Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/11/2024, 04:56
Behavioral task
behavioral1
Sample
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe
Resource
win10v2004-20241007-en
General
-
Target
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe
-
Size
783KB
-
MD5
308e34620e4b48c3ae64e4045a817229
-
SHA1
d1312c2b2e9941f03f710af23e640cbfec175467
-
SHA256
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e
-
SHA512
bfc03956208d26b6833c4d8a750041ac021f313f2e009ce009a381b6134e72f0003b2cbf8982d748587a21e249a45c3d21fb1daadd48521969830a37e5241d6d
-
SSDEEP
12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK2:G+OQbpbgsFdAyQvzSqaq8qt
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2684 2740 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 2740 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1980 2740 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 2740 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2312 2740 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 2740 schtasks.exe 28 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe -
resource yara_rule behavioral1/memory/2052-1-0x0000000000070000-0x000000000013A000-memory.dmp dcrat behavioral1/files/0x0009000000018678-32.dat dcrat behavioral1/memory/2764-86-0x0000000001000000-0x00000000010CA000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2764 winlogon.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\System32\\DXPTaskRingtone\\lsm.exe\"" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\SortWindows6Compat\\dllhost.exe\"" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files (x86)\\Uninstall Information\\sppsvc.exe\"" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\System32\\dps\\winlogon.exe\"" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\ProgramData\\Desktop\\winlogon.exe\"" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e = "\"C:\\Documents and Settings\\5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe\"" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\System32\SortWindows6Compat\dllhost.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File created C:\Windows\System32\dps\cc11b995f2a76da408ea6a601e682e64743153ad 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File created C:\Windows\System32\DXPTaskRingtone\lsm.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File created C:\Windows\System32\DXPTaskRingtone\101b941d020240259ca4912829b53995ad543df6 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Windows\System32\SortWindows6Compat\RCX7F2F.tmp 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Windows\System32\dps\RCX8337.tmp 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Windows\System32\SortWindows6Compat\dllhost.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File created C:\Windows\System32\SortWindows6Compat\5940a34987c99120d96dace90a3f93f329dcad63 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File created C:\Windows\System32\dps\winlogon.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Windows\System32\dps\winlogon.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Windows\System32\DXPTaskRingtone\RCX8A1D.tmp 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Windows\System32\DXPTaskRingtone\lsm.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Uninstall Information\sppsvc.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File created C:\Program Files (x86)\Uninstall Information\0a1fd5f707cd16ea89afd3d6db52b2da58214a6c 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Program Files (x86)\Uninstall Information\RCX8133.tmp 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Program Files (x86)\Uninstall Information\sppsvc.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 winlogon.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2312 schtasks.exe 2324 schtasks.exe 2684 schtasks.exe 2760 schtasks.exe 1980 schtasks.exe 2508 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2052 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 2052 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 2052 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 2052 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 2052 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 2052 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 2052 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 2052 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 2052 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 2052 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 2052 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 2052 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 2764 winlogon.exe 2764 winlogon.exe 2764 winlogon.exe 2764 winlogon.exe 2764 winlogon.exe 2764 winlogon.exe 2764 winlogon.exe 2764 winlogon.exe 2764 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2052 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Token: SeDebugPrivilege 2764 winlogon.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1444 2052 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 36 PID 2052 wrote to memory of 1444 2052 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 36 PID 2052 wrote to memory of 1444 2052 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 36 PID 1444 wrote to memory of 1800 1444 cmd.exe 38 PID 1444 wrote to memory of 1800 1444 cmd.exe 38 PID 1444 wrote to memory of 1800 1444 cmd.exe 38 PID 1444 wrote to memory of 2764 1444 cmd.exe 39 PID 1444 wrote to memory of 2764 1444 cmd.exe 39 PID 1444 wrote to memory of 2764 1444 cmd.exe 39 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe"C:\Users\Admin\AppData\Local\Temp\5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe"1⤵
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2052 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GR2ZzyivhR.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1800
-
-
C:\ProgramData\Desktop\winlogon.exe"C:\ProgramData\Desktop\winlogon.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2764
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\SortWindows6Compat\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Uninstall Information\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\dps\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\ProgramData\Desktop\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e" /sc ONLOGON /tr "'C:\Documents and Settings\5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\DXPTaskRingtone\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
783KB
MD5308e34620e4b48c3ae64e4045a817229
SHA1d1312c2b2e9941f03f710af23e640cbfec175467
SHA2565cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e
SHA512bfc03956208d26b6833c4d8a750041ac021f313f2e009ce009a381b6134e72f0003b2cbf8982d748587a21e249a45c3d21fb1daadd48521969830a37e5241d6d
-
Filesize
199B
MD5e66ac2c14982e8f3edee2c5df8219416
SHA140ca23efeeb742d562fb2cccc00b64b234a55d5b
SHA2564aef93c3441188c2ae51a61db754802b502adbd3d671f2e278c612114baa468f
SHA51238c757535e5e3fcd608b0ec7bfd13f512f3a2b86cd23862844f165cf52ec5d60a98d2924b2de7fd60a7bd40ebf1cb5498d1fbfda5c8cde842b426bf96a4c2055