Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2024 18:51

General

  • Target

    7a735fb7f6e21b8f02009613d40272571de48bb6511509326e65f44aec6b19ed.exe

  • Size

    952KB

  • MD5

    74ffc0f02c115af7ca2a9e63280ee91a

  • SHA1

    cbc921ebe0671922b3495aead9c23c9d8305baba

  • SHA256

    7a735fb7f6e21b8f02009613d40272571de48bb6511509326e65f44aec6b19ed

  • SHA512

    e9a2453c1a3c897a94a0cb817c12dbda52c175a709704614cda8497ce95dd6f137d394d3e6c0136f73819b05c1248649b4a1fc147c90dbe0bdc25d12b1fa5179

  • SSDEEP

    24576:e+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXXX:Z8/KfRTKt

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 5 IoCs
  • Process spawned unexpected child process 5 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a735fb7f6e21b8f02009613d40272571de48bb6511509326e65f44aec6b19ed.exe
    "C:\Users\Admin\AppData\Local\Temp\7a735fb7f6e21b8f02009613d40272571de48bb6511509326e65f44aec6b19ed.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:632
    • C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\audiodg.exe
      "C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\audiodg.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:992
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Documents and Settings\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2824
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\WMPhoto\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2820
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Windows Journal\de-DE\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2856
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\audiodg.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2848
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\de-DE\audiodg.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Mail\de-DE\audiodg.exe

    Filesize

    952KB

    MD5

    74ffc0f02c115af7ca2a9e63280ee91a

    SHA1

    cbc921ebe0671922b3495aead9c23c9d8305baba

    SHA256

    7a735fb7f6e21b8f02009613d40272571de48bb6511509326e65f44aec6b19ed

    SHA512

    e9a2453c1a3c897a94a0cb817c12dbda52c175a709704614cda8497ce95dd6f137d394d3e6c0136f73819b05c1248649b4a1fc147c90dbe0bdc25d12b1fa5179

  • C:\Users\csrss.exe

    Filesize

    952KB

    MD5

    83f248bdadbc5da3b80cfe84f3d09797

    SHA1

    cda319bafeb03339ce3726bf53d2bcf6b0ea88e2

    SHA256

    2e0d2426be742646aebecfefb47e325076c2960f8e7986e2a1739d2f35dd930b

    SHA512

    f8b6acdd66bd508031859ab8b0b5f50dd7f2492a1467614abb9d5d99f5673e3d0ac4b9f0927600143d26db63a9efbee1388c339020a3163ddf629182805f114d

  • memory/632-4-0x0000000002030000-0x0000000002040000-memory.dmp

    Filesize

    64KB

  • memory/632-11-0x0000000002280000-0x000000000228C000-memory.dmp

    Filesize

    48KB

  • memory/632-0-0x000007FEF5E13000-0x000007FEF5E14000-memory.dmp

    Filesize

    4KB

  • memory/632-5-0x0000000001FA0000-0x0000000001FAA000-memory.dmp

    Filesize

    40KB

  • memory/632-6-0x0000000002070000-0x000000000207C000-memory.dmp

    Filesize

    48KB

  • memory/632-7-0x0000000002040000-0x000000000204A000-memory.dmp

    Filesize

    40KB

  • memory/632-8-0x0000000002080000-0x0000000002088000-memory.dmp

    Filesize

    32KB

  • memory/632-3-0x0000000001F90000-0x0000000001FA0000-memory.dmp

    Filesize

    64KB

  • memory/632-10-0x00000000020A0000-0x00000000020AC000-memory.dmp

    Filesize

    48KB

  • memory/632-9-0x0000000002090000-0x000000000209A000-memory.dmp

    Filesize

    40KB

  • memory/632-2-0x000007FEF5E10000-0x000007FEF67FC000-memory.dmp

    Filesize

    9.9MB

  • memory/632-1-0x0000000000970000-0x0000000000A64000-memory.dmp

    Filesize

    976KB

  • memory/632-93-0x000007FEF5E10000-0x000007FEF67FC000-memory.dmp

    Filesize

    9.9MB

  • memory/992-92-0x0000000000830000-0x0000000000924000-memory.dmp

    Filesize

    976KB