Analysis

  • max time kernel
    118s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 10:41

General

  • Target

    b36b06473630c63123f3f9f178971c7ac4b07921065723a9ea73ab3556644675.exe

  • Size

    2.4MB

  • MD5

    b22adfa78630bdb6a544c61d66a5fcef

  • SHA1

    37cc4cf13bb13ecb380b24ea957da90f1efc4a92

  • SHA256

    b36b06473630c63123f3f9f178971c7ac4b07921065723a9ea73ab3556644675

  • SHA512

    8a6e1a374ca7f76c060fa07694a1c13caec49a44e51ed7922b7d5f428d77145078e97ddff16fe562dc3e28e4bf7b4bf52f3d4ba198fceba1c13e9d190014f658

  • SSDEEP

    24576:GeJKuHmdcCw7sUL/4cIG5IuUegPImmW7ayqCwviBwyLBIShZgGaiCkX4GLP1L613:JJKFdaMcQLBxW8qiTNa

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 5 IoCs
  • Process spawned unexpected child process 15 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 10 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b36b06473630c63123f3f9f178971c7ac4b07921065723a9ea73ab3556644675.exe
    "C:\Users\Admin\AppData\Local\Temp\b36b06473630c63123f3f9f178971c7ac4b07921065723a9ea73ab3556644675.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\bldr3zri\bldr3zri.cmdline"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEB0.tmp" "c:\Windows\System32\CSCE05C4FC25CF84BCFAEE94FA6BBFC278C.TMP"
        3⤵
          PID:2360
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\gPnvjGhrfd.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2168
        • C:\Windows\system32\chcp.com
          chcp 65001
          3⤵
            PID:2476
          • C:\Windows\system32\w32tm.exe
            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
            3⤵
              PID:2256
            • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\sppsvc.exe
              "C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\sppsvc.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: CmdExeWriteProcessMemorySpam
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:2076
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\sppsvc.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2424
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1684
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2648
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\lsass.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1308
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1996
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1652
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\explorer.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1724
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\MSOCache\All Users\explorer.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1668
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\explorer.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1756
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\explorer.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1620
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\explorer.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2532
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\explorer.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2840
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\services.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2844
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\services.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2356
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\services.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2008

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\services.exe

          Filesize

          2.4MB

          MD5

          b22adfa78630bdb6a544c61d66a5fcef

          SHA1

          37cc4cf13bb13ecb380b24ea957da90f1efc4a92

          SHA256

          b36b06473630c63123f3f9f178971c7ac4b07921065723a9ea73ab3556644675

          SHA512

          8a6e1a374ca7f76c060fa07694a1c13caec49a44e51ed7922b7d5f428d77145078e97ddff16fe562dc3e28e4bf7b4bf52f3d4ba198fceba1c13e9d190014f658

        • C:\Users\Admin\AppData\Local\Temp\RESEB0.tmp

          Filesize

          1KB

          MD5

          9a7783c6e4865a4463860dc46c302266

          SHA1

          08e4b763cb79fb8ac29317665c0632449bac7a95

          SHA256

          cbbbf6938da8beadac27285965d5cc1e567920e7e4ff4f5dabdc5349af848167

          SHA512

          11e906df14fb32ae6579c0082ef759d7e64c140095e2324c289c5aaf0f9ce833ea1a4532c279989ceeb5f1857392f09f388c8b104a3a890805b6e278f4efcb73

        • C:\Users\Admin\AppData\Local\Temp\gPnvjGhrfd.bat

          Filesize

          249B

          MD5

          21c1349f92ebb97726bd7ff193d8df7f

          SHA1

          661495c8c61411a6afd5976210f69e9bf8d8d47f

          SHA256

          2619402b75224ecea321e6e66897eabe0a0536c5e1f884e1854e277c1d955cf5

          SHA512

          e6da541369f2289278627f83588a2c847624ca5907f18bcd9969c0ad9ec887b0ca91a2f79171fd59601bdcc01462ff92fcf997998d3f3b36fbea99675e855c92

        • \??\c:\Users\Admin\AppData\Local\Temp\bldr3zri\bldr3zri.0.cs

          Filesize

          405B

          MD5

          ebebb221dffba200c6273db4834a9c1e

          SHA1

          f26e59692ac50c891033a704731d062ffcaea1bd

          SHA256

          5f5c9c1c2d5632daada65c79404577eeadbed508547b4f7498a5c699cc6f456a

          SHA512

          62b0e15b4355dec3cbfeb42e66a1e9af751d30917e3c1363df654d9e57497be9d9ad6c593b4ce2a62ffb47c0610a5488c4f9aedd2911a202610a2c55dd9cbf0f

        • \??\c:\Users\Admin\AppData\Local\Temp\bldr3zri\bldr3zri.cmdline

          Filesize

          235B

          MD5

          282fa0038da05b0221f6b6f097203b51

          SHA1

          145068efcf629bb5b1dab63105e45ee9fee9e59a

          SHA256

          1bedf36662099807dd52b11138a9c0d74270d94f8c59f273b300a71e281cf4a2

          SHA512

          0e25c80327c5bcd97e77199922583e6b01897928e05318760bc91ba69c7c3ea4041c7131d566a071e14ee85ce784b6db6ec6f66458db32fa692feae3df3abfc6

        • \??\c:\Windows\System32\CSCE05C4FC25CF84BCFAEE94FA6BBFC278C.TMP

          Filesize

          1KB

          MD5

          9446a6998523ec187daa3d79bec9c8fa

          SHA1

          16c7f73aef03c8a15b4d9e8b1cfa5183caf7ca96

          SHA256

          f55f1bd2c1246cfb3b60cd8649fcc78b3837896bdf5132d6fc8ea0ecabf892d7

          SHA512

          fac3ad1b0c8663aaa94cd66b6ea0aa1848e570ff4a22b709cf2696abb76e28f42fb0d2a74316a7ad86bb6216177013c6b71ce2f4df139edc3054a03ee3467c9d

        • memory/2068-30-0x0000000000820000-0x0000000000830000-memory.dmp

          Filesize

          64KB

        • memory/2068-36-0x0000000000830000-0x000000000083E000-memory.dmp

          Filesize

          56KB

        • memory/2068-9-0x00000000005A0000-0x00000000005BC000-memory.dmp

          Filesize

          112KB

        • memory/2068-12-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

          Filesize

          9.9MB

        • memory/2068-26-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

          Filesize

          9.9MB

        • memory/2068-25-0x0000000000810000-0x000000000081E000-memory.dmp

          Filesize

          56KB

        • memory/2068-23-0x00000000005B0000-0x00000000005C0000-memory.dmp

          Filesize

          64KB

        • memory/2068-21-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

          Filesize

          9.9MB

        • memory/2068-20-0x00000000005A0000-0x00000000005B0000-memory.dmp

          Filesize

          64KB

        • memory/2068-18-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

          Filesize

          9.9MB

        • memory/2068-17-0x00000000007F0000-0x0000000000808000-memory.dmp

          Filesize

          96KB

        • memory/2068-15-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

          Filesize

          9.9MB

        • memory/2068-14-0x0000000000490000-0x00000000004A0000-memory.dmp

          Filesize

          64KB

        • memory/2068-28-0x0000000000840000-0x0000000000852000-memory.dmp

          Filesize

          72KB

        • memory/2068-0-0x000007FEF5C53000-0x000007FEF5C54000-memory.dmp

          Filesize

          4KB

        • memory/2068-32-0x00000000021B0000-0x00000000021C6000-memory.dmp

          Filesize

          88KB

        • memory/2068-34-0x00000000021D0000-0x00000000021E2000-memory.dmp

          Filesize

          72KB

        • memory/2068-10-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

          Filesize

          9.9MB

        • memory/2068-38-0x0000000002190000-0x00000000021A0000-memory.dmp

          Filesize

          64KB

        • memory/2068-40-0x00000000021A0000-0x00000000021B0000-memory.dmp

          Filesize

          64KB

        • memory/2068-42-0x000000001A920000-0x000000001A97A000-memory.dmp

          Filesize

          360KB

        • memory/2068-44-0x00000000021F0000-0x00000000021FE000-memory.dmp

          Filesize

          56KB

        • memory/2068-46-0x0000000002200000-0x0000000002210000-memory.dmp

          Filesize

          64KB

        • memory/2068-48-0x0000000002390000-0x000000000239E000-memory.dmp

          Filesize

          56KB

        • memory/2068-50-0x00000000023C0000-0x00000000023D8000-memory.dmp

          Filesize

          96KB

        • memory/2068-52-0x000000001A9D0000-0x000000001AA1E000-memory.dmp

          Filesize

          312KB

        • memory/2068-11-0x0000000000470000-0x000000000048C000-memory.dmp

          Filesize

          112KB

        • memory/2068-7-0x0000000000460000-0x000000000046E000-memory.dmp

          Filesize

          56KB

        • memory/2068-5-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

          Filesize

          9.9MB

        • memory/2068-4-0x0000000000640000-0x0000000000666000-memory.dmp

          Filesize

          152KB

        • memory/2068-2-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

          Filesize

          9.9MB

        • memory/2068-78-0x000007FEF5C53000-0x000007FEF5C54000-memory.dmp

          Filesize

          4KB

        • memory/2068-1-0x00000000000B0000-0x000000000031E000-memory.dmp

          Filesize

          2.4MB

        • memory/2068-81-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

          Filesize

          9.9MB

        • memory/2076-84-0x00000000008A0000-0x0000000000B0E000-memory.dmp

          Filesize

          2.4MB