Analysis

  • max time kernel
    105s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-12-2024 18:56

General

  • Target

    27e67aaa049c2243423f3c2c33e7747033f63234eda122bc9beaad90528cfd0dN.exe

  • Size

    952KB

  • MD5

    8e6e52fa1da6893e7bee069c7e5dacd0

  • SHA1

    e05854289cc5bb1c60c39fd5453b720cf79eabad

  • SHA256

    27e67aaa049c2243423f3c2c33e7747033f63234eda122bc9beaad90528cfd0d

  • SHA512

    19ca97f006c3a34bc16f6d0538b3ef3d40ebc80c4b2a7019c91ffe989250f8109e337af2c808aa4010c72334d2afd6883f247f573b5b33b5b4d019e234d881b9

  • SSDEEP

    24576:e+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:Z8/KfRTK

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 5 IoCs
  • Process spawned unexpected child process 5 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\27e67aaa049c2243423f3c2c33e7747033f63234eda122bc9beaad90528cfd0dN.exe
    "C:\Users\Admin\AppData\Local\Temp\27e67aaa049c2243423f3c2c33e7747033f63234eda122bc9beaad90528cfd0dN.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:876
    • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppobjs-spp-plugin-manifest-signed\OSPPSVC.exe
      "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppobjs-spp-plugin-manifest-signed\OSPPSVC.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:1832
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppobjs-spp-plugin-manifest-signed\OSPPSVC.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2812
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\psisrndr\wininit.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2708
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\IME\fr-FR\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2120
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2884
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\explorer.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\RCXDCC0.tmp

    Filesize

    952KB

    MD5

    d8cf22ce529f3828a077dc9f034b6262

    SHA1

    e6d966bc3302f97ea0d5eff35cf2ab3ad3e5af2b

    SHA256

    ab7bb6079b42ddc3a8d8c66a6e2d1a02f7e24fbb09c4f2a6bee70284f66425f0

    SHA512

    06a2eda8af74e4048f90806c646c8f570aa327d5febbbbb93cd8ac316a8e8fe1a218cf0edf226720719c92749592fa3934a28c812bffd39bff9fe74db5f1512a

  • C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\explorer.exe

    Filesize

    952KB

    MD5

    8e6e52fa1da6893e7bee069c7e5dacd0

    SHA1

    e05854289cc5bb1c60c39fd5453b720cf79eabad

    SHA256

    27e67aaa049c2243423f3c2c33e7747033f63234eda122bc9beaad90528cfd0d

    SHA512

    19ca97f006c3a34bc16f6d0538b3ef3d40ebc80c4b2a7019c91ffe989250f8109e337af2c808aa4010c72334d2afd6883f247f573b5b33b5b4d019e234d881b9

  • C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\explorer.exe

    Filesize

    952KB

    MD5

    3889021a43a04be0c4bcdebd851b5c00

    SHA1

    fcd5f2638af412cd2ee32d055feeaf2b30612c91

    SHA256

    ce10ca60ea73c864884a698f2d21f20fdc25cca9c48326c5998287c924528f21

    SHA512

    887eed65b038acadb859a1e2ebf07207084bae56991f02133b0eb265ee06c80bd1d2f4311f5e29dd6b1118d3c893747a74161c0cd0b8abcb388407bd0c3641cc

  • C:\Windows\IME\fr-FR\winlogon.exe

    Filesize

    952KB

    MD5

    bf81eb7d395a212976a5cd184014f035

    SHA1

    82fc51db70da3ddd84d831cb21439da1f84f6f3c

    SHA256

    e1d4778ae186097ea4b7c303137124ac618980780c0dd3a58d6c02c8c57ac590

    SHA512

    3919cd03d5fa802df5ee08cff740db881920611832b373bd6b578eb3116e20a5fa267e19708d3d8e2d1648caaf421be5a825b8920d23c983599fb19355445dc5

  • memory/876-4-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/876-11-0x0000000000A20000-0x0000000000A2C000-memory.dmp

    Filesize

    48KB

  • memory/876-6-0x00000000004F0000-0x00000000004FC000-memory.dmp

    Filesize

    48KB

  • memory/876-7-0x0000000000520000-0x000000000052A000-memory.dmp

    Filesize

    40KB

  • memory/876-8-0x00000000009F0000-0x00000000009F8000-memory.dmp

    Filesize

    32KB

  • memory/876-9-0x0000000000A00000-0x0000000000A0A000-memory.dmp

    Filesize

    40KB

  • memory/876-10-0x0000000000A10000-0x0000000000A1C000-memory.dmp

    Filesize

    48KB

  • memory/876-5-0x00000000009E0000-0x00000000009EA000-memory.dmp

    Filesize

    40KB

  • memory/876-0-0x000007FEF5E53000-0x000007FEF5E54000-memory.dmp

    Filesize

    4KB

  • memory/876-3-0x00000000004E0000-0x00000000004F0000-memory.dmp

    Filesize

    64KB

  • memory/876-2-0x000007FEF5E50000-0x000007FEF683C000-memory.dmp

    Filesize

    9.9MB

  • memory/876-1-0x00000000013C0000-0x00000000014B4000-memory.dmp

    Filesize

    976KB

  • memory/876-92-0x000007FEF5E50000-0x000007FEF683C000-memory.dmp

    Filesize

    9.9MB

  • memory/1832-91-0x00000000000E0000-0x00000000001D4000-memory.dmp

    Filesize

    976KB