Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 12:48
Behavioral task
behavioral1
Sample
c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe
Resource
win10v2004-20241007-en
General
-
Target
c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe
-
Size
952KB
-
MD5
88da2110432e89c73ed202c4adbec720
-
SHA1
e9059a8ba711fe7475bc0de9efe75f758ce6e5e5
-
SHA256
c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717
-
SHA512
9e4b32ac7c8bde6cf301a7194a91611d7c9fab5ff4d9f4e6ffce88725383452ef7e3336bf4485550f41433068c651f439b0b931e4366f120d8edef0bb1c7a38a
-
SSDEEP
24576:W+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:x8/KfRTK
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\dhcpcore\\smss.exe\"" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\dhcpcore\\smss.exe\", \"C:\\Windows\\System32\\mfc42\\smss.exe\"" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\dhcpcore\\smss.exe\", \"C:\\Windows\\System32\\mfc42\\smss.exe\", \"C:\\Windows\\System32\\url\\wininit.exe\"" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\dhcpcore\\smss.exe\", \"C:\\Windows\\System32\\mfc42\\smss.exe\", \"C:\\Windows\\System32\\url\\wininit.exe\", \"C:\\Program Files\\Common Files\\Microsoft Shared\\OfficeSoftwareProtectionPlatform\\OSPPC\\OSPPSVC.exe\"" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe -
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2868 2768 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3036 2768 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 2768 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2908 2768 schtasks.exe 30 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe -
resource yara_rule behavioral1/memory/2148-1-0x0000000000320000-0x0000000000414000-memory.dmp dcrat behavioral1/files/0x00060000000191d4-23.dat dcrat behavioral1/memory/2448-81-0x0000000000380000-0x0000000000474000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2448 smss.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files\\Common Files\\Microsoft Shared\\OfficeSoftwareProtectionPlatform\\OSPPC\\OSPPSVC.exe\"" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files\\Common Files\\Microsoft Shared\\OfficeSoftwareProtectionPlatform\\OSPPC\\OSPPSVC.exe\"" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\System32\\dhcpcore\\smss.exe\"" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\System32\\dhcpcore\\smss.exe\"" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\System32\\mfc42\\smss.exe\"" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\System32\\mfc42\\smss.exe\"" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\System32\\url\\wininit.exe\"" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\System32\\url\\wininit.exe\"" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File created C:\Windows\System32\url\560854153607923c4c5f107085a7db67be01f252 c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File opened for modification C:\Windows\System32\dhcpcore\RCXBB17.tmp c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File opened for modification C:\Windows\System32\mfc42\RCXBD89.tmp c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File opened for modification C:\Windows\System32\url\RCXBF8F.tmp c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File opened for modification C:\Windows\System32\url\wininit.exe c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File created C:\Windows\System32\dhcpcore\69ddcba757bf72f7d36c464c71f42baab150b2b9 c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File created C:\Windows\System32\mfc42\69ddcba757bf72f7d36c464c71f42baab150b2b9 c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File created C:\Windows\System32\dhcpcore\smss.exe c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File created C:\Windows\System32\url\wininit.exe c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File opened for modification C:\Windows\System32\mfc42\smss.exe c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File opened for modification C:\Windows\System32\url\RCXBF8E.tmp c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File opened for modification C:\Windows\System32\dhcpcore\smss.exe c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File created C:\Windows\System32\mfc42\smss.exe c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File opened for modification C:\Windows\System32\dhcpcore\RCXBB18.tmp c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File opened for modification C:\Windows\System32\mfc42\RCXBD8A.tmp c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPC\OSPPSVC.exe c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File created C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPC\1610b97d3ab4a74cd8ae104b51bea7bfcc5b9c6f c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPC\RCXC193.tmp c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPC\RCXC194.tmp c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPC\OSPPSVC.exe c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2868 schtasks.exe 3036 schtasks.exe 2860 schtasks.exe 2908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2148 c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2148 c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Token: SeDebugPrivilege 2448 smss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2712 2148 c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe 35 PID 2148 wrote to memory of 2712 2148 c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe 35 PID 2148 wrote to memory of 2712 2148 c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe 35 PID 2712 wrote to memory of 1496 2712 cmd.exe 37 PID 2712 wrote to memory of 1496 2712 cmd.exe 37 PID 2712 wrote to memory of 1496 2712 cmd.exe 37 PID 2712 wrote to memory of 2448 2712 cmd.exe 39 PID 2712 wrote to memory of 2448 2712 cmd.exe 39 PID 2712 wrote to memory of 2448 2712 cmd.exe 39 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe"C:\Users\Admin\AppData\Local\Temp\c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2148 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BILX3c7L9X.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1496
-
-
C:\Windows\System32\mfc42\smss.exe"C:\Windows\System32\mfc42\smss.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2448
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\dhcpcore\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\mfc42\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\url\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPC\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2908
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198B
MD5ab11f921de06eba5b34781bb433d290f
SHA105fa5deed4b46284b378814c2daac249f4c2c6f1
SHA256b282c97be98fab5febd09ebc68de0b928e7c6653c3ca2e193b759702925dc1c3
SHA512d6533136028ae698ef8e9a4d744269ce8b0ae2c0eced3dc3ab4b360eae2a8efd020e386a52cbb322a116a58125fa5b9718455c95c0a4445df44d874691ad4dff
-
Filesize
952KB
MD588da2110432e89c73ed202c4adbec720
SHA1e9059a8ba711fe7475bc0de9efe75f758ce6e5e5
SHA256c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717
SHA5129e4b32ac7c8bde6cf301a7194a91611d7c9fab5ff4d9f4e6ffce88725383452ef7e3336bf4485550f41433068c651f439b0b931e4366f120d8edef0bb1c7a38a