Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 02:17
Behavioral task
behavioral1
Sample
1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe
Resource
win10v2004-20241007-en
General
-
Target
1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe
-
Size
828KB
-
MD5
0b59760b00daf4fc87ef9e87ba43682d
-
SHA1
8f441c65cc64c45792568d32042d5c3481821147
-
SHA256
1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e
-
SHA512
0b8f3a8ab1c7407455d9633f1bcac6174e4e31904ab8e41b204b0048c7bd28eb6abcc1cde5ddd785307081e45564d342d522a31f3a16cf798645129793145bbe
-
SSDEEP
12288:gR7Dy9/6x+hRJu+hxVv+0+QuP8AAKvELL/1SmIfR9YNpNHHQf2:wyt6x+BdG0+QsvELxSHzYlnJ
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1864 4260 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2912 4260 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 4260 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4476 4260 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4856 4260 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1520 4260 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4836 4260 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1116 4260 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2924 4260 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2964 4260 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1848 4260 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5000 4260 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 808 4260 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 640 4260 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2980 4260 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5012 4260 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4416 4260 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 560 4260 schtasks.exe 83 -
resource yara_rule behavioral2/memory/3732-1-0x0000000000390000-0x0000000000466000-memory.dmp dcrat behavioral2/files/0x0007000000023cb0-11.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe -
Executes dropped EXE 1 IoCs
pid Process 4468 OfficeClickToRun.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Windows Photo Viewer\es-ES\ea1d8f6d871115 1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe File created C:\Program Files\ModifiableWindowsApps\dwm.exe 1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe File created C:\Program Files (x86)\Windows Multimedia Platform\TextInputHost.exe 1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe File created C:\Program Files (x86)\Windows Multimedia Platform\22eafd247d37c3 1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe File created C:\Program Files\Windows Photo Viewer\es-ES\upfc.exe 1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2964 schtasks.exe 5012 schtasks.exe 2912 schtasks.exe 1520 schtasks.exe 4836 schtasks.exe 2980 schtasks.exe 4416 schtasks.exe 1864 schtasks.exe 4476 schtasks.exe 808 schtasks.exe 5000 schtasks.exe 560 schtasks.exe 2440 schtasks.exe 4856 schtasks.exe 2924 schtasks.exe 1116 schtasks.exe 1848 schtasks.exe 640 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3732 1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe 3732 1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe 3732 1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe 3732 1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe 3732 1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe 4468 OfficeClickToRun.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3732 1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe Token: SeDebugPrivilege 4468 OfficeClickToRun.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3732 wrote to memory of 4064 3732 1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe 102 PID 3732 wrote to memory of 4064 3732 1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe 102 PID 4064 wrote to memory of 3504 4064 cmd.exe 104 PID 4064 wrote to memory of 3504 4064 cmd.exe 104 PID 4064 wrote to memory of 4468 4064 cmd.exe 108 PID 4064 wrote to memory of 4468 4064 cmd.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe"C:\Users\Admin\AppData\Local\Temp\1d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\KlyHtYfLWv.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3504
-
-
C:\Recovery\WindowsRE\OfficeClickToRun.exe"C:\Recovery\WindowsRE\OfficeClickToRun.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\es-ES\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Users\Default\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Users\Default\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD50b59760b00daf4fc87ef9e87ba43682d
SHA18f441c65cc64c45792568d32042d5c3481821147
SHA2561d807f0c23384297333d3765556e891a0c25416ecb0eded242582896fa99290e
SHA5120b8f3a8ab1c7407455d9633f1bcac6174e4e31904ab8e41b204b0048c7bd28eb6abcc1cde5ddd785307081e45564d342d522a31f3a16cf798645129793145bbe
-
Filesize
207B
MD58e0e29651587b8d4d94bf177176a299e
SHA1eb36d03e38572a8399660e25d3be00d5979666b8
SHA25627380098b9fb1082430a6d16275dfe094195528edb99eed939ae5ce9cb0f0301
SHA5126e4bbbd7a36faaab077a307924467cdfd818161fba16fbc3852bdfcce0ada72eeeb69a22668e0d4edd9d8d5df6c4a484e57d1b89c58d076262a7a5de2cd176e3