c70

  • memory/1524-52-0x0000000000500000-0x0000000000B48000-memory.dmp

    Filesize

    6.3MB

  • memory/1524-28-0x0000000000500000-0x0000000000B48000-memory.dmp

    Filesize

    6.3MB

  • memory/1524-27-0x0000000000500000-0x0000000000B48000-memory.dmp

    Filesize

    6.3MB

  • memory/1524-23-0x0000000000500000-0x0000000000B48000-memory.dmp

    Filesize

    6.3MB

  • memory/2752-25-0x0000000000500000-0x0000000000B48000-memory.dmp

    Filesize

    6.3MB

  • memory/2752-7-0x0000000007620000-0x0000000007686000-memory.dmp

    Filesize

    408KB

  • memory/2752-0-0x0000000000500000-0x0000000000B48000-memory.dmp

    Filesize

    6.3MB

  • memory/2752-4-0x0000000007580000-0x000000000761C000-memory.dmp

    Filesize

    624KB

  • memory/2752-3-0x0000000007A90000-0x0000000008034000-memory.dmp

    Filesize

    5.6MB

  • memory/2752-2-0x0000000000500000-0x0000000000B48000-memory.dmp

    Filesize

    6.3MB

  • memory/2752-1-0x0000000000500000-0x0000000000B48000-memory.dmp

    Filesize

    6.3MB

  • memory/2896-49-0x0000000000E30000-0x0000000001478000-memory.dmp

    Filesize

    6.3MB

  • memory/2896-53-0x0000000000E30000-0x0000000001478000-memory.dmp

    Filesize

    6.3MB

  • memory/2896-54-0x0000000000E30000-0x0000000001478000-memory.dmp

    Filesize

    6.3MB

  • memory/2896-55-0x0000000007580000-0x000000000758E000-memory.dmp

    Filesize

    56KB

  • memory/2896-58-0x0000000000E30000-0x0000000001478000-memory.dmp

    Filesize

    6.3MB