Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 22:11
Behavioral task
behavioral1
Sample
4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe
Resource
win10v2004-20241007-en
General
-
Target
4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe
-
Size
952KB
-
MD5
82ededc8ebe36096a29aeb793260f6c6
-
SHA1
9bc9ba0e92990015e1ee7d3175506cd850e40f08
-
SHA256
4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5
-
SHA512
a94b65efa5a07af586071dad395e7694e30acb5a4ef6ff19f55f8191a11bfacd3c1cfd17e04077949091ace10e573033c4399aaa23264435780e34f081700120
-
SSDEEP
24576:W+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXXl:x8/KfRTKv
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Documents and Settings\\dwm.exe\", \"C:\\Windows\\SystemApps\\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\\AppxBlockMap\\StartMenuExperienceHost.exe\", \"C:\\Documents and Settings\\TextInputHost.exe\"" 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Documents and Settings\\dwm.exe\"" 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Documents and Settings\\dwm.exe\", \"C:\\Windows\\SystemApps\\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\\AppxBlockMap\\StartMenuExperienceHost.exe\"" 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe -
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2784 2336 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1484 2336 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2424 2336 schtasks.exe 85 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" StartMenuExperienceHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" StartMenuExperienceHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" StartMenuExperienceHost.exe -
resource yara_rule behavioral2/memory/2260-1-0x0000000000670000-0x0000000000764000-memory.dmp dcrat behavioral2/files/0x0009000000023cbf-22.dat dcrat behavioral2/files/0x0008000000023ccb-38.dat dcrat behavioral2/files/0x0007000000023cc4-67.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe -
Executes dropped EXE 1 IoCs
pid Process 4624 StartMenuExperienceHost.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Documents and Settings\\dwm.exe\"" 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\\AppxBlockMap\\StartMenuExperienceHost.exe\"" 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\\AppxBlockMap\\StartMenuExperienceHost.exe\"" 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Documents and Settings\\TextInputHost.exe\"" 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Documents and Settings\\TextInputHost.exe\"" 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Documents and Settings\\dwm.exe\"" 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA StartMenuExperienceHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" StartMenuExperienceHost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AppxBlockMap\RCX8ABF.tmp 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AppxBlockMap\RCX8AD0.tmp 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AppxBlockMap\StartMenuExperienceHost.exe 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe File created C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AppxBlockMap\StartMenuExperienceHost.exe 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe File created C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AppxBlockMap\55b276f4edf653fe07efe8f1ecc32d3d195abd16 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2784 schtasks.exe 1484 schtasks.exe 2424 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2260 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2260 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe Token: SeDebugPrivilege 4624 StartMenuExperienceHost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2260 wrote to memory of 4940 2260 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe 90 PID 2260 wrote to memory of 4940 2260 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe 90 PID 4940 wrote to memory of 1628 4940 cmd.exe 92 PID 4940 wrote to memory of 1628 4940 cmd.exe 92 PID 4940 wrote to memory of 4624 4940 cmd.exe 94 PID 4940 wrote to memory of 4624 4940 cmd.exe 94 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" StartMenuExperienceHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" StartMenuExperienceHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" StartMenuExperienceHost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe"C:\Users\Admin\AppData\Local\Temp\4d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2260 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\pAEBCbnR0T.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1628
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AppxBlockMap\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AppxBlockMap\StartMenuExperienceHost.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4624
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Documents and Settings\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AppxBlockMap\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Documents and Settings\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2424
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
952KB
MD588da2110432e89c73ed202c4adbec720
SHA1e9059a8ba711fe7475bc0de9efe75f758ce6e5e5
SHA256c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717
SHA5129e4b32ac7c8bde6cf301a7194a91611d7c9fab5ff4d9f4e6ffce88725383452ef7e3336bf4485550f41433068c651f439b0b931e4366f120d8edef0bb1c7a38a
-
Filesize
282B
MD5485a6b8a5c7736b396f14ae3f5f641a9
SHA1752f93c381e01a7f05fdea69d3294523861db3a6
SHA25662db9d86d62ceef290681abf6879264485269590023fab896fad844bebdaee54
SHA5126ce23471d9267f15fdbbc4476a7cb5551d516830947058ca685f1ceda36530501b93a7e7eea08eafa298b8457268277344e47a210d16f52b4b599ce3e4581f15
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AppxBlockMap\RCX8ABF.tmp
Filesize952KB
MD566f4da473806e445ae1632ba4b1ddb59
SHA15a71457351e80ec912fa0dba13108ac540191ff6
SHA25639c1f2bd399f73c546d7534fe7edbda5dac423645f7a0fce2faa600d204ef082
SHA51235d79dce4eee440c13f154a7005bdd694d845022acba122e5cfe8dd47e08ca27bfe44e14dfc7ba499529fa2afc33d47ecc5ab01f4ac40443b9120ed178626ed8
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AppxBlockMap\StartMenuExperienceHost.exe
Filesize952KB
MD582ededc8ebe36096a29aeb793260f6c6
SHA19bc9ba0e92990015e1ee7d3175506cd850e40f08
SHA2564d9022605a286834508c28ec5c9a0ee0ba83cb0e573003919fe190598875fdb5
SHA512a94b65efa5a07af586071dad395e7694e30acb5a4ef6ff19f55f8191a11bfacd3c1cfd17e04077949091ace10e573033c4399aaa23264435780e34f081700120