Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 10:41

General

  • Target

    b36b06473630c63123f3f9f178971c7ac4b07921065723a9ea73ab3556644675.exe

  • Size

    2.4MB

  • MD5

    b22adfa78630bdb6a544c61d66a5fcef

  • SHA1

    37cc4cf13bb13ecb380b24ea957da90f1efc4a92

  • SHA256

    b36b06473630c63123f3f9f178971c7ac4b07921065723a9ea73ab3556644675

  • SHA512

    8a6e1a374ca7f76c060fa07694a1c13caec49a44e51ed7922b7d5f428d77145078e97ddff16fe562dc3e28e4bf7b4bf52f3d4ba198fceba1c13e9d190014f658

  • SSDEEP

    24576:GeJKuHmdcCw7sUL/4cIG5IuUegPImmW7ayqCwviBwyLBIShZgGaiCkX4GLP1L613:JJKFdaMcQLBxW8qiTNa

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 5 IoCs
  • Process spawned unexpected child process 15 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 10 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b36b06473630c63123f3f9f178971c7ac4b07921065723a9ea73ab3556644675.exe
    "C:\Users\Admin\AppData\Local\Temp\b36b06473630c63123f3f9f178971c7ac4b07921065723a9ea73ab3556644675.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hnmcodwx\hnmcodwx.cmdline"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3144
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCF94.tmp" "c:\Windows\System32\CSC706BB7C77BF14DD29E866627696B5E7.TMP"
        3⤵
          PID:2384
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dPvAkilM3F.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4552
        • C:\Windows\system32\chcp.com
          chcp 65001
          3⤵
            PID:3300
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2912
          • C:\Program Files (x86)\MSBuild\upfc.exe
            "C:\Program Files (x86)\MSBuild\upfc.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2000
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Windows\Performance\WinSAT\DataStore\dllhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1836
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Performance\WinSAT\DataStore\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4544
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Windows\Performance\WinSAT\DataStore\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2524
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2972
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4584
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3468
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Users\Default\My Documents\System.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4956
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Default\My Documents\System.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1756
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Users\Default\My Documents\System.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3940
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\MSBuild\upfc.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:964
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\upfc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1020
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\MSBuild\upfc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3720
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Documents\My Videos\upfc.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3492
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Users\Public\Documents\My Videos\upfc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4312
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Documents\My Videos\upfc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:384

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RESCF94.tmp

        Filesize

        1KB

        MD5

        1ad567a1b234f764bbb69527d8e045b6

        SHA1

        a0df20564405224d1a5451a28f780a1b069ad46e

        SHA256

        ec741e5ad37a5ac19b339ee58fad501663a7a9c3f2de1884a95bd12eb2b4efae

        SHA512

        6cf8e0f6dbcb9614507d0343b5f9504e73503bfe67166303bc787f38e32474f98384e13d618e389fd13c412683fbc390b6564c1a08778dd615c9dba37c07c26c

      • C:\Users\Admin\AppData\Local\Temp\dPvAkilM3F.bat

        Filesize

        167B

        MD5

        e580ee13a59f8b52b854d8e4df50fcdb

        SHA1

        c278149d344703826acc22f741679872dc15df3f

        SHA256

        87503d345956fd695a230e28812ec5c8088696a458447026af922d539ff3dc26

        SHA512

        325c7693f4560e489def6ddd9d5c271897cd3fbbcc58d0a50fe9c6e376b8613e0b1f7cc00aac9fb8c583b1a6499c42dc459215a4abc72fc1d99c36d7e561613d

      • C:\Users\Public\Videos\upfc.exe

        Filesize

        2.4MB

        MD5

        b22adfa78630bdb6a544c61d66a5fcef

        SHA1

        37cc4cf13bb13ecb380b24ea957da90f1efc4a92

        SHA256

        b36b06473630c63123f3f9f178971c7ac4b07921065723a9ea73ab3556644675

        SHA512

        8a6e1a374ca7f76c060fa07694a1c13caec49a44e51ed7922b7d5f428d77145078e97ddff16fe562dc3e28e4bf7b4bf52f3d4ba198fceba1c13e9d190014f658

      • \??\c:\Users\Admin\AppData\Local\Temp\hnmcodwx\hnmcodwx.0.cs

        Filesize

        383B

        MD5

        8c67709a4d055a0dd59970abb1f7241f

        SHA1

        c9262c8f1a3ed7043a1ed4385195d5f1d4c0a484

        SHA256

        6b2150e0e06428f815cffd07bc1a5850c937a61bff3f2a937707387a2d445797

        SHA512

        9e8b5970a3e46bcd1a61c19c484aa69865ac517a6cf24535b78ff997339de96e524b6d683f6c9d2b804c9c28ee55d121458022a937cf3f01585a784044430d70

      • \??\c:\Users\Admin\AppData\Local\Temp\hnmcodwx\hnmcodwx.cmdline

        Filesize

        235B

        MD5

        6a9dc848fcaa44502003b9409f23ac95

        SHA1

        9833f30bc62e80678946d0b03e6829e54c2a50dd

        SHA256

        561f08310f6747c2d80c9dcaf688b2d77e63fda29e1d092aa2119b0b8c71a636

        SHA512

        6c327c2660962d589cc308dc5d4d351c7c98d2d9dd2956ec83f94543ae9bd1ee5fcb50876fc3e8cc7e0de6603875d47ff22ffa953f6fbada8190647dff6c87c4

      • \??\c:\Windows\System32\CSC706BB7C77BF14DD29E866627696B5E7.TMP

        Filesize

        1KB

        MD5

        d544bac668d308d2aba58ded2c13d82d

        SHA1

        e5dd50ef24d5c16629092f9290661a92387773b3

        SHA256

        84b05d56c45fd0382410fcd59e16aeef467ed0a455595dda88386dd5c87d7a02

        SHA512

        0826de2bc95d93dde2c540d2d768a0188481ee88f1da79f9c7d70d7ccd3c8715b8f1d62053f84d14f19e4d2b0a13e67084d970a158464e6223e340eb0733e1b0

      • memory/2232-29-0x00007FFB39E20000-0x00007FFB3A8E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2232-35-0x00007FFB39E20000-0x00007FFB3A8E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2232-12-0x000000001B720000-0x000000001B770000-memory.dmp

        Filesize

        320KB

      • memory/2232-14-0x000000001B5F0000-0x000000001B600000-memory.dmp

        Filesize

        64KB

      • memory/2232-11-0x000000001B6B0000-0x000000001B6CC000-memory.dmp

        Filesize

        112KB

      • memory/2232-16-0x000000001B6F0000-0x000000001B708000-memory.dmp

        Filesize

        96KB

      • memory/2232-18-0x000000001B6D0000-0x000000001B6E0000-memory.dmp

        Filesize

        64KB

      • memory/2232-21-0x000000001B6E0000-0x000000001B6F0000-memory.dmp

        Filesize

        64KB

      • memory/2232-19-0x00007FFB39E20000-0x00007FFB3A8E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2232-24-0x00007FFB39E20000-0x00007FFB3A8E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2232-23-0x000000001B710000-0x000000001B71E000-memory.dmp

        Filesize

        56KB

      • memory/2232-26-0x000000001B7D0000-0x000000001B7E2000-memory.dmp

        Filesize

        72KB

      • memory/2232-28-0x000000001B7B0000-0x000000001B7C0000-memory.dmp

        Filesize

        64KB

      • memory/2232-31-0x000000001B810000-0x000000001B826000-memory.dmp

        Filesize

        88KB

      • memory/2232-1-0x0000000000820000-0x0000000000A8E000-memory.dmp

        Filesize

        2.4MB

      • memory/2232-32-0x00007FFB39E20000-0x00007FFB3A8E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2232-34-0x000000001B830000-0x000000001B842000-memory.dmp

        Filesize

        72KB

      • memory/2232-10-0x000000001B660000-0x000000001B67C000-memory.dmp

        Filesize

        112KB

      • memory/2232-38-0x000000001B7C0000-0x000000001B7CE000-memory.dmp

        Filesize

        56KB

      • memory/2232-36-0x000000001BD80000-0x000000001C2A8000-memory.dmp

        Filesize

        5.2MB

      • memory/2232-40-0x000000001B7F0000-0x000000001B800000-memory.dmp

        Filesize

        64KB

      • memory/2232-42-0x000000001B800000-0x000000001B810000-memory.dmp

        Filesize

        64KB

      • memory/2232-44-0x000000001B8B0000-0x000000001B90A000-memory.dmp

        Filesize

        360KB

      • memory/2232-46-0x000000001B850000-0x000000001B85E000-memory.dmp

        Filesize

        56KB

      • memory/2232-48-0x000000001B860000-0x000000001B870000-memory.dmp

        Filesize

        64KB

      • memory/2232-50-0x000000001B870000-0x000000001B87E000-memory.dmp

        Filesize

        56KB

      • memory/2232-52-0x000000001B910000-0x000000001B928000-memory.dmp

        Filesize

        96KB

      • memory/2232-54-0x000000001B980000-0x000000001B9CE000-memory.dmp

        Filesize

        312KB

      • memory/2232-6-0x00007FFB39E20000-0x00007FFB3A8E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2232-8-0x000000001B5E0000-0x000000001B5EE000-memory.dmp

        Filesize

        56KB

      • memory/2232-5-0x00007FFB39E20000-0x00007FFB3A8E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2232-4-0x000000001B610000-0x000000001B636000-memory.dmp

        Filesize

        152KB

      • memory/2232-2-0x00007FFB39E20000-0x00007FFB3A8E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2232-82-0x00007FFB39E20000-0x00007FFB3A8E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2232-0-0x00007FFB39E23000-0x00007FFB39E25000-memory.dmp

        Filesize

        8KB