Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 16:57

General

  • Target

    6bf4772cae624456cb29b1201ed435eff4c925b27b48de326946b997d1098b9bN.exe

  • Size

    7.3MB

  • MD5

    ba51fe0a806fde9a0a548d5c944ade50

  • SHA1

    1763951e46fce5ded1faac1328cd409ae38d5cee

  • SHA256

    6bf4772cae624456cb29b1201ed435eff4c925b27b48de326946b997d1098b9b

  • SHA512

    d9a23b4aa23d187f6b432edca418251e76dc7c9e8e0688fd7f7ad853acf88629c377784073cc97e5e04fc664d999d64fe3ea49089b3b463656467889dd1f8269

  • SSDEEP

    196608:rTn3WAWbD9PX/xS1m5YTdzCfjQGkbCGhpwdmVQ:rjCP9PX/xUm+TgjQPCGtK

Malware Config

Signatures

  • DcRat 11 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 10 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Drops file in System32 directory 14 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bf4772cae624456cb29b1201ed435eff4c925b27b48de326946b997d1098b9bN.exe
    "C:\Users\Admin\AppData\Local\Temp\6bf4772cae624456cb29b1201ed435eff4c925b27b48de326946b997d1098b9bN.exe"
    1⤵
    • DcRat
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Users\Admin\AppData\Roaming\AccurateBase 3.7.1.exe
      "C:\Users\Admin\AppData\Roaming\AccurateBase 3.7.1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2968
    • C:\Users\Admin\AppData\Roaming\DCRatBuild_actual.exe
      "C:\Users\Admin\AppData\Roaming\DCRatBuild_actual.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\winSavessessionPerfcrt\AzPIsnzPQMcnb9MIj8ZxuK2AQR.vbe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\winSavessessionPerfcrt\FPa26672dC5vdA2uBv5IhhyTUv2Yu.bat" "
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1952
          • C:\winSavessessionPerfcrt\winSavessessionPerfcrtReviewdhcp.exe
            "C:\winSavessessionPerfcrt\winSavessessionPerfcrtReviewdhcp.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2036
            • C:\winSavessessionPerfcrt\winSavessessionPerfcrtReviewdhcp.exe
              "C:\winSavessessionPerfcrt\winSavessessionPerfcrtReviewdhcp.exe"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:532
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\DE052NfUtZ.bat"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2488
                • C:\Windows\system32\w32tm.exe
                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                  8⤵
                    PID:2412
                  • C:\ProgramData\Desktop\WmiPrvSE.exe
                    "C:\ProgramData\Desktop\WmiPrvSE.exe"
                    8⤵
                    • Drops file in Drivers directory
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:892
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\tcpmib\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1400
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\WMIC\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2728
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\System32\Locator\conhost.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1428
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1756
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "schtasks" /sc ONLOGON /tr "'C:\Windows\System32\fveui\schtasks.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1892
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\ProgramData\Desktop\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1588
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\vmbuspipe\lsm.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2520
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\hh\explorer.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2972
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\netbios\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1732
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "AccurateBase 3.7.1" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Roaming\StopRestore\AccurateBase 3.7.1.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2356

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\DE052NfUtZ.bat

      Filesize

      199B

      MD5

      2ab923cc6afa5b68800fcaf33383209c

      SHA1

      14266cb578ce8bf7c30f032f15863f907ebdab03

      SHA256

      6ebf239d1cdf2854e6732b172b757a13449ed5e0869753fce629b9465b59cfb4

      SHA512

      fe635025dceb93ea2b74e4c0905e63b234195a1613831e0bd69cefeafaf5c35edc5281fef5684d0012f653d322a8d71014f096ba2dc097600140a2afaa9cb47d

    • C:\Users\Admin\AppData\Roaming\DCRatBuild_actual.exe

      Filesize

      2.6MB

      MD5

      5d3db3851e7e001e7996a01366e70f15

      SHA1

      6a3204b2ca4df896d3ee8ca6bfb80bf55a7f24ff

      SHA256

      6d9ec01b5fc9aedcb4352f41667230043e1e4575d5e1cf47bfa0a4f0fed71e15

      SHA512

      55bce3cda4c7d8216fbf724228dd55dbe1acfebaa8890755dd30c3fda4c33f7c9bff19618702f994f98858bf0260c29ff330f7c87a5c01ad0b14108620552ab7

    • C:\winSavessessionPerfcrt\AzPIsnzPQMcnb9MIj8ZxuK2AQR.vbe

      Filesize

      229B

      MD5

      5ce2f4a68ccb9a203c0a5c4b38ed5a02

      SHA1

      fbc0ee263d0b62dfbe23dff0807571f7a7077594

      SHA256

      982849ce4f817a075be7131286e93a6b57aae9741d0adaca77cd141857e25339

      SHA512

      0f55605b72a4d6333fd01f9c313bb6fdccc4191809a86d374fdd1d6bb789cbcff498e77dd44f7ae2e82eeff3e1df8078394ddf5efd82b1fafdad73d21bfe1d8b

    • C:\winSavessessionPerfcrt\FPa26672dC5vdA2uBv5IhhyTUv2Yu.bat

      Filesize

      64B

      MD5

      dbdd562f39890812c24256bd82dacd5c

      SHA1

      d48c5fd83f28582c334308508b6b3e8285e70e92

      SHA256

      36c3dbb723975dfa8d756cdcc8d08d5bf0656bc4e7f1045bfa4a019ea5ba1472

      SHA512

      47910fa4d53321687b764d487535952dec578e336beaf2b6ee39c505a13d25e05465972c9ec391ac8e810520cf26c77ff2c1f7b7a8ffd9e766c2fbc1778dcd08

    • \Users\Admin\AppData\Roaming\AccurateBase 3.7.1.exe

      Filesize

      6.3MB

      MD5

      4dfb8e6353a95274e54ce6930cdd9a01

      SHA1

      23469c142723afd6a6287bb80013a37076bd6fcc

      SHA256

      e49d072f7c6f476ff8a7f63c153d34343ba8730f229de6306d7a788ed21720b7

      SHA512

      f7840137cb4569851b44fe3f6c3fc0c2fc37df6ef6b22310e73e2cfe4a3fa04b7d5aa58fc94ea1b2165b50ca83acca97142fd282251ae4502e727e7bb4102eb9

    • \winSavessessionPerfcrt\winSavessessionPerfcrtReviewdhcp.exe

      Filesize

      2.3MB

      MD5

      0108d4c7b51acb6ed7010e822df3bed4

      SHA1

      cea61376626d0d7cf92a1db625262ef611e6dfbe

      SHA256

      8f919979d62dc7d278a89c20a73367c97629ce89219c55052383b1df36a88e4e

      SHA512

      eb192434f234326fe2c75c89b010474c69eb9bfc77c9a1d37b6471e27e0ff58ec694560b38ba1f0595be74b372a9cd5e0bc174740074c463b0f8cf4bbc26a4b4

    • memory/892-79-0x0000000000680000-0x0000000000688000-memory.dmp

      Filesize

      32KB

    • memory/892-82-0x0000000000730000-0x0000000000738000-memory.dmp

      Filesize

      32KB

    • memory/892-88-0x0000000002240000-0x0000000002296000-memory.dmp

      Filesize

      344KB

    • memory/892-86-0x0000000002130000-0x0000000002138000-memory.dmp

      Filesize

      32KB

    • memory/892-87-0x0000000002140000-0x000000000214C000-memory.dmp

      Filesize

      48KB

    • memory/892-85-0x0000000000770000-0x000000000077C000-memory.dmp

      Filesize

      48KB

    • memory/892-84-0x0000000000780000-0x000000000078E000-memory.dmp

      Filesize

      56KB

    • memory/892-83-0x0000000000740000-0x000000000074A000-memory.dmp

      Filesize

      40KB

    • memory/892-80-0x0000000000690000-0x0000000000698000-memory.dmp

      Filesize

      32KB

    • memory/892-81-0x0000000000720000-0x000000000072A000-memory.dmp

      Filesize

      40KB

    • memory/892-72-0x0000000000360000-0x00000000005A8000-memory.dmp

      Filesize

      2.3MB

    • memory/892-73-0x00000000005B0000-0x00000000005B8000-memory.dmp

      Filesize

      32KB

    • memory/892-74-0x00000000005C0000-0x00000000005C8000-memory.dmp

      Filesize

      32KB

    • memory/892-75-0x00000000005D0000-0x00000000005D8000-memory.dmp

      Filesize

      32KB

    • memory/892-76-0x00000000005E0000-0x00000000005EC000-memory.dmp

      Filesize

      48KB

    • memory/892-77-0x0000000000670000-0x000000000067C000-memory.dmp

      Filesize

      48KB

    • memory/2036-43-0x00000000010C0000-0x0000000001308000-memory.dmp

      Filesize

      2.3MB

    • memory/2672-9-0x00000000034D0000-0x000000000458B000-memory.dmp

      Filesize

      16.7MB

    • memory/2968-10-0x0000000000400000-0x00000000014BB000-memory.dmp

      Filesize

      16.7MB

    • memory/2968-24-0x00000000779D0000-0x00000000779D1000-memory.dmp

      Filesize

      4KB

    • memory/2968-16-0x00000000007D3000-0x00000000007D8000-memory.dmp

      Filesize

      20KB

    • memory/2968-30-0x0000000000400000-0x00000000014BB000-memory.dmp

      Filesize

      16.7MB

    • memory/2968-37-0x0000000000400000-0x00000000014BB000-memory.dmp

      Filesize

      16.7MB

    • memory/2968-36-0x0000000000400000-0x00000000014BB000-memory.dmp

      Filesize

      16.7MB

    • memory/2968-28-0x0000000075680000-0x0000000075681000-memory.dmp

      Filesize

      4KB

    • memory/2968-22-0x00000000779D0000-0x00000000779D1000-memory.dmp

      Filesize

      4KB