Analysis
-
max time kernel
121s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 17:56
Static task
static1
Behavioral task
behavioral1
Sample
a6429d9778a93254c7387cf588619a2635ed97108558a122de885aad25a57eb7.exe
Resource
win7-20240903-en
General
-
Target
a6429d9778a93254c7387cf588619a2635ed97108558a122de885aad25a57eb7.exe
-
Size
2.1MB
-
MD5
6261ec3f13e1cc6ae25ee8942db137b0
-
SHA1
20629ed3f752869dc4980827291bf3064333405f
-
SHA256
a6429d9778a93254c7387cf588619a2635ed97108558a122de885aad25a57eb7
-
SHA512
ed292a77db5e9926cbaa247e449a4019776b2452d2e8cdadfcea4c3d7551372793b2a1125b44cfd5106d2b03ff178041d413750ee81bfc42d7a3252a934b51f1
-
SSDEEP
24576:2TbBv5rUyXVpz/IPMofzXxgF5X1u1seTK44vmrUcSgjBYsRX8TGxj4fY3D5K7Tqb:IBJp0PbsCk44v0y4BYgAGxrNKvdVT6
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1924 2848 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2492 2848 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 2848 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2668 2848 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2340 2848 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2276 2848 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 640 2848 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2936 2848 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 380 2848 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2924 2848 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 2848 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2916 2848 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2900 2848 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1688 2848 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 764 2848 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1828 2848 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 956 2848 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1152 2848 schtasks.exe 34 -
Executes dropped EXE 2 IoCs
pid Process 2436 Winver.exe 416 conhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2800 cmd.exe 2800 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\conhost.exe Winver.exe File created C:\Program Files\Microsoft Office\088424020bedd6 Winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6429d9778a93254c7387cf588619a2635ed97108558a122de885aad25a57eb7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1520 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1520 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2276 schtasks.exe 380 schtasks.exe 956 schtasks.exe 2340 schtasks.exe 640 schtasks.exe 2936 schtasks.exe 1152 schtasks.exe 2492 schtasks.exe 2616 schtasks.exe 2604 schtasks.exe 1688 schtasks.exe 764 schtasks.exe 1828 schtasks.exe 1924 schtasks.exe 2668 schtasks.exe 2924 schtasks.exe 2916 schtasks.exe 2900 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 2436 Winver.exe 416 conhost.exe 416 conhost.exe 416 conhost.exe 416 conhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2436 Winver.exe Token: SeDebugPrivilege 416 conhost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 632 wrote to memory of 3056 632 a6429d9778a93254c7387cf588619a2635ed97108558a122de885aad25a57eb7.exe 30 PID 632 wrote to memory of 3056 632 a6429d9778a93254c7387cf588619a2635ed97108558a122de885aad25a57eb7.exe 30 PID 632 wrote to memory of 3056 632 a6429d9778a93254c7387cf588619a2635ed97108558a122de885aad25a57eb7.exe 30 PID 632 wrote to memory of 3056 632 a6429d9778a93254c7387cf588619a2635ed97108558a122de885aad25a57eb7.exe 30 PID 3056 wrote to memory of 2800 3056 WScript.exe 31 PID 3056 wrote to memory of 2800 3056 WScript.exe 31 PID 3056 wrote to memory of 2800 3056 WScript.exe 31 PID 3056 wrote to memory of 2800 3056 WScript.exe 31 PID 2800 wrote to memory of 2436 2800 cmd.exe 33 PID 2800 wrote to memory of 2436 2800 cmd.exe 33 PID 2800 wrote to memory of 2436 2800 cmd.exe 33 PID 2800 wrote to memory of 2436 2800 cmd.exe 33 PID 2436 wrote to memory of 2356 2436 Winver.exe 53 PID 2436 wrote to memory of 2356 2436 Winver.exe 53 PID 2436 wrote to memory of 2356 2436 Winver.exe 53 PID 2356 wrote to memory of 2152 2356 cmd.exe 55 PID 2356 wrote to memory of 2152 2356 cmd.exe 55 PID 2356 wrote to memory of 2152 2356 cmd.exe 55 PID 2356 wrote to memory of 1520 2356 cmd.exe 56 PID 2356 wrote to memory of 1520 2356 cmd.exe 56 PID 2356 wrote to memory of 1520 2356 cmd.exe 56 PID 2356 wrote to memory of 416 2356 cmd.exe 58 PID 2356 wrote to memory of 416 2356 cmd.exe 58 PID 2356 wrote to memory of 416 2356 cmd.exe 58 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6429d9778a93254c7387cf588619a2635ed97108558a122de885aad25a57eb7.exe"C:\Users\Admin\AppData\Local\Temp\a6429d9778a93254c7387cf588619a2635ed97108558a122de885aad25a57eb7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ESD\UST9UxLQoHNIIFaYLHo0xhIRlgCNcLzoLb106m2nL.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ESD\bQzfgHSGdt2kLcLlkun74cHPltHDXr5Sp886hMeTP.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\ESD\Winver.exe"C:\ESD/Winver.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\feWJanOxlf.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:2152
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1520
-
-
C:\Program Files\Microsoft Office\conhost.exe"C:\Program Files\Microsoft Office\conhost.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:416
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Microsoft Office\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Start Menu\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\All Users\Start Menu\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Start Menu\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WinverW" /sc MINUTE /mo 12 /tr "'C:\ESD\Winver.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Winver" /sc ONLOGON /tr "'C:\ESD\Winver.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WinverW" /sc MINUTE /mo 11 /tr "'C:\ESD\Winver.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1152
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222B
MD58decf43a92645d8ba4b81696c5e7b1ae
SHA1dcc9ca8b24e3adf7568eb0f6b7f5cd27f039faf6
SHA2566ad34bd4e803fad802052423aeab64f4c60dd3ee55a3167425b9640ae24bfea1
SHA51272e44773f484d2e69ebd41cc555d9a57c833b3930e1f3b0326c90882035e0dc5fb54e8d4ded22cf9f2d28fb502b37b133b7c1c9f9d89b8c21857b569c51ebc17
-
Filesize
57B
MD5d1a4f1e326e7dfca62327ea69446dc7c
SHA1253e264c90cbd15836d8c3a1eab3c26756d94047
SHA256ea091556a5dbab314a6029817a9db64f9b8adc7afb476bbbb11aec0c227f0de2
SHA5123d4624c169297b50329a4e13f3f559a7a1f02112f6482e45cfba747dad11c6e6642f1411cec5e92d7890f86fb38702f48c75fec4d24332d43484ad7b9dbf29c8
-
Filesize
173B
MD5aa9000e054a152d608346ea634a96da7
SHA1b70f6f200c71d8a852b011990d81cda6600d5945
SHA256d91567c2507993cc6fb5a8328a0fdfa99def6bb8c16baea6d457dc54dcbafed5
SHA512db45f55725a76a0875fc4ec54cec4d3f01d6c2182f091f11024d1eb086f3dca9e1dd5ebb90a30f9a7ca1945a3ba10821f5b420fdbed1264867aac1ea48b3779a
-
Filesize
1.8MB
MD5d9ce1032fee5365065a78bbff7267883
SHA14c7471b47d4151908dd204303421d7c64cf4c5c6
SHA25665d26e7c0b856832e88efefe5c2a9e767fb2a7345715bbd0a6e10f9ac2afb520
SHA5120455364fa91c07da6fecbfb3e3fdbbbcb909e3176b5b151e3653f8b8ebffc02e14fb3471245df479b83f90cd2e1142bcff82b80555cfb3df113696b2925d9435