Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2024 18:55

General

  • Target

    FATALITY/loader.exe

  • Size

    3.2MB

  • MD5

    2307ca04c2633d28345fb0580c77c2ec

  • SHA1

    edbd1f092ed03cb2674877aba6e874722ee07814

  • SHA256

    168637ea64d64afefd1f88b91ffecb74715ccb6a98acf73d4a16175511628276

  • SHA512

    c2646c5bf3dcd6ef4679af80ae6424c1f88e3f29a40beff729b59bebd8fd3d9b0d45392d2e11f4e1b69ada0f4ec20cfc45430d184cdf0238f2845b7deaff7e9b

  • SSDEEP

    98304:ups+iZyomWShz+6WumEq5GGxLnIlP2NgQKGfxx:ndZOhNWumEqxLIB21K6H

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\FATALITY\loader.exe
    "C:\Users\Admin\AppData\Local\Temp\FATALITY\loader.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3948
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\ServerWinRuntimeBroker\OAKCwEsKnudXsAgphVRYMDBaoP2ZIjCO6J5QYyd0q81GMNjCqOkwlC1.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\ServerWinRuntimeBroker\wJc3A8cK4hSMmtCgCMOA49.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2176
        • C:\ServerWinRuntimeBroker\chainPorthostCommon.exe
          "C:\ServerWinRuntimeBroker/chainPorthostCommon.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2012
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fju4ku5b\fju4ku5b.cmdline"
            5⤵
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:4544
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA3F1.tmp" "c:\Windows\System32\CSC392B862D76E84A3EBC708FAC6AC2550.TMP"
              6⤵
                PID:4360
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BASt1yHq1g.bat"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:980
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:3756
                • C:\Windows\system32\w32tm.exe
                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                  6⤵
                    PID:3428
                  • C:\Windows\SysWOW64\sr-Latn-RS\Registry.exe
                    "C:\Windows\SysWOW64\sr-Latn-RS\Registry.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3564
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\dllhost.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1568
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\dllhost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4196
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\dllhost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3212
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Libraries\StartMenuExperienceHost.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1204
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\Public\Libraries\StartMenuExperienceHost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:744
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Libraries\StartMenuExperienceHost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2576
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\services.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4076
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1436
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1692
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 8 /tr "'C:\Windows\SysWOW64\sr-Latn-RS\Registry.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4884
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Windows\SysWOW64\sr-Latn-RS\Registry.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2188
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 13 /tr "'C:\Windows\SysWOW64\sr-Latn-RS\Registry.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1236
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\upfc.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:456
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\upfc.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3704
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\upfc.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1524
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "chainPorthostCommonc" /sc MINUTE /mo 11 /tr "'C:\ServerWinRuntimeBroker\chainPorthostCommon.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4124
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "chainPorthostCommon" /sc ONLOGON /tr "'C:\ServerWinRuntimeBroker\chainPorthostCommon.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4796
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "chainPorthostCommonc" /sc MINUTE /mo 9 /tr "'C:\ServerWinRuntimeBroker\chainPorthostCommon.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1968

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ServerWinRuntimeBroker\OAKCwEsKnudXsAgphVRYMDBaoP2ZIjCO6J5QYyd0q81GMNjCqOkwlC1.vbe

          Filesize

          223B

          MD5

          3569aec6289503482c7877ad3f205301

          SHA1

          cf016699d614c9f2e9a899c646cd24aca6b75fcf

          SHA256

          a2bb38c2d2eafac2d73af9247252de8cfac9a4f9522b4f66ad73d9a003fc7754

          SHA512

          d8df28cd229e31eb97a705d02aac38f836b5b05741bdb7c97f4a8d9d3eec183a3883e39b30c2141e9c8b650c98edfb51a8cb7fce1c87d67b15bd9dc52a1b1ef5

        • C:\ServerWinRuntimeBroker\chainPorthostCommon.exe

          Filesize

          1.9MB

          MD5

          cf5b49706562ba2047cda4a451dd573a

          SHA1

          d7d66016b5ea4215581f208c7972b2ff49cbeed1

          SHA256

          74547e5b862bd3691947b78eabbdab88c468e26144bd03911be68941376dc89b

          SHA512

          0dc54fc8afe4a1b8ce0d72e215cf617dbc657f4e02cabe7be694b0d20be385f63848e49717bd4856547dbb52f8a762e54c63323b53188cc1d8127c54b6a10f1e

        • C:\ServerWinRuntimeBroker\wJc3A8cK4hSMmtCgCMOA49.bat

          Filesize

          96B

          MD5

          ca78c31c7fad40ca729ce40659dd91fa

          SHA1

          b649a3669cffe53122ad50f62f769faa45b96a92

          SHA256

          88b4be83a053855858771fda50d7f6fe0cd5f5fd0cd33b3299c28aab5eb40e2b

          SHA512

          b606a335ac5f28030e60a00f99e519240bc3d47d7d88e84eb8de1f34ef19ae6df56f01f5f6d83fa215f445732596f0865d630675706626545b15e0c64b0a21ec

        • C:\Users\Admin\AppData\Local\Temp\BASt1yHq1g.bat

          Filesize

          219B

          MD5

          fb7e7536e5f20986f513d5c810d178b4

          SHA1

          0c888d1b860f7c66a6ba7e7524e34e5cdfa8dec1

          SHA256

          004414074266e2225a01a2fcb190c54e01c9c224e0dcdcf7ba2333d498932b3b

          SHA512

          ba7c171b3ccf8ff21b6c66826a4d213d7c7ab6663854a017c8968dc1e2020c34effbf86ba81d09cc0fd4a524a2f78c4a4fab53e651036cbc44cae97559457590

        • C:\Users\Admin\AppData\Local\Temp\RESA3F1.tmp

          Filesize

          1KB

          MD5

          001c2475bfa3d04f6257ddbe0d9a6d7c

          SHA1

          1f170c7d068b10a7d9fe2523c3fe00ef4dd2c1b5

          SHA256

          0dee3d4be745c7356f558453e77e255c980dd7e39e3d385cd1ba9f7e393ab13f

          SHA512

          34b0743eef9a572e6ac8f9210966a4993931e020c3a486edc861479e38dbd53b432cb439802ed40c1fb2b6c0f91ab45abcb2818404a37a244dcd5d2d9c3a63c3

        • \??\c:\Users\Admin\AppData\Local\Temp\fju4ku5b\fju4ku5b.0.cs

          Filesize

          397B

          MD5

          b0c44acbd1c843e6cde8e6f32354f648

          SHA1

          3043a3e67fb35501ef40924126efdb50e38241e8

          SHA256

          79d1e37c3a99faec272741e89fc07296dce2c48889de926e9f6f8713843d189e

          SHA512

          892db59892c305e125aebb87bb74497cd23f1d09fc970b544051de932a3e326ef9e94346561e1cae60496bbb0d83472e849d2256de4edac7779d8405bee57d8b

        • \??\c:\Users\Admin\AppData\Local\Temp\fju4ku5b\fju4ku5b.cmdline

          Filesize

          235B

          MD5

          2d6a9d69214b7b592112da5be2387d76

          SHA1

          fb71ab84b726bef4325e1cc2e996d5def3c5b685

          SHA256

          38e89d299ac0c410e640fce175ba323caa89811e748a9d2bd75216fcfca10c80

          SHA512

          478e227c8e4efcedb2f6d513ab7f12d184a9e39c33bdb75c4c5834a9421669b65aa160d70644d18731fb6c1960ca3ea6549df79df70b3d296dca86a20afebd4e

        • \??\c:\Windows\System32\CSC392B862D76E84A3EBC708FAC6AC2550.TMP

          Filesize

          1KB

          MD5

          634e281a00b7b9f516c3048badfa1530

          SHA1

          af6369715ce2fe9b99609e470d4f66698880a35a

          SHA256

          0d990336ae793f3f6903048004c8d707d7a7191927bd7df46b7fe887116506c8

          SHA512

          1cb35fa0759f5362c9c7eee5546710874121005a3924bcfec2cf33ac90a257a807ce7ec0db7bc84dcb327604d708009449c34f52560ed936b54eeba49be7d27b

        • memory/2012-14-0x00007FFFFBCA3000-0x00007FFFFBCA5000-memory.dmp

          Filesize

          8KB

        • memory/2012-20-0x0000000002F40000-0x0000000002F90000-memory.dmp

          Filesize

          320KB

        • memory/2012-22-0x0000000002EF0000-0x0000000002F08000-memory.dmp

          Filesize

          96KB

        • memory/2012-24-0x0000000001550000-0x000000000155E000-memory.dmp

          Filesize

          56KB

        • memory/2012-26-0x0000000002D90000-0x0000000002D9C000-memory.dmp

          Filesize

          48KB

        • memory/2012-19-0x0000000002ED0000-0x0000000002EEC000-memory.dmp

          Filesize

          112KB

        • memory/2012-17-0x0000000001540000-0x000000000154E000-memory.dmp

          Filesize

          56KB

        • memory/2012-15-0x0000000000A80000-0x0000000000C66000-memory.dmp

          Filesize

          1.9MB

        • memory/2012-55-0x000000001B880000-0x000000001B94D000-memory.dmp

          Filesize

          820KB

        • memory/3564-66-0x000000001AE60000-0x000000001AE68000-memory.dmp

          Filesize

          32KB

        • memory/3564-65-0x000000001B480000-0x000000001B54D000-memory.dmp

          Filesize

          820KB

        • memory/3948-0-0x00000000007A0000-0x0000000000B95000-memory.dmp

          Filesize

          4.0MB

        • memory/3948-8-0x00000000007A0000-0x0000000000B95000-memory.dmp

          Filesize

          4.0MB