Analysis

  • max time kernel
    16s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 05:34

General

  • Target

    ee66bca1ea767e827dfafd301d994e9afd36ff0fae546ad51e18347e999e9529N.exe

  • Size

    1.2MB

  • MD5

    bb7e3c97bc9136dd95203ac7b480b230

  • SHA1

    55af32d959f455d87aec058789c35471272a34f2

  • SHA256

    ee66bca1ea767e827dfafd301d994e9afd36ff0fae546ad51e18347e999e9529

  • SHA512

    7cfe9fc9e23247ffd1f6d0fb7588af62c01f714d843e2268dab1442af2471e22559d1e41878bdcfb6796d6e572eda982c887160d20015a96e7c3a9c87ad1d77b

  • SSDEEP

    24576:m5/FWj01uCUyGXFgSTq/kbe58fWj+1Ya:k/FG0Cpt4i28fWj+1Y

Malware Config

Signatures

  • DcRat 6 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee66bca1ea767e827dfafd301d994e9afd36ff0fae546ad51e18347e999e9529N.exe
    "C:\Users\Admin\AppData\Local\Temp\ee66bca1ea767e827dfafd301d994e9afd36ff0fae546ad51e18347e999e9529N.exe"
    1⤵
    • DcRat
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Windows\System32\pegibbfc\lsass.exe
      "C:\Windows\System32\pegibbfc\lsass.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1604
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\RstrtMgr\dwm.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2276
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\it-IT\csrss.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2832
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\pegibbfc\lsass.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2324
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPWMI\OSPPSVC.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RCXB55C.tmp

    Filesize

    1.2MB

    MD5

    bb7e3c97bc9136dd95203ac7b480b230

    SHA1

    55af32d959f455d87aec058789c35471272a34f2

    SHA256

    ee66bca1ea767e827dfafd301d994e9afd36ff0fae546ad51e18347e999e9529

    SHA512

    7cfe9fc9e23247ffd1f6d0fb7588af62c01f714d843e2268dab1442af2471e22559d1e41878bdcfb6796d6e572eda982c887160d20015a96e7c3a9c87ad1d77b

  • C:\Windows\System32\pegibbfc\lsass.exe

    Filesize

    1.2MB

    MD5

    1d36c36f25a8325f6bed0f61e8ca99ae

    SHA1

    49cae12708ffad24b5a2ba65af993cc68b1179ae

    SHA256

    189c03112c37251064cb3f71e10cb9643eed80ca74b3759359129514740113aa

    SHA512

    e8f96921381c9374aa8c79d44260e60d07b8645f7ea88dc5531a0c3c0b0fefa6fdb1d7915c2509c1b552cc0516d7e19b569b7982ba48c3a45ef8b65210ffeef4

  • memory/1220-6-0x0000000000190000-0x000000000019A000-memory.dmp

    Filesize

    40KB

  • memory/1220-3-0x0000000000150000-0x0000000000160000-memory.dmp

    Filesize

    64KB

  • memory/1220-4-0x0000000000170000-0x000000000017C000-memory.dmp

    Filesize

    48KB

  • memory/1220-5-0x0000000000180000-0x0000000000190000-memory.dmp

    Filesize

    64KB

  • memory/1220-0-0x000007FEF5AB3000-0x000007FEF5AB4000-memory.dmp

    Filesize

    4KB

  • memory/1220-7-0x00000000001A0000-0x00000000001AA000-memory.dmp

    Filesize

    40KB

  • memory/1220-8-0x00000000001B0000-0x00000000001BC000-memory.dmp

    Filesize

    48KB

  • memory/1220-9-0x00000000003C0000-0x00000000003CC000-memory.dmp

    Filesize

    48KB

  • memory/1220-2-0x000007FEF5AB0000-0x000007FEF649C000-memory.dmp

    Filesize

    9.9MB

  • memory/1220-1-0x0000000000CE0000-0x0000000000E24000-memory.dmp

    Filesize

    1.3MB

  • memory/1220-76-0x000007FEF5AB0000-0x000007FEF649C000-memory.dmp

    Filesize

    9.9MB

  • memory/1604-75-0x0000000000270000-0x00000000003B4000-memory.dmp

    Filesize

    1.3MB