Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 12:51
Behavioral task
behavioral1
Sample
3E30BD01F2053EE82162F5ECA0FAEFE8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3E30BD01F2053EE82162F5ECA0FAEFE8.exe
Resource
win10v2004-20241007-en
General
-
Target
3E30BD01F2053EE82162F5ECA0FAEFE8.exe
-
Size
1.3MB
-
MD5
3e30bd01f2053ee82162f5eca0faefe8
-
SHA1
e5859be6a67c8d33a34707df9c13c8ddce6cc690
-
SHA256
85768ff86e86155faadff2443ea1c9656fc479ffa5f0ae90c9b738bf31ff1080
-
SHA512
ede7e3f18f0add3744b64955744067654a147e2f4dc33d7d4b9e82d02c7698ea3654ea4623a424729f1e6528314049e102aa2f74b223b16638276e758c5bb9e5
-
SSDEEP
24576:A3HWfVXWNnnOtB3c20/vtKMpw7fuWppvKoxdO3zFuI:g2fWnnwa2qhcN/5xM
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 9 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5004 4504 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2556 4504 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1292 4504 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 900 4504 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1528 4504 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 904 4504 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1368 4504 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4676 4504 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4404 4504 schtasks.exe 83 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3E30BD01F2053EE82162F5ECA0FAEFE8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 3E30BD01F2053EE82162F5ECA0FAEFE8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 3E30BD01F2053EE82162F5ECA0FAEFE8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe -
resource yara_rule behavioral2/memory/2624-1-0x00000000002A0000-0x00000000003EA000-memory.dmp dcrat behavioral2/files/0x0007000000023c9c-21.dat dcrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 3E30BD01F2053EE82162F5ECA0FAEFE8.exe -
Executes dropped EXE 1 IoCs
pid Process 2704 dwm.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3E30BD01F2053EE82162F5ECA0FAEFE8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3E30BD01F2053EE82162F5ECA0FAEFE8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 ipinfo.io 22 ipinfo.io 54 ip-api.com 6 ip-api.com -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Windows Security\BrowserCore\dwm.exe 3E30BD01F2053EE82162F5ECA0FAEFE8.exe File created C:\Program Files\Windows Security\BrowserCore\6cb0b6c459d5d3 3E30BD01F2053EE82162F5ECA0FAEFE8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings dwm.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1368 schtasks.exe 4404 schtasks.exe 5004 schtasks.exe 1292 schtasks.exe 1528 schtasks.exe 4676 schtasks.exe 2556 schtasks.exe 900 schtasks.exe 904 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2624 3E30BD01F2053EE82162F5ECA0FAEFE8.exe 2624 3E30BD01F2053EE82162F5ECA0FAEFE8.exe 2624 3E30BD01F2053EE82162F5ECA0FAEFE8.exe 2624 3E30BD01F2053EE82162F5ECA0FAEFE8.exe 2624 3E30BD01F2053EE82162F5ECA0FAEFE8.exe 2624 3E30BD01F2053EE82162F5ECA0FAEFE8.exe 2624 3E30BD01F2053EE82162F5ECA0FAEFE8.exe 2624 3E30BD01F2053EE82162F5ECA0FAEFE8.exe 2624 3E30BD01F2053EE82162F5ECA0FAEFE8.exe 2624 3E30BD01F2053EE82162F5ECA0FAEFE8.exe 2624 3E30BD01F2053EE82162F5ECA0FAEFE8.exe 2624 3E30BD01F2053EE82162F5ECA0FAEFE8.exe 2704 dwm.exe 2704 dwm.exe 2704 dwm.exe 2704 dwm.exe 2704 dwm.exe 2704 dwm.exe 2704 dwm.exe 2704 dwm.exe 2704 dwm.exe 2704 dwm.exe 2704 dwm.exe 2704 dwm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 dwm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2624 3E30BD01F2053EE82162F5ECA0FAEFE8.exe Token: SeDebugPrivilege 2704 dwm.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2704 2624 3E30BD01F2053EE82162F5ECA0FAEFE8.exe 93 PID 2624 wrote to memory of 2704 2624 3E30BD01F2053EE82162F5ECA0FAEFE8.exe 93 PID 2704 wrote to memory of 1656 2704 dwm.exe 94 PID 2704 wrote to memory of 1656 2704 dwm.exe 94 PID 2704 wrote to memory of 3824 2704 dwm.exe 95 PID 2704 wrote to memory of 3824 2704 dwm.exe 95 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3E30BD01F2053EE82162F5ECA0FAEFE8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 3E30BD01F2053EE82162F5ECA0FAEFE8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 3E30BD01F2053EE82162F5ECA0FAEFE8.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3E30BD01F2053EE82162F5ECA0FAEFE8.exe"C:\Users\Admin\AppData\Local\Temp\3E30BD01F2053EE82162F5ECA0FAEFE8.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2624 -
C:\Program Files\Windows Security\BrowserCore\dwm.exe"C:\Program Files\Windows Security\BrowserCore\dwm.exe"2⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2704 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b3166909-f0e0-4786-8213-8ca2b52bfd42.vbs"3⤵PID:1656
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f5c50d03-a4b4-41e0-96a3-cbeb14de1ad1.vbs"3⤵PID:3824
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\PrintHood\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Users\Admin\PrintHood\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\PrintHood\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\ssh\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\All Users\ssh\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\ssh\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Security\BrowserCore\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Windows Security\BrowserCore\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Security\BrowserCore\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4404
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD53e30bd01f2053ee82162f5eca0faefe8
SHA1e5859be6a67c8d33a34707df9c13c8ddce6cc690
SHA25685768ff86e86155faadff2443ea1c9656fc479ffa5f0ae90c9b738bf31ff1080
SHA512ede7e3f18f0add3744b64955744067654a147e2f4dc33d7d4b9e82d02c7698ea3654ea4623a424729f1e6528314049e102aa2f74b223b16638276e758c5bb9e5
-
Filesize
729B
MD59aaf551abe603ad9503989ce6eb60409
SHA158a0650296ffca973624eee4b9794e541f5d41b0
SHA256649c3b981d9c580664642cedbed90356c97ce09cc26ce7ce74cffef10b8e80a5
SHA5121450008b0764d14b5f6d8e2c3f13e47d1491c11ee648a5bc23d605aa6e682ad45bcd800ed992bec70b24969265af59bf5ea93f988b450f9df2ca723770c86d7f
-
Filesize
505B
MD5b5217ffdb100c1bdc57833221752b75b
SHA1deca9bd70d276fe22c67bf4413171057844c0db0
SHA256b04fa2a9f23cb712f16a6d244458ebfad359eced471e680b7d9fb67765745fab
SHA512d50cce39574732bee3a2a4046e3c729e2a0a5ad22f1db3abade2e79dc8f15a8788450148bd843e0f11386d18cfa2b6aa563bad58308684ea810ca5996af8b7b2