Analysis
-
max time kernel
94s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 23:49
Behavioral task
behavioral1
Sample
771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe
Resource
win10v2004-20241007-en
General
-
Target
771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe
-
Size
952KB
-
MD5
066ac67ff4803f8053decd2f83d5834e
-
SHA1
4f9a371bbbb0d601d36eb150134397c8e2fb4b06
-
SHA256
771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3
-
SHA512
9ffaf8455c3b36c6c06bd1fd7dd63544376ee5699769b14041186152a428a213be6174c55531cdd46896038d20297e27ccb90a167c1d1537bb73ec4bf516c305
-
SSDEEP
24576:W+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:x8/KfRTK
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Program Files\\Crashpad\\reports\\RuntimeBroker.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Program Files\\Crashpad\\reports\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\dbnmpntw\\dwm.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Program Files\\Crashpad\\reports\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\dbnmpntw\\dwm.exe\", \"C:\\Windows\\AppReadiness\\System.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe -
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1940 992 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3156 992 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3824 992 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1248 992 schtasks.exe 83 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe -
resource yara_rule behavioral2/memory/4948-1-0x0000000000B20000-0x0000000000C14000-memory.dmp dcrat behavioral2/files/0x000b000000023b9a-23.dat dcrat behavioral2/files/0x000d000000023b9a-45.dat dcrat behavioral2/memory/1848-81-0x0000000000520000-0x0000000000614000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe -
Executes dropped EXE 1 IoCs
pid Process 1848 RuntimeBroker.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files\\Crashpad\\reports\\RuntimeBroker.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files\\Crashpad\\reports\\RuntimeBroker.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\dbnmpntw\\dwm.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\dbnmpntw\\dwm.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Windows\\AppReadiness\\System.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Windows\\AppReadiness\\System.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RuntimeBroker.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\System32\dbnmpntw\dwm.exe 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File created C:\Windows\System32\dbnmpntw\6cb0b6c459d5d3455a3da700e713f2e2529862ff 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File opened for modification C:\Windows\System32\dbnmpntw\RCX8756.tmp 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File opened for modification C:\Windows\System32\dbnmpntw\RCX8757.tmp 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File opened for modification C:\Windows\System32\dbnmpntw\dwm.exe 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\Crashpad\reports\RuntimeBroker.exe 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File created C:\Program Files\Crashpad\reports\RuntimeBroker.exe 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File created C:\Program Files\Crashpad\reports\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File opened for modification C:\Program Files\Crashpad\reports\RCX84E3.tmp 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File opened for modification C:\Program Files\Crashpad\reports\RCX8552.tmp 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\AppReadiness\RCX89D9.tmp 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File opened for modification C:\Windows\AppReadiness\RCX89DA.tmp 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File opened for modification C:\Windows\AppReadiness\System.exe 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File created C:\Windows\AppReadiness\System.exe 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File created C:\Windows\AppReadiness\27d1bcfc3c54e0e44ea423ffd4ee81fe73670a2a 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1940 schtasks.exe 3156 schtasks.exe 3824 schtasks.exe 1248 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4948 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4948 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Token: SeDebugPrivilege 1848 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4948 wrote to memory of 3872 4948 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe 88 PID 4948 wrote to memory of 3872 4948 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe 88 PID 3872 wrote to memory of 3092 3872 cmd.exe 90 PID 3872 wrote to memory of 3092 3872 cmd.exe 90 PID 3872 wrote to memory of 1848 3872 cmd.exe 92 PID 3872 wrote to memory of 1848 3872 cmd.exe 92 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe"C:\Users\Admin\AppData\Local\Temp\771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4948 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tBggnM41ZO.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3092
-
-
C:\Program Files\Crashpad\reports\RuntimeBroker.exe"C:\Program Files\Crashpad\reports\RuntimeBroker.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1848
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Crashpad\reports\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\dbnmpntw\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\AppReadiness\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1248
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
952KB
MD5ba459618d1b52e5467310a60b61b036c
SHA17e0baacc6523a28f9c914729b876584d7f6d1e78
SHA256081b3c4136df4e03c3c4f0e488afbaf29f559ab7b3201954144bd1d8669481bb
SHA51205b512ae2828ef58bac2d8c9c475db7a3172c08c5da6b3ff77b17cc613082e45cc99692ffb481865791df4de0008c137a067ac280a6e65781ee3dbe27020bdfa
-
Filesize
952KB
MD5066ac67ff4803f8053decd2f83d5834e
SHA14f9a371bbbb0d601d36eb150134397c8e2fb4b06
SHA256771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3
SHA5129ffaf8455c3b36c6c06bd1fd7dd63544376ee5699769b14041186152a428a213be6174c55531cdd46896038d20297e27ccb90a167c1d1537bb73ec4bf516c305
-
Filesize
215B
MD54db81c520ff95328f3bb006f06cd87fa
SHA1df5728878e96bd64d982b9261811b3d0b524d33c
SHA25611293cfc56f07577fd43dc178552696079837c752a3e095d1b278bf405fbf4d2
SHA512922ee4eb7ef10302d69db7c514b94c64875285527e73a6aaf6d314d904bd979c6129f6885d610f5653f493b15e08ee4ebb8c52465745498e7285bd53d2add75b