Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 06:03
Behavioral task
behavioral1
Sample
b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe
Resource
win10v2004-20241007-en
General
-
Target
b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe
-
Size
784KB
-
MD5
bef287734f80e7484fb9279797e1ae80
-
SHA1
894c68194b21095e41931a9c07b6213b2c81e19c
-
SHA256
b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4ee
-
SHA512
c1f8b33d14393fd91395bc2db4ed85c68288cf1d4d325343b280f74dad77d61a82eac9a78c3b341b40dee1ba35b3bd639e6ba14bd11f172b6ae5dc839f393571
-
SSDEEP
12288:+qnO8YpD1oOJp+Ce1PSiG2jfIBoI5DyDwYMDxFesH0ioBw7oKk2:++ORToOWSi5gBoS4wYUJ0eo2
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 5 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 184 456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5040 456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3048 456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3660 456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1216 456 schtasks.exe 83 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe -
resource yara_rule behavioral2/memory/4480-1-0x0000000000E10000-0x0000000000EDA000-memory.dmp dcrat behavioral2/files/0x000a000000023b8d-33.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe -
Executes dropped EXE 1 IoCs
pid Process 1504 dllhost.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\KBDRU1\\dllhost.exe\"" b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\vcruntime140_clr0400\\RuntimeBroker.exe\"" b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\PerfLogs\\SppExtComObj.exe\"" b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\System32\\usermgr\\fontdrvhost.exe\"" b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Program Files (x86)\\Internet Explorer\\sysmon.exe\"" b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\System32\usermgr\fontdrvhost.exe b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe File opened for modification C:\Windows\System32\vcruntime140_clr0400\RCX8B8C.tmp b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe File opened for modification C:\Windows\System32\vcruntime140_clr0400\RuntimeBroker.exe b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe File created C:\Windows\System32\KBDRU1\dllhost.exe b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe File created C:\Windows\System32\vcruntime140_clr0400\RuntimeBroker.exe b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe File created C:\Windows\System32\vcruntime140_clr0400\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe File opened for modification C:\Windows\System32\usermgr\RCX857E.tmp b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe File opened for modification C:\Windows\System32\KBDRU1\RCX8987.tmp b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe File opened for modification C:\Windows\System32\KBDRU1\dllhost.exe b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe File created C:\Windows\System32\usermgr\fontdrvhost.exe b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe File created C:\Windows\System32\usermgr\5b884080fd4f94e2695da25c503f9e33b9605b83 b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe File created C:\Windows\System32\KBDRU1\5940a34987c99120d96dace90a3f93f329dcad63 b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\121e5b5079f7c0e46d90f99b3864022518bbbda9 b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe File opened for modification C:\Program Files (x86)\Internet Explorer\RCX8782.tmp b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe File opened for modification C:\Program Files (x86)\Internet Explorer\sysmon.exe b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe File created C:\Program Files (x86)\Internet Explorer\sysmon.exe b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3048 schtasks.exe 3660 schtasks.exe 1216 schtasks.exe 184 schtasks.exe 5040 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4480 b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe 4480 b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe 4480 b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe 4480 b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe 4480 b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe 4480 b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe 4480 b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe 4480 b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe 4480 b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe 4480 b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe 1504 dllhost.exe 1504 dllhost.exe 1504 dllhost.exe 1504 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4480 b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe Token: SeDebugPrivilege 1504 dllhost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4480 wrote to memory of 4752 4480 b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe 89 PID 4480 wrote to memory of 4752 4480 b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe 89 PID 4752 wrote to memory of 712 4752 cmd.exe 92 PID 4752 wrote to memory of 712 4752 cmd.exe 92 PID 4752 wrote to memory of 1504 4752 cmd.exe 93 PID 4752 wrote to memory of 1504 4752 cmd.exe 93 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe"C:\Users\Admin\AppData\Local\Temp\b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe"1⤵
- UAC bypass
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4480 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5PdmpZeKK2.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:712
-
-
C:\Windows\System32\KBDRU1\dllhost.exe"C:\Windows\System32\KBDRU1\dllhost.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1504
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\PerfLogs\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System32\usermgr\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\KBDRU1\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\vcruntime140_clr0400\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1216
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202B
MD511d6ffb60411bb39abb9b0eace1e02d1
SHA1037e3e4d7926ed086bf9535f314fa2ecbf519e0f
SHA256d17a2c24ee0ea6aa77bea987df632df8aab67f10c4bd6fe8eb1c491397bdcc6b
SHA512da79080b9e35e8e19f94b8dcd0defe309d813cc71ffad63d911ff7b447ac02e0d1f89c8dba827f1661f4fb64ce4b86787c7bcbe4a1f028458c8ec04f473074c9
-
Filesize
784KB
MD5bef287734f80e7484fb9279797e1ae80
SHA1894c68194b21095e41931a9c07b6213b2c81e19c
SHA256b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4ee
SHA512c1f8b33d14393fd91395bc2db4ed85c68288cf1d4d325343b280f74dad77d61a82eac9a78c3b341b40dee1ba35b3bd639e6ba14bd11f172b6ae5dc839f393571