Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 00:27

General

  • Target

    936fd703d9cf5a02721ef6c3ca0f4f147c0de02580213152b3bdd86ba1a581cd.exe

  • Size

    952KB

  • MD5

    86706715807ae2b462abebd563006444

  • SHA1

    c47a2955878e4314c2f7e1e2b78fd9054d7d9466

  • SHA256

    936fd703d9cf5a02721ef6c3ca0f4f147c0de02580213152b3bdd86ba1a581cd

  • SHA512

    45fab92be0eba14855d9645a22bc1c2506018711b13067c160c00de70c381f7fd22f1f48b86b77fb25bb0f9c0cb4896125545831649d01227f4484fcedde7674

  • SSDEEP

    24576:W+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:x8/KfRTK

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 7 IoCs
  • Process spawned unexpected child process 7 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 14 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\936fd703d9cf5a02721ef6c3ca0f4f147c0de02580213152b3bdd86ba1a581cd.exe
    "C:\Users\Admin\AppData\Local\Temp\936fd703d9cf5a02721ef6c3ca0f4f147c0de02580213152b3bdd86ba1a581cd.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2364
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\THBYgWHxR7.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1500
        • C:\Windows\System32\MTFServer\RuntimeBroker.exe
          "C:\Windows\System32\MTFServer\RuntimeBroker.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:2376
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\ProgramData\WindowsHolographicDevices\SpatialStore\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3564
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "936fd703d9cf5a02721ef6c3ca0f4f147c0de02580213152b3bdd86ba1a581cd" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\dd_NDP472-KB4054530-x86-x64-AllOS-ENU_decompression_log\936fd703d9cf5a02721ef6c3ca0f4f147c0de02580213152b3bdd86ba1a581cd.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4544
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Documents and Settings\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2532
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\MTFServer\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1216
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:5064
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartUI\StartMenuExperienceHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1752
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Windows\System32\wbem\polprou\unsecapp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\dllhost.exe

      Filesize

      952KB

      MD5

      86706715807ae2b462abebd563006444

      SHA1

      c47a2955878e4314c2f7e1e2b78fd9054d7d9466

      SHA256

      936fd703d9cf5a02721ef6c3ca0f4f147c0de02580213152b3bdd86ba1a581cd

      SHA512

      45fab92be0eba14855d9645a22bc1c2506018711b13067c160c00de70c381f7fd22f1f48b86b77fb25bb0f9c0cb4896125545831649d01227f4484fcedde7674

    • C:\Users\Admin\AppData\Local\Temp\THBYgWHxR7.bat

      Filesize

      211B

      MD5

      1232832e1905b4fe416893284258334d

      SHA1

      63fab7124e84df946a83ca736479c49b9fc22329

      SHA256

      cc338369874f887b4332f256d4f4a1a73b32dca54c0671650a3d72e0145b85f8

      SHA512

      62b5a925c005002cb531f85170957b10ee41e54bac83e5d153b81f8ca6ebcf97857e1dff6447bf51910bab08f3350da4ddd30757d6f8309bf9e67bb74875ca8b

    • C:\Windows\System32\wbem\polprou\unsecapp.exe

      Filesize

      952KB

      MD5

      1050058d030f9d9ace7d941905207ef2

      SHA1

      8e4526ac11d46c32206bbdef0d30ef8839c6d55c

      SHA256

      d7f5648e69e39642e050c1687a6b3a2c88eb51f5d4306b975cff4f90bbe770d2

      SHA512

      b04520a1b4e8a3c54a58f847e274bdac3ae66ef42adb1475121e98b33d77b12aff92f870cdeddd194078636e6422175dcd27b85d944fd6c621d4117bb569b4c4

    • memory/2364-4-0x0000000000B70000-0x0000000000B80000-memory.dmp

      Filesize

      64KB

    • memory/2364-0-0x00007FF8CE2F3000-0x00007FF8CE2F5000-memory.dmp

      Filesize

      8KB

    • memory/2364-5-0x000000001AD20000-0x000000001AD2A000-memory.dmp

      Filesize

      40KB

    • memory/2364-6-0x0000000000B60000-0x0000000000B6C000-memory.dmp

      Filesize

      48KB

    • memory/2364-7-0x000000001AD50000-0x000000001AD5A000-memory.dmp

      Filesize

      40KB

    • memory/2364-9-0x000000001AD40000-0x000000001AD4A000-memory.dmp

      Filesize

      40KB

    • memory/2364-10-0x000000001AD60000-0x000000001AD6C000-memory.dmp

      Filesize

      48KB

    • memory/2364-11-0x000000001AD90000-0x000000001AD9C000-memory.dmp

      Filesize

      48KB

    • memory/2364-8-0x000000001AD30000-0x000000001AD38000-memory.dmp

      Filesize

      32KB

    • memory/2364-3-0x0000000000B30000-0x0000000000B40000-memory.dmp

      Filesize

      64KB

    • memory/2364-2-0x00007FF8CE2F0000-0x00007FF8CEDB1000-memory.dmp

      Filesize

      10.8MB

    • memory/2364-118-0x00007FF8CE2F0000-0x00007FF8CEDB1000-memory.dmp

      Filesize

      10.8MB

    • memory/2364-1-0x0000000000190000-0x0000000000284000-memory.dmp

      Filesize

      976KB