Analysis

  • max time kernel
    109s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2024 01:58

General

  • Target

    de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe

  • Size

    1.7MB

  • MD5

    ff3f337ba133257bf7ef80c83af6a374

  • SHA1

    6c1746e5455bba5c362db11bf5aef0adaaea6337

  • SHA256

    de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde

  • SHA512

    f245180c0edbcd0836abc01e6660a95d698056109151e1451b8ce17c128aea1456c5cb3b23439645ef9dcc155a11801ee0d3ac6e334b66db191da98bb404a053

  • SSDEEP

    24576:LKoAZDIza+c3NunPWpnVuO2PJftX9fRQY16zIWJC5JUqR8lLr0I4gyid81sRO/F:LKdluO2P3N5QkWtlLr0ICNyO

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe
    "C:\Users\Admin\AppData\Local\Temp\de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Yc6KZMROav.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5108
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:4628
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          3⤵
            PID:4892
          • C:\Windows\twain_32\smss.exe
            "C:\Windows\twain_32\smss.exe"
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2576
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\gtOlnDcdUa.bat"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1676
              • C:\Windows\system32\chcp.com
                chcp 65001
                5⤵
                  PID:1776
                • C:\Windows\system32\w32tm.exe
                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                  5⤵
                    PID:1808
                  • C:\Windows\twain_32\smss.exe
                    "C:\Windows\twain_32\smss.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1476
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 11 /tr "'C:\Windows\GameBarPresenceWriter\sihost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4336
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\GameBarPresenceWriter\sihost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1388
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 14 /tr "'C:\Windows\GameBarPresenceWriter\sihost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1760
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 5 /tr "'C:\Program Files\Internet Explorer\fr-FR\upfc.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1996
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\fr-FR\upfc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3088
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\Program Files\Internet Explorer\fr-FR\upfc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:684
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Windows\twain_32\smss.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4584
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\twain_32\smss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:5084
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Windows\twain_32\smss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1632
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1960
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1488
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3880
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office\explorer.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:704
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\explorer.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:864
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files\Microsoft Office\explorer.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1004
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cded" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\AppData\Local\Temp\de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4868
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:5088
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cded" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\AppData\Local\Temp\de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2284

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\smss.exe.log

            Filesize

            1KB

            MD5

            11aa02596ceccef38b448c52a899f470

            SHA1

            6da94dc9579e969d39d5e65c066af3a5251e39b4

            SHA256

            e778ec777a79a1a9c9a3b605ab9681558395d2f3ef46f6c34dca1e00dcd771fd

            SHA512

            5de4fd51ae76cce8de25c5257ee873a71668acdf407bc3351410f9f840a9b074099d4c018657d2cc8f33273e6fd03e4365165e4834ba12c052d735212bf5d0d3

          • C:\Users\Admin\AppData\Local\Temp\Yc6KZMROav.bat

            Filesize

            204B

            MD5

            de140a5629108ab199990e0b12dd8994

            SHA1

            85c9d6621e830161bb7d6bcc79f3056904bb2d12

            SHA256

            e0bd2f37291e982b3e5dc68ed7fbf19cb5ff49a439b85f115013e7e73a846ee5

            SHA512

            0134c138dc6d6fc9e31e0180b91281306fa777183786eaa4c5c8532c526eb0d5c2dfb7a98a90c31b89d072d1c0d22df99c74748d7738454702df3291f218c6ce

          • C:\Users\Admin\AppData\Local\Temp\gtOlnDcdUa.bat

            Filesize

            204B

            MD5

            6d6e92d4d69c1083f5efd9dbe256f8ae

            SHA1

            129166b09723ed3da1b6494192d178f3afb0605c

            SHA256

            da8db15fc25e6fb0dfbf6fe50ee62883e2aeb526e3a5a6110b90b527556358c6

            SHA512

            2dfbd21536ace98ff8e8804222b18ce49e47657c9304b86081b0d3b038b7890e062dcecf679ae8bb517b773d9534639a1234513a7055132b653d0e9b621a259e

          • C:\Windows\GameBarPresenceWriter\sihost.exe

            Filesize

            1.7MB

            MD5

            ff3f337ba133257bf7ef80c83af6a374

            SHA1

            6c1746e5455bba5c362db11bf5aef0adaaea6337

            SHA256

            de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde

            SHA512

            f245180c0edbcd0836abc01e6660a95d698056109151e1451b8ce17c128aea1456c5cb3b23439645ef9dcc155a11801ee0d3ac6e334b66db191da98bb404a053

          • memory/2808-8-0x00007FFEF09F0000-0x00007FFEF14B1000-memory.dmp

            Filesize

            10.8MB

          • memory/2808-4-0x00007FFEF09F0000-0x00007FFEF14B1000-memory.dmp

            Filesize

            10.8MB

          • memory/2808-7-0x00007FFEF09F0000-0x00007FFEF14B1000-memory.dmp

            Filesize

            10.8MB

          • memory/2808-10-0x000000001BCF0000-0x000000001BD08000-memory.dmp

            Filesize

            96KB

          • memory/2808-0-0x00007FFEF09F3000-0x00007FFEF09F5000-memory.dmp

            Filesize

            8KB

          • memory/2808-12-0x0000000003290000-0x000000000329C000-memory.dmp

            Filesize

            48KB

          • memory/2808-13-0x00007FFEF09F0000-0x00007FFEF14B1000-memory.dmp

            Filesize

            10.8MB

          • memory/2808-6-0x0000000001890000-0x000000000189E000-memory.dmp

            Filesize

            56KB

          • memory/2808-21-0x00007FFEF09F0000-0x00007FFEF14B1000-memory.dmp

            Filesize

            10.8MB

          • memory/2808-26-0x00007FFEF09F0000-0x00007FFEF14B1000-memory.dmp

            Filesize

            10.8MB

          • memory/2808-27-0x00007FFEF09F0000-0x00007FFEF14B1000-memory.dmp

            Filesize

            10.8MB

          • memory/2808-3-0x00007FFEF09F0000-0x00007FFEF14B1000-memory.dmp

            Filesize

            10.8MB

          • memory/2808-34-0x00007FFEF09F0000-0x00007FFEF14B1000-memory.dmp

            Filesize

            10.8MB

          • memory/2808-2-0x00007FFEF09F0000-0x00007FFEF14B1000-memory.dmp

            Filesize

            10.8MB

          • memory/2808-1-0x0000000000F00000-0x00000000010C0000-memory.dmp

            Filesize

            1.8MB