Resubmissions

19-12-2024 09:20

241219-la9kxsykfz 10

Analysis

  • max time kernel
    15s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2024 09:20

General

  • Target

    a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe

  • Size

    783KB

  • MD5

    12da5bf73f5194469ef18dfbbf732730

  • SHA1

    b3780fe64b0e17195f44be49496d6910637c6f84

  • SHA256

    a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1

  • SHA512

    ba90992a64c9c68a8d90611b3d2ea499763b9a2d0e7ac24e9f370d1f5bc44e40080406cc6fe4dfe17073243e2f9ad134bf0be5d9e96a45be7b42c66263ae12f2

  • SSDEEP

    12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe
    "C:\Users\Admin\AppData\Local\Temp\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe"
    1⤵
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:772
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\N4MZr7WnyG.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1276
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1804
        • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPCEXT\OSPPSVC.exe
          "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPCEXT\OSPPSVC.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:1924
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\audiodg.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2788
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPCEXT\OSPPSVC.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2912
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\C_1361\lsass.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2976
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\en-US\wininit.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2844

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\7-Zip\Lang\audiodg.exe

      Filesize

      783KB

      MD5

      12da5bf73f5194469ef18dfbbf732730

      SHA1

      b3780fe64b0e17195f44be49496d6910637c6f84

      SHA256

      a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1

      SHA512

      ba90992a64c9c68a8d90611b3d2ea499763b9a2d0e7ac24e9f370d1f5bc44e40080406cc6fe4dfe17073243e2f9ad134bf0be5d9e96a45be7b42c66263ae12f2

    • C:\Users\Admin\AppData\Local\Temp\N4MZr7WnyG.bat

      Filesize

      264B

      MD5

      7ae5fa6c1c237b380eeda3497ae79bab

      SHA1

      6d148d5ad35b209a9b81d507dbcc9a1c6f5b71bc

      SHA256

      98654f792dfbc6c96ff0310dd4e857d2483aa9274fb4f1cec3ba75b334fb4af3

      SHA512

      ddb9702beb7ebb6590a812d307b35eb57efa3c7271df27958c593743dd4e98b7008a5b9a5e43a7b59a3b59e0b55101181e3661c5060c4a5d9329840d27a8cbb7

    • memory/772-13-0x0000000000D10000-0x0000000000D18000-memory.dmp

      Filesize

      32KB

    • memory/772-1-0x0000000000F90000-0x000000000105A000-memory.dmp

      Filesize

      808KB

    • memory/772-5-0x0000000000560000-0x0000000000570000-memory.dmp

      Filesize

      64KB

    • memory/772-6-0x0000000000570000-0x0000000000578000-memory.dmp

      Filesize

      32KB

    • memory/772-4-0x0000000000550000-0x0000000000558000-memory.dmp

      Filesize

      32KB

    • memory/772-8-0x0000000000CF0000-0x0000000000CFA000-memory.dmp

      Filesize

      40KB

    • memory/772-9-0x0000000000C50000-0x0000000000C5A000-memory.dmp

      Filesize

      40KB

    • memory/772-10-0x0000000000580000-0x0000000000588000-memory.dmp

      Filesize

      32KB

    • memory/772-7-0x0000000000C40000-0x0000000000C4C000-memory.dmp

      Filesize

      48KB

    • memory/772-11-0x0000000000CE0000-0x0000000000CE8000-memory.dmp

      Filesize

      32KB

    • memory/772-12-0x0000000000D00000-0x0000000000D08000-memory.dmp

      Filesize

      32KB

    • memory/772-14-0x0000000000D30000-0x0000000000D38000-memory.dmp

      Filesize

      32KB

    • memory/772-0-0x000007FEF5D13000-0x000007FEF5D14000-memory.dmp

      Filesize

      4KB

    • memory/772-3-0x0000000000540000-0x0000000000548000-memory.dmp

      Filesize

      32KB

    • memory/772-20-0x0000000000D50000-0x0000000000D58000-memory.dmp

      Filesize

      32KB

    • memory/772-15-0x0000000000DE0000-0x0000000000DE8000-memory.dmp

      Filesize

      32KB

    • memory/772-18-0x0000000000D20000-0x0000000000D28000-memory.dmp

      Filesize

      32KB

    • memory/772-21-0x0000000000D60000-0x0000000000D6C000-memory.dmp

      Filesize

      48KB

    • memory/772-16-0x0000000000F00000-0x0000000000F08000-memory.dmp

      Filesize

      32KB

    • memory/772-19-0x0000000000D40000-0x0000000000D48000-memory.dmp

      Filesize

      32KB

    • memory/772-22-0x0000000000D70000-0x0000000000D78000-memory.dmp

      Filesize

      32KB

    • memory/772-25-0x000007FEF5D10000-0x000007FEF66FC000-memory.dmp

      Filesize

      9.9MB

    • memory/772-35-0x000007FEF5D10000-0x000007FEF66FC000-memory.dmp

      Filesize

      9.9MB

    • memory/772-2-0x000007FEF5D10000-0x000007FEF66FC000-memory.dmp

      Filesize

      9.9MB

    • memory/772-62-0x000007FEF5D10000-0x000007FEF66FC000-memory.dmp

      Filesize

      9.9MB

    • memory/772-17-0x0000000000F10000-0x0000000000F18000-memory.dmp

      Filesize

      32KB

    • memory/772-69-0x000007FEF5D10000-0x000007FEF66FC000-memory.dmp

      Filesize

      9.9MB

    • memory/1924-72-0x0000000000D10000-0x0000000000DDA000-memory.dmp

      Filesize

      808KB