Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-12-2024 01:58

General

  • Target

    de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe

  • Size

    1.7MB

  • MD5

    ff3f337ba133257bf7ef80c83af6a374

  • SHA1

    6c1746e5455bba5c362db11bf5aef0adaaea6337

  • SHA256

    de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde

  • SHA512

    f245180c0edbcd0836abc01e6660a95d698056109151e1451b8ce17c128aea1456c5cb3b23439645ef9dcc155a11801ee0d3ac6e334b66db191da98bb404a053

  • SSDEEP

    24576:LKoAZDIza+c3NunPWpnVuO2PJftX9fRQY16zIWJC5JUqR8lLr0I4gyid81sRO/F:LKdluO2P3N5QkWtlLr0ICNyO

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe
    "C:\Users\Admin\AppData\Local\Temp\de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zLDjSmWfXd.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:356
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          3⤵
            PID:1304
          • C:\Windows\ModemLogs\lsm.exe
            "C:\Windows\ModemLogs\lsm.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:376
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GMPvjC3Nss.bat"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2240
              • C:\Windows\system32\chcp.com
                chcp 65001
                5⤵
                  PID:688
                • C:\Windows\system32\w32tm.exe
                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                  5⤵
                    PID:2328
                  • C:\Windows\ModemLogs\lsm.exe
                    "C:\Windows\ModemLogs\lsm.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3044
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\sppsvc.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2628
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2920
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2604
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\Windows\ModemLogs\lsm.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2664
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\ModemLogs\lsm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2068
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Windows\ModemLogs\lsm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2232
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cded" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Downloads\de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1240
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde" /sc ONLOGON /tr "'C:\Users\Public\Downloads\de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2124
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cded" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Downloads\de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2060
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\lsass.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1144
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\lsass.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:848
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\lsass.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1396
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\services.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2836
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Default User\services.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2948
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\services.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2008
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cded" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\AppData\Local\Temp\de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2132
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1268
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cded" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\AppData\Local\Temp\de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2972

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\sppsvc.exe

            Filesize

            1.7MB

            MD5

            ff3f337ba133257bf7ef80c83af6a374

            SHA1

            6c1746e5455bba5c362db11bf5aef0adaaea6337

            SHA256

            de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde

            SHA512

            f245180c0edbcd0836abc01e6660a95d698056109151e1451b8ce17c128aea1456c5cb3b23439645ef9dcc155a11801ee0d3ac6e334b66db191da98bb404a053

          • C:\Users\Admin\AppData\Local\Temp\GMPvjC3Nss.bat

            Filesize

            204B

            MD5

            f22f8ec3fad43f6ca7285f8fe4061359

            SHA1

            eba98e6863050d9cb598403c43d65b49091451ac

            SHA256

            8b6ec91392a4dcc45894baca95526993859f36d1af68a7200d36fbb6dede521c

            SHA512

            b3e13aefab2f48c5676a517ff5ad642d0a95ed1af3cff3ebae63fb88cfbbec05f0c7b570a7ea7d2d82a5549e9cb564639f6143117a80959649359a49e0bcaf67

          • C:\Users\Admin\AppData\Local\Temp\zLDjSmWfXd.bat

            Filesize

            204B

            MD5

            b546d55c16c131eb9661228fbe5bc03b

            SHA1

            2fc1ae4f4811162c35bb266de4c7f81e1bbd6440

            SHA256

            710547480742521b6bb2bda3ecb362903c6dd0fbb5184c7e09ef53e6d50a25fd

            SHA512

            c05e12d2f860b7887a63c9dc26b3d435d0430f9ee6072a37abc832981e8825cd5a6e2c7258601b885648cf66561d8c1152c769b5a8aa230b15afdc7e469f31b3

          • memory/376-34-0x0000000000EB0000-0x0000000001070000-memory.dmp

            Filesize

            1.8MB

          • memory/1672-4-0x000007FEF5880000-0x000007FEF626C000-memory.dmp

            Filesize

            9.9MB

          • memory/1672-18-0x000007FEF5880000-0x000007FEF626C000-memory.dmp

            Filesize

            9.9MB

          • memory/1672-7-0x000007FEF5880000-0x000007FEF626C000-memory.dmp

            Filesize

            9.9MB

          • memory/1672-9-0x0000000000690000-0x00000000006A8000-memory.dmp

            Filesize

            96KB

          • memory/1672-13-0x000007FEF5880000-0x000007FEF626C000-memory.dmp

            Filesize

            9.9MB

          • memory/1672-12-0x000007FEF5880000-0x000007FEF626C000-memory.dmp

            Filesize

            9.9MB

          • memory/1672-11-0x00000000005E0000-0x00000000005EC000-memory.dmp

            Filesize

            48KB

          • memory/1672-6-0x00000000005D0000-0x00000000005DE000-memory.dmp

            Filesize

            56KB

          • memory/1672-0-0x000007FEF5883000-0x000007FEF5884000-memory.dmp

            Filesize

            4KB

          • memory/1672-3-0x000007FEF5880000-0x000007FEF626C000-memory.dmp

            Filesize

            9.9MB

          • memory/1672-31-0x000007FEF5880000-0x000007FEF626C000-memory.dmp

            Filesize

            9.9MB

          • memory/1672-2-0x000007FEF5880000-0x000007FEF626C000-memory.dmp

            Filesize

            9.9MB

          • memory/1672-1-0x00000000003C0000-0x0000000000580000-memory.dmp

            Filesize

            1.8MB

          • memory/3044-45-0x0000000001100000-0x00000000012C0000-memory.dmp

            Filesize

            1.8MB