Analysis
-
max time kernel
121s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 23:09
Static task
static1
Behavioral task
behavioral1
Sample
b5a1474fcb8f7b9809d52546bd304af3.exe
Resource
win7-20241010-en
General
-
Target
b5a1474fcb8f7b9809d52546bd304af3.exe
-
Size
2.2MB
-
MD5
b5a1474fcb8f7b9809d52546bd304af3
-
SHA1
8604fe586fa0d03adaa6608169a62c65c837de7d
-
SHA256
dc83dbd12c5a432a6c168982e55d6c7be89dd0bc4b915e3e93e3a97c8af0ab0d
-
SHA512
39931300c863c521957dd5d842c0c6e0d66d2b43663136375e21feb26181bd1c9d4494025e0e7a00b80b51405d1e67bfe825787e60c1b99998463b4e3a49a7ee
-
SSDEEP
49152:IBJVhKLUy2ich2Y+jCRZCH77sVccM50sF/CwsuVoM:y3hKPFch2YHgbucc00OdoM
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2872 2652 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2624 2652 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2704 2652 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2216 2652 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1848 2652 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1816 2652 schtasks.exe 35 -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2116 powershell.exe 2536 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2764 BrokerhostNet.exe 1972 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2736 cmd.exe 2736 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5a1474fcb8f7b9809d52546bd304af3.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2872 schtasks.exe 2624 schtasks.exe 2704 schtasks.exe 2216 schtasks.exe 1848 schtasks.exe 1816 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2764 BrokerhostNet.exe 2116 powershell.exe 2536 powershell.exe 1972 cmd.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2764 BrokerhostNet.exe Token: SeDebugPrivilege 2116 powershell.exe Token: SeDebugPrivilege 2536 powershell.exe Token: SeDebugPrivilege 1972 cmd.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1528 wrote to memory of 2544 1528 b5a1474fcb8f7b9809d52546bd304af3.exe 30 PID 1528 wrote to memory of 2544 1528 b5a1474fcb8f7b9809d52546bd304af3.exe 30 PID 1528 wrote to memory of 2544 1528 b5a1474fcb8f7b9809d52546bd304af3.exe 30 PID 1528 wrote to memory of 2544 1528 b5a1474fcb8f7b9809d52546bd304af3.exe 30 PID 2544 wrote to memory of 2736 2544 WScript.exe 32 PID 2544 wrote to memory of 2736 2544 WScript.exe 32 PID 2544 wrote to memory of 2736 2544 WScript.exe 32 PID 2544 wrote to memory of 2736 2544 WScript.exe 32 PID 2736 wrote to memory of 2764 2736 cmd.exe 34 PID 2736 wrote to memory of 2764 2736 cmd.exe 34 PID 2736 wrote to memory of 2764 2736 cmd.exe 34 PID 2736 wrote to memory of 2764 2736 cmd.exe 34 PID 2764 wrote to memory of 2116 2764 BrokerhostNet.exe 42 PID 2764 wrote to memory of 2116 2764 BrokerhostNet.exe 42 PID 2764 wrote to memory of 2116 2764 BrokerhostNet.exe 42 PID 2764 wrote to memory of 2536 2764 BrokerhostNet.exe 43 PID 2764 wrote to memory of 2536 2764 BrokerhostNet.exe 43 PID 2764 wrote to memory of 2536 2764 BrokerhostNet.exe 43 PID 2764 wrote to memory of 1160 2764 BrokerhostNet.exe 46 PID 2764 wrote to memory of 1160 2764 BrokerhostNet.exe 46 PID 2764 wrote to memory of 1160 2764 BrokerhostNet.exe 46 PID 1160 wrote to memory of 1432 1160 cmd.exe 48 PID 1160 wrote to memory of 1432 1160 cmd.exe 48 PID 1160 wrote to memory of 1432 1160 cmd.exe 48 PID 1160 wrote to memory of 1268 1160 cmd.exe 49 PID 1160 wrote to memory of 1268 1160 cmd.exe 49 PID 1160 wrote to memory of 1268 1160 cmd.exe 49 PID 1160 wrote to memory of 1972 1160 cmd.exe 50 PID 1160 wrote to memory of 1972 1160 cmd.exe 50 PID 1160 wrote to memory of 1972 1160 cmd.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5a1474fcb8f7b9809d52546bd304af3.exe"C:\Users\Admin\AppData\Local\Temp\b5a1474fcb8f7b9809d52546bd304af3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Bridgecontainerserver\VBxKsR3W5qREBSxxvIt5VpzoFdFFANtbsRk6NDfKSHeOxN7UsJds5Ck.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Bridgecontainerserver\SlMo.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Bridgecontainerserver\BrokerhostNet.exe"C:\Bridgecontainerserver/BrokerhostNet.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Bridgecontainerserver\BrokerhostNet.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9zwwBJzsu5.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:1432
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\cmd.exe"C:\Users\Admin\AppData\Local\Temp\cmd.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\AppData\Local\Temp\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\AppData\Local\Temp\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BrokerhostNetB" /sc MINUTE /mo 7 /tr "'C:\Bridgecontainerserver\BrokerhostNet.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BrokerhostNet" /sc ONLOGON /tr "'C:\Bridgecontainerserver\BrokerhostNet.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BrokerhostNetB" /sc MINUTE /mo 9 /tr "'C:\Bridgecontainerserver\BrokerhostNet.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1816
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89B
MD520c75fef4553c17d36635750cfb57049
SHA18489a5998acaa63326bc1a665c38eb71c5d1f426
SHA2560dcef4794868f563d515bbeee69e35dde750411ee9dcaafdef597806c89cabd0
SHA5122819f6585bd3ee7e9f1703c259b97b21dbacde276186a489acfea0c36f377f751845b50ed00a70e029e95f588193cf69f77aeaf2785e67888378b9f2e95ee92a
-
Filesize
204B
MD5e52eec5fe59f0e73555c7d43c0035f62
SHA1e6fcc87b7d260c2fcfff89e28e7d45357357520e
SHA256b5712ce1aa870e16ed1464f1ecd627aed7020bb48c61252471cf9ec0b2d38d7f
SHA512325c467e6519fb72238c62abbb7b89d32016a71416d41f148a38e41853928fc9cc84ed6b096784af9b1ad23c3363316d6b4f3464959127dfee1794cc926d40a7
-
Filesize
217B
MD50f80b50f9f8258081d15675a81e95d44
SHA16b23dc629f616c5c2c40cbb9a98f7d3d9f708efe
SHA256f0376edaa421607c666de8d4ed8283a6c3b4e2b93364d142b451170a1af8d5f5
SHA512a80916c931f9f7ae4f573a56ae1f9273268b3cae054188e64c4cb1793eb145d91e275b0a7ada85878a7e8bcafc968172d15bd88c11e8492acc21b2c07fc27097
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5432841eb702a20215c919ce2ef86bffc
SHA1e38781c027f45224dcd28a36373083f73f11e1af
SHA25671a6820910be6a2aee410a44fa5f5c5e9b11d38289ebfb32fd556820a7cb0ef6
SHA5121778c73fc701cbe882f9c241578821f76bfdf32ec78aada14b791d29af75babe022c7eaac26ed40e2417da94888b5b558ab8fb5e78e0ac585073a495293041a6
-
Filesize
1.9MB
MD50f91548ca49c64d6a8cd3846854f484c
SHA1033c309b683020221ae189c4236a70c0d3ddd568
SHA256a7883947a5f3c0d74f3eac6c2a6da45555298d769f5e3137e10a3ece14e83dfd
SHA512e207b5545ceed034ec22f13e1a36f13656721b2c9cab97f6ec7ba8195f32ddc1673e1334902b2d4fc0ce393baf7f806bedf4a03a26a8ffe79ad17a87cf9a90a2