Resubmissions

19-12-2024 09:20

241219-la9kxsykfz 10

Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 09:20

General

  • Target

    a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe

  • Size

    783KB

  • MD5

    12da5bf73f5194469ef18dfbbf732730

  • SHA1

    b3780fe64b0e17195f44be49496d6910637c6f84

  • SHA256

    a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1

  • SHA512

    ba90992a64c9c68a8d90611b3d2ea499763b9a2d0e7ac24e9f370d1f5bc44e40080406cc6fe4dfe17073243e2f9ad134bf0be5d9e96a45be7b42c66263ae12f2

  • SSDEEP

    12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 8 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 8 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe
    "C:\Users\Admin\AppData\Local\Temp\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1692
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jucZw7lhZY.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3216
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1356
        • C:\Users\Public\AccountPictures\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe
          "C:\Users\Public\AccountPictures\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:1580
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\MusNotification.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1976
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\System32\wsmprovhost\SppExtComObj.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1992
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\L2Schemas\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1844
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\ShellExperiences\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1076
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\wpncore\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3212
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:228
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4236
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Default\Saved Games\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3204

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe.log

      Filesize

      1KB

      MD5

      b7c0c43fc7804baaa7dc87152cdc9554

      SHA1

      1bab62bd56af745678d4e967d91e1ccfdeed4038

      SHA256

      46386a61f3aaf1b1c2e6efc9fc7e9e9ff16cd13ae58b8d856835771fedb6d457

      SHA512

      9fda3dd00a3406137e0113f13f78e77b20a76512b35820d38df696842cbbf2e2ebabfb99a3846c9637ecb54af858ec1551521187e379872973006426a253f769

    • C:\Users\Admin\AppData\Local\Temp\jucZw7lhZY.bat

      Filesize

      265B

      MD5

      9dd447b789cb668951594b974432424e

      SHA1

      d91abe69b15a179a813a6c341bd4e50e1d92bf61

      SHA256

      b57f224bfa4ae2c97962fb808699af3d14954e8b3ff321e7d9b83769f20e6619

      SHA512

      fba2aa8d21eb82e7859f4c36301bde71702d9d9ff7fbed37428cb892427f2b5371ff2e0ffb0c46585edf467108228a4cbbc48e742a2728f60dd555aed2e46150

    • C:\Windows\System32\wpncore\dllhost.exe

      Filesize

      783KB

      MD5

      12da5bf73f5194469ef18dfbbf732730

      SHA1

      b3780fe64b0e17195f44be49496d6910637c6f84

      SHA256

      a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1

      SHA512

      ba90992a64c9c68a8d90611b3d2ea499763b9a2d0e7ac24e9f370d1f5bc44e40080406cc6fe4dfe17073243e2f9ad134bf0be5d9e96a45be7b42c66263ae12f2

    • memory/1692-14-0x0000000002A00000-0x0000000002A08000-memory.dmp

      Filesize

      32KB

    • memory/1692-16-0x0000000002A40000-0x0000000002A48000-memory.dmp

      Filesize

      32KB

    • memory/1692-5-0x0000000002980000-0x0000000002990000-memory.dmp

      Filesize

      64KB

    • memory/1692-7-0x00000000029B0000-0x00000000029BC000-memory.dmp

      Filesize

      48KB

    • memory/1692-6-0x0000000002990000-0x0000000002998000-memory.dmp

      Filesize

      32KB

    • memory/1692-8-0x00000000029E0000-0x00000000029EA000-memory.dmp

      Filesize

      40KB

    • memory/1692-10-0x00000000029F0000-0x00000000029F8000-memory.dmp

      Filesize

      32KB

    • memory/1692-9-0x00000000029D0000-0x00000000029DA000-memory.dmp

      Filesize

      40KB

    • memory/1692-11-0x00000000029C0000-0x00000000029C8000-memory.dmp

      Filesize

      32KB

    • memory/1692-12-0x0000000002A10000-0x0000000002A18000-memory.dmp

      Filesize

      32KB

    • memory/1692-13-0x0000000002A20000-0x0000000002A28000-memory.dmp

      Filesize

      32KB

    • memory/1692-0-0x00007FFA7C2A3000-0x00007FFA7C2A5000-memory.dmp

      Filesize

      8KB

    • memory/1692-17-0x0000000002A50000-0x0000000002A58000-memory.dmp

      Filesize

      32KB

    • memory/1692-4-0x0000000002970000-0x0000000002978000-memory.dmp

      Filesize

      32KB

    • memory/1692-20-0x000000001B460000-0x000000001B468000-memory.dmp

      Filesize

      32KB

    • memory/1692-21-0x000000001B470000-0x000000001B47C000-memory.dmp

      Filesize

      48KB

    • memory/1692-22-0x000000001B480000-0x000000001B488000-memory.dmp

      Filesize

      32KB

    • memory/1692-19-0x000000001B450000-0x000000001B458000-memory.dmp

      Filesize

      32KB

    • memory/1692-18-0x000000001B440000-0x000000001B448000-memory.dmp

      Filesize

      32KB

    • memory/1692-15-0x0000000002A30000-0x0000000002A38000-memory.dmp

      Filesize

      32KB

    • memory/1692-25-0x00007FFA7C2A0000-0x00007FFA7CD61000-memory.dmp

      Filesize

      10.8MB

    • memory/1692-28-0x00007FFA7C2A0000-0x00007FFA7CD61000-memory.dmp

      Filesize

      10.8MB

    • memory/1692-3-0x0000000002960000-0x0000000002968000-memory.dmp

      Filesize

      32KB

    • memory/1692-37-0x00007FFA7C2A0000-0x00007FFA7CD61000-memory.dmp

      Filesize

      10.8MB

    • memory/1692-2-0x00007FFA7C2A0000-0x00007FFA7CD61000-memory.dmp

      Filesize

      10.8MB

    • memory/1692-103-0x00007FFA7C2A3000-0x00007FFA7C2A5000-memory.dmp

      Filesize

      8KB

    • memory/1692-105-0x00007FFA7C2A0000-0x00007FFA7CD61000-memory.dmp

      Filesize

      10.8MB

    • memory/1692-1-0x0000000000840000-0x000000000090A000-memory.dmp

      Filesize

      808KB