Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2024 15:22

General

  • Target

    9040D1F68050A9B2533AC7E8B59C2AA0.exe

  • Size

    3.4MB

  • MD5

    9040d1f68050a9b2533ac7e8b59c2aa0

  • SHA1

    1b38a5284d4510423c0c4ac77066fc6eb41b9286

  • SHA256

    7eb02adb15e19f6a197a641d054d24d133f6d0880afbb8ff53a6629cbc666b67

  • SHA512

    e2121c2d4156af7968d3e608affc33519933a9e8c3ae6b2ad49af059e3b6cca12b1e3f36bc0283df2ae9645c199192d45f6b1e8053af6adf08724d11791a1f39

  • SSDEEP

    49152:s3GMesEktOcTPuKyI1qd5i6JTnl9gs6ToWbepfutWiNFg20+5J3pS8Dzy:nuEktPuu1qbhwDoWHgt+5JZS8fy

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 12 IoCs
  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • System policy modification 1 TTPs 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9040D1F68050A9B2533AC7E8B59C2AA0.exe
    "C:\Users\Admin\AppData\Local\Temp\9040D1F68050A9B2533AC7E8B59C2AA0.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2032
    • C:\Recovery\WindowsRE\sppsvc.exe
      "C:\Recovery\WindowsRE\sppsvc.exe"
      2⤵
      • UAC bypass
      • Checks computer location settings
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2928
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\829dca6d-7255-49f8-978a-4372ec2903e1.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4668
        • C:\Recovery\WindowsRE\sppsvc.exe
          C:\Recovery\WindowsRE\sppsvc.exe
          4⤵
          • UAC bypass
          • Checks computer location settings
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:640
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d6f9e9c7-6b61-4336-9fb5-b48cbd705e8f.vbs"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4216
            • C:\Recovery\WindowsRE\sppsvc.exe
              C:\Recovery\WindowsRE\sppsvc.exe
              6⤵
              • UAC bypass
              • Checks computer location settings
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:4328
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\446a2f52-1f5b-44ef-bb5e-c66e127184ef.vbs"
                7⤵
                  PID:2732
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\138114d1-5883-444e-bfd7-7a155bc99107.vbs"
                  7⤵
                    PID:4460
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3a99e94e-6016-429a-86df-c04d869b1cf9.vbs"
                5⤵
                  PID:1360
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c75b315d-7adf-4152-85bc-bac1fccac50d.vbs"
              3⤵
                PID:5048
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:5092
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3680
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:224
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3120
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3956
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2088
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Program Files\WindowsPowerShell\smss.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1348
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\smss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2428
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Program Files\WindowsPowerShell\smss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:928
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 14 /tr "'C:\Windows\Performance\WinSAT\taskhostw.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4556
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\Performance\WinSAT\taskhostw.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4976
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Windows\Performance\WinSAT\taskhostw.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4656
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Windows\it-IT\upfc.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2216
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Windows\it-IT\upfc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4836
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 14 /tr "'C:\Windows\it-IT\upfc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4160
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4132
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1872
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4904

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\sppsvc.exe.log

            Filesize

            1KB

            MD5

            49b64127208271d8f797256057d0b006

            SHA1

            b99bd7e2b4e9ed24de47fb3341ea67660b84cca1

            SHA256

            2a5d403a2e649d8eceef8f785eeb0f6d33888ec6bbf251b3c347e34cb32b1e77

            SHA512

            f7c728923c893dc9bc88ad2159e0abcda41e1b40ff7e7756e6252d135ed238a2248a2662b3392449836dd1b0b580f0c866cc33e409527484fe4602e3d3f10e3e

          • C:\Users\Admin\AppData\Local\Temp\446a2f52-1f5b-44ef-bb5e-c66e127184ef.vbs

            Filesize

            708B

            MD5

            44bf2e5fc3cf71ff0aed241c08060442

            SHA1

            e93e1190e8310723142978832366bf81ed81fc4d

            SHA256

            376ec9733b5d46abcffcb8eca7661856ebfaca7e70a142e712c88c66118fe97a

            SHA512

            99cc5b9ce02caa9afb7b513cce6127e943f88c338507d6a72d68d08506b40a91ddbc83680ebaa1b28764ad8a620d2146a6f8a1392156a55fbd14d9b69a5daa79

          • C:\Users\Admin\AppData\Local\Temp\829dca6d-7255-49f8-978a-4372ec2903e1.vbs

            Filesize

            708B

            MD5

            203a93534b0db7e645943d264b82f688

            SHA1

            a4cd5ed79475be45e8991fb1b3b30227f397808b

            SHA256

            237bba01a3603fd11eb28362ed7aeffc746f5f474c053f78301e554a788a87ad

            SHA512

            8e94c2513ff842f4d89086751f5d40e0ba3733bf8b32462f79facd152eb18df4e499e2861a5392629a448489b0e1269ed6625cb63019f5124816df3016418493

          • C:\Users\Admin\AppData\Local\Temp\c75b315d-7adf-4152-85bc-bac1fccac50d.vbs

            Filesize

            484B

            MD5

            e5526424978a05f0235403baf0449ac6

            SHA1

            fb1fc025400a932530b8b95769d8b365d5a893ca

            SHA256

            13277be9640155a8dc1b24ff5928c1f80157c3661e5b3340b2eddfb3e7ee5ddd

            SHA512

            e9143945c45c8ab506cb695e7573e12e00d2e3c61604f030b1ac5d7c4e7c3572348e2cc21f524e622d379299110a7bd55edc21ddd9c91f2134af002de97f3c5a

          • C:\Users\Admin\AppData\Local\Temp\d6f9e9c7-6b61-4336-9fb5-b48cbd705e8f.vbs

            Filesize

            707B

            MD5

            c79d014346c85b296621da533e546c65

            SHA1

            a6751a742144b5f4ba2cbf88997c4a4c628ee995

            SHA256

            e733a7197ec0c7c221df51424f12edd7e38cd98040bdae9f0e482d9e8baf0885

            SHA512

            0a521ec6285e58ea69bccb8e6b2f59b2becc206692fc7cc52c2ba39f0fe0cb9598622b6d42bd3bbc7bfa3336caf1817ddc708bfe350c71b43b026373881ce4b2

          • C:\Windows\it-IT\upfc.exe

            Filesize

            3.4MB

            MD5

            9040d1f68050a9b2533ac7e8b59c2aa0

            SHA1

            1b38a5284d4510423c0c4ac77066fc6eb41b9286

            SHA256

            7eb02adb15e19f6a197a641d054d24d133f6d0880afbb8ff53a6629cbc666b67

            SHA512

            e2121c2d4156af7968d3e608affc33519933a9e8c3ae6b2ad49af059e3b6cca12b1e3f36bc0283df2ae9645c199192d45f6b1e8053af6adf08724d11791a1f39

          • memory/640-77-0x000000001B800000-0x000000001B812000-memory.dmp

            Filesize

            72KB

          • memory/2032-23-0x000000001BFD0000-0x000000001C4F8000-memory.dmp

            Filesize

            5.2MB

          • memory/2032-34-0x000000001BD30000-0x000000001BD3E000-memory.dmp

            Filesize

            56KB

          • memory/2032-10-0x000000001B1F0000-0x000000001B206000-memory.dmp

            Filesize

            88KB

          • memory/2032-12-0x000000001B220000-0x000000001B232000-memory.dmp

            Filesize

            72KB

          • memory/2032-9-0x000000001B1E0000-0x000000001B1F0000-memory.dmp

            Filesize

            64KB

          • memory/2032-8-0x00000000027D0000-0x00000000027D8000-memory.dmp

            Filesize

            32KB

          • memory/2032-13-0x000000001B3B0000-0x000000001B3BC000-memory.dmp

            Filesize

            48KB

          • memory/2032-14-0x000000001B280000-0x000000001B288000-memory.dmp

            Filesize

            32KB

          • memory/2032-15-0x000000001B290000-0x000000001B2A0000-memory.dmp

            Filesize

            64KB

          • memory/2032-16-0x000000001B3C0000-0x000000001B3CA000-memory.dmp

            Filesize

            40KB

          • memory/2032-17-0x000000001B3D0000-0x000000001B426000-memory.dmp

            Filesize

            344KB

          • memory/2032-18-0x000000001B420000-0x000000001B42C000-memory.dmp

            Filesize

            48KB

          • memory/2032-19-0x000000001B430000-0x000000001B438000-memory.dmp

            Filesize

            32KB

          • memory/2032-20-0x000000001B440000-0x000000001B44C000-memory.dmp

            Filesize

            48KB

          • memory/2032-22-0x000000001B460000-0x000000001B472000-memory.dmp

            Filesize

            72KB

          • memory/2032-21-0x000000001B450000-0x000000001B458000-memory.dmp

            Filesize

            32KB

          • memory/2032-24-0x000000001BAA0000-0x000000001BAAC000-memory.dmp

            Filesize

            48KB

          • memory/2032-0-0x00007FF8739D3000-0x00007FF8739D5000-memory.dmp

            Filesize

            8KB

          • memory/2032-25-0x000000001BAB0000-0x000000001BABC000-memory.dmp

            Filesize

            48KB

          • memory/2032-26-0x000000001BAC0000-0x000000001BAC8000-memory.dmp

            Filesize

            32KB

          • memory/2032-27-0x000000001BAD0000-0x000000001BADC000-memory.dmp

            Filesize

            48KB

          • memory/2032-11-0x000000001B210000-0x000000001B218000-memory.dmp

            Filesize

            32KB

          • memory/2032-37-0x000000001BD70000-0x000000001BD78000-memory.dmp

            Filesize

            32KB

          • memory/2032-38-0x000000001BE80000-0x000000001BE8A000-memory.dmp

            Filesize

            40KB

          • memory/2032-39-0x000000001BD80000-0x000000001BD8C000-memory.dmp

            Filesize

            48KB

          • memory/2032-36-0x000000001BD50000-0x000000001BD5C000-memory.dmp

            Filesize

            48KB

          • memory/2032-35-0x000000001BD40000-0x000000001BD48000-memory.dmp

            Filesize

            32KB

          • memory/2032-33-0x000000001BD20000-0x000000001BD28000-memory.dmp

            Filesize

            32KB

          • memory/2032-32-0x000000001BD10000-0x000000001BD1E000-memory.dmp

            Filesize

            56KB

          • memory/2032-31-0x000000001BD00000-0x000000001BD0A000-memory.dmp

            Filesize

            40KB

          • memory/2032-30-0x000000001BCF0000-0x000000001BCFC000-memory.dmp

            Filesize

            48KB

          • memory/2032-29-0x000000001BD60000-0x000000001BD68000-memory.dmp

            Filesize

            32KB

          • memory/2032-28-0x000000001BAE0000-0x000000001BAEC000-memory.dmp

            Filesize

            48KB

          • memory/2032-7-0x000000001B230000-0x000000001B280000-memory.dmp

            Filesize

            320KB

          • memory/2032-63-0x00007FF8739D0000-0x00007FF874491000-memory.dmp

            Filesize

            10.8MB

          • memory/2032-1-0x0000000000220000-0x000000000058A000-memory.dmp

            Filesize

            3.4MB

          • memory/2032-6-0x000000001B1C0000-0x000000001B1DC000-memory.dmp

            Filesize

            112KB

          • memory/2032-5-0x00000000027C0000-0x00000000027C8000-memory.dmp

            Filesize

            32KB

          • memory/2032-4-0x00000000026A0000-0x00000000026AE000-memory.dmp

            Filesize

            56KB

          • memory/2032-3-0x0000000002690000-0x000000000269E000-memory.dmp

            Filesize

            56KB

          • memory/2032-2-0x00007FF8739D0000-0x00007FF874491000-memory.dmp

            Filesize

            10.8MB

          • memory/2928-64-0x000000001B380000-0x000000001B392000-memory.dmp

            Filesize

            72KB