Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 04:56
Behavioral task
behavioral1
Sample
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe
Resource
win10v2004-20241007-en
General
-
Target
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe
-
Size
783KB
-
MD5
308e34620e4b48c3ae64e4045a817229
-
SHA1
d1312c2b2e9941f03f710af23e640cbfec175467
-
SHA256
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e
-
SHA512
bfc03956208d26b6833c4d8a750041ac021f313f2e009ce009a381b6134e72f0003b2cbf8982d748587a21e249a45c3d21fb1daadd48521969830a37e5241d6d
-
SSDEEP
12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK2:G+OQbpbgsFdAyQvzSqaq8qt
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Processes:
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe -
Processes:
resource yara_rule behavioral2/memory/3916-1-0x0000000000A20000-0x0000000000AEA000-memory.dmp dcrat behavioral2/files/0x000a000000023b90-33.dat dcrat behavioral2/files/0x000c000000023bb9-69.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe -
Executes dropped EXE 1 IoCs
Processes:
taskhostw.exepid Process 3484 taskhostw.exe -
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Recovery\\WindowsRE\\StartMenuExperienceHost.exe\"" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\System32\\ulib\\spoolsv.exe\"" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\PrintDialog\\microsoft.system.package.metadata\\Autogen\\RuntimeBroker.exe\"" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Windows\\System32\\GraphicsPerfSvc\\taskhostw.exe\"" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files\\Google\\Chrome\\Application\\123.0.6312.123\\lsass.exe\"" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e = "\"C:\\ProgramData\\Packages\\Microsoft.549981C3F5F10_8wekyb3d8bbwe\\S-1-5-21-2045521122-590294423-3465680274-1000\\5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe\"" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MusNotification = "\"C:\\Windows\\System32\\fdWSD\\MusNotification.exe\"" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe -
Processes:
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe -
Drops file in System32 directory 12 IoCs
Processes:
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exedescription ioc Process File created C:\Windows\System32\fdWSD\MusNotification.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File created C:\Windows\System32\ulib\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File created C:\Windows\System32\GraphicsPerfSvc\ea9f0e6c9e2dcd4dfacdaf29ba21541fb815a988 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Windows\System32\fdWSD\RCXF5CB.tmp 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Windows\System32\ulib\RCXF9D4.tmp 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Windows\System32\GraphicsPerfSvc\RCXFE4B.tmp 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Windows\System32\GraphicsPerfSvc\taskhostw.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Windows\System32\fdWSD\MusNotification.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File created C:\Windows\System32\fdWSD\aa97147c4c782d4a77c6b7822ef5383b917e6cfb 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File created C:\Windows\System32\ulib\spoolsv.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File created C:\Windows\System32\GraphicsPerfSvc\taskhostw.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Windows\System32\ulib\spoolsv.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe -
Drops file in Program Files directory 4 IoCs
Processes:
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exedescription ioc Process File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\lsass.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\6203df4a6bafc7c328ee7f6f8ca0a8a838a8a1b9 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\RCX4F.tmp 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\lsass.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe -
Drops file in Windows directory 4 IoCs
Processes:
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exedescription ioc Process File created C:\Windows\PrintDialog\microsoft.system.package.metadata\Autogen\RuntimeBroker.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File created C:\Windows\PrintDialog\microsoft.system.package.metadata\Autogen\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Windows\PrintDialog\microsoft.system.package.metadata\Autogen\RCXFBD9.tmp 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe File opened for modification C:\Windows\PrintDialog\microsoft.system.package.metadata\Autogen\RuntimeBroker.exe 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 4884 schtasks.exe 2648 schtasks.exe 3568 schtasks.exe 5056 schtasks.exe 3080 schtasks.exe 3836 schtasks.exe 1936 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exepid Process 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exetaskhostw.exedescription pid Process Token: SeDebugPrivilege 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Token: SeDebugPrivilege 3484 taskhostw.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exedescription pid Process procid_target PID 3916 wrote to memory of 3484 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 96 PID 3916 wrote to memory of 3484 3916 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe 96 -
System policy modification 1 TTPs 3 IoCs
Processes:
5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe"C:\Users\Admin\AppData\Local\Temp\5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe"1⤵
- UAC bypass
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3916 -
C:\Windows\System32\GraphicsPerfSvc\taskhostw.exe"C:\Windows\System32\GraphicsPerfSvc\taskhostw.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\Windows\System32\fdWSD\MusNotification.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:3568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:5056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\ulib\spoolsv.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:2648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\PrintDialog\microsoft.system.package.metadata\Autogen\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:4884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\System32\GraphicsPerfSvc\taskhostw.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:1936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\123.0.6312.123\lsass.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:3080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e" /sc ONLOGON /tr "'C:\ProgramData\Packages\Microsoft.549981C3F5F10_8wekyb3d8bbwe\S-1-5-21-2045521122-590294423-3465680274-1000\5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:3836
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
783KB
MD54df68b73d65b6ff098f314c8130135ea
SHA1c3035925901cc3f7fb16fb94e120f745fb9ee042
SHA2568ad60c8d88047f2a4a61be4f574f4152f9a61db74a68e2b989a72e10efbe5ba1
SHA51249b7b0998463a5f2185bc0c24c6e8f277062e25bb6054283617a2f72f453d7749cd599981de4b4f2c0003ccce37d2ae82b62fd5c99f28c38d25a065e09c28367
-
Filesize
783KB
MD5308e34620e4b48c3ae64e4045a817229
SHA1d1312c2b2e9941f03f710af23e640cbfec175467
SHA2565cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e
SHA512bfc03956208d26b6833c4d8a750041ac021f313f2e009ce009a381b6134e72f0003b2cbf8982d748587a21e249a45c3d21fb1daadd48521969830a37e5241d6d