Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 05:06
Static task
static1
Behavioral task
behavioral1
Sample
dc83dbd12c5a432a6c168982e55d6c7be89dd0bc4b915e3e93e3a97c8af0ab0d.exe
Resource
win7-20240903-en
General
-
Target
dc83dbd12c5a432a6c168982e55d6c7be89dd0bc4b915e3e93e3a97c8af0ab0d.exe
-
Size
2.2MB
-
MD5
b5a1474fcb8f7b9809d52546bd304af3
-
SHA1
8604fe586fa0d03adaa6608169a62c65c837de7d
-
SHA256
dc83dbd12c5a432a6c168982e55d6c7be89dd0bc4b915e3e93e3a97c8af0ab0d
-
SHA512
39931300c863c521957dd5d842c0c6e0d66d2b43663136375e21feb26181bd1c9d4494025e0e7a00b80b51405d1e67bfe825787e60c1b99998463b4e3a49a7ee
-
SSDEEP
49152:IBJVhKLUy2ich2Y+jCRZCH77sVccM50sF/CwsuVoM:y3hKPFch2YHgbucc00OdoM
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2620 4636 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4980 4636 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1140 4636 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1164 4636 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1544 4636 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1812 4636 schtasks.exe 86 -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3988 powershell.exe 2632 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation BrokerhostNet.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation dc83dbd12c5a432a6c168982e55d6c7be89dd0bc4b915e3e93e3a97c8af0ab0d.exe -
Executes dropped EXE 2 IoCs
pid Process 1592 BrokerhostNet.exe 4400 RuntimeBroker.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc83dbd12c5a432a6c168982e55d6c7be89dd0bc4b915e3e93e3a97c8af0ab0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4620 PING.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings dc83dbd12c5a432a6c168982e55d6c7be89dd0bc4b915e3e93e3a97c8af0ab0d.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings BrokerhostNet.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4620 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2620 schtasks.exe 4980 schtasks.exe 1140 schtasks.exe 1164 schtasks.exe 1544 schtasks.exe 1812 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 1592 BrokerhostNet.exe 2632 powershell.exe 3988 powershell.exe 2632 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1592 BrokerhostNet.exe Token: SeDebugPrivilege 2632 powershell.exe Token: SeDebugPrivilege 3988 powershell.exe Token: SeDebugPrivilege 4400 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1052 wrote to memory of 220 1052 dc83dbd12c5a432a6c168982e55d6c7be89dd0bc4b915e3e93e3a97c8af0ab0d.exe 82 PID 1052 wrote to memory of 220 1052 dc83dbd12c5a432a6c168982e55d6c7be89dd0bc4b915e3e93e3a97c8af0ab0d.exe 82 PID 1052 wrote to memory of 220 1052 dc83dbd12c5a432a6c168982e55d6c7be89dd0bc4b915e3e93e3a97c8af0ab0d.exe 82 PID 220 wrote to memory of 3784 220 WScript.exe 90 PID 220 wrote to memory of 3784 220 WScript.exe 90 PID 220 wrote to memory of 3784 220 WScript.exe 90 PID 3784 wrote to memory of 1592 3784 cmd.exe 92 PID 3784 wrote to memory of 1592 3784 cmd.exe 92 PID 1592 wrote to memory of 3988 1592 BrokerhostNet.exe 99 PID 1592 wrote to memory of 3988 1592 BrokerhostNet.exe 99 PID 1592 wrote to memory of 2632 1592 BrokerhostNet.exe 100 PID 1592 wrote to memory of 2632 1592 BrokerhostNet.exe 100 PID 1592 wrote to memory of 1584 1592 BrokerhostNet.exe 103 PID 1592 wrote to memory of 1584 1592 BrokerhostNet.exe 103 PID 1584 wrote to memory of 3588 1584 cmd.exe 105 PID 1584 wrote to memory of 3588 1584 cmd.exe 105 PID 1584 wrote to memory of 4620 1584 cmd.exe 106 PID 1584 wrote to memory of 4620 1584 cmd.exe 106 PID 1584 wrote to memory of 4400 1584 cmd.exe 109 PID 1584 wrote to memory of 4400 1584 cmd.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc83dbd12c5a432a6c168982e55d6c7be89dd0bc4b915e3e93e3a97c8af0ab0d.exe"C:\Users\Admin\AppData\Local\Temp\dc83dbd12c5a432a6c168982e55d6c7be89dd0bc4b915e3e93e3a97c8af0ab0d.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Bridgecontainerserver\VBxKsR3W5qREBSxxvIt5VpzoFdFFANtbsRk6NDfKSHeOxN7UsJds5Ck.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Bridgecontainerserver\SlMo.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Bridgecontainerserver\BrokerhostNet.exe"C:\Bridgecontainerserver/BrokerhostNet.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Bridgecontainerserver\BrokerhostNet.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CEiRp81KtC.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:3588
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BrokerhostNetB" /sc MINUTE /mo 10 /tr "'C:\Bridgecontainerserver\BrokerhostNet.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BrokerhostNet" /sc ONLOGON /tr "'C:\Bridgecontainerserver\BrokerhostNet.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BrokerhostNetB" /sc MINUTE /mo 7 /tr "'C:\Bridgecontainerserver\BrokerhostNet.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1812
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD50f91548ca49c64d6a8cd3846854f484c
SHA1033c309b683020221ae189c4236a70c0d3ddd568
SHA256a7883947a5f3c0d74f3eac6c2a6da45555298d769f5e3137e10a3ece14e83dfd
SHA512e207b5545ceed034ec22f13e1a36f13656721b2c9cab97f6ec7ba8195f32ddc1673e1334902b2d4fc0ce393baf7f806bedf4a03a26a8ffe79ad17a87cf9a90a2
-
Filesize
89B
MD520c75fef4553c17d36635750cfb57049
SHA18489a5998acaa63326bc1a665c38eb71c5d1f426
SHA2560dcef4794868f563d515bbeee69e35dde750411ee9dcaafdef597806c89cabd0
SHA5122819f6585bd3ee7e9f1703c259b97b21dbacde276186a489acfea0c36f377f751845b50ed00a70e029e95f588193cf69f77aeaf2785e67888378b9f2e95ee92a
-
Filesize
204B
MD5e52eec5fe59f0e73555c7d43c0035f62
SHA1e6fcc87b7d260c2fcfff89e28e7d45357357520e
SHA256b5712ce1aa870e16ed1464f1ecd627aed7020bb48c61252471cf9ec0b2d38d7f
SHA512325c467e6519fb72238c62abbb7b89d32016a71416d41f148a38e41853928fc9cc84ed6b096784af9b1ad23c3363316d6b4f3464959127dfee1794cc926d40a7
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
179B
MD5ca53b943ddd93e40f6818ca986130a51
SHA1d397f93d1ffc2d323aa8a9decff6908275cc33ab
SHA25634c28cf2d42a39bad6db32ea05ee19a23ecc5ab8f343e019a2bea60b699d087c
SHA512ceda3e2252eb2127afce3cfa3acd9b8e557be08a8f5392ea6fba04309aacfd04ea37f68e2658c0c82143fcd703a2424e36a5507b274100b11688ad93d3499f87
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82