Analysis
-
max time kernel
117s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 09:47
Behavioral task
behavioral1
Sample
65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c.exe
Resource
win10v2004-20241007-en
General
-
Target
65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c.exe
-
Size
1.4MB
-
MD5
4ad4cc9b5b82fc59756523b5b49da103
-
SHA1
239321573ab48845b649af41908eecadd972dc04
-
SHA256
65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c
-
SHA512
96c8164723c4ada3ab78a63a94e8b35ed41bebdbdf1591f452453a0209f264120572e1c11e60962ca8b1e2fd96f686f1627eab94d0fbeb86e1c931d803a0ca4b
-
SSDEEP
24576:U2G/nvxW3Ww0teOtQEIQ/E8pi63hn89pN3bfqaeTBHLChWFBAtlIBGIP5M:UbA30cn8Y6d89f3e5LhFSnIBhG
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 24 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2920 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1644 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2656 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1084 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 580 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2816 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 780 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 936 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2836 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1652 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 532 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2364 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1856 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1264 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 296 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2476 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2976 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1720 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1640 2916 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2392 2916 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x0008000000016210-9.dat dcrat behavioral1/memory/2352-13-0x0000000000120000-0x0000000000244000-memory.dmp dcrat behavioral1/memory/2072-39-0x0000000000D40000-0x0000000000E64000-memory.dmp dcrat -
Executes dropped EXE 2 IoCs
pid Process 2352 bridgereviewwin.exe 2072 spoolsv.exe -
Loads dropped DLL 2 IoCs
pid Process 2988 cmd.exe 2988 cmd.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\56085415360792 bridgereviewwin.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\audiodg.exe bridgereviewwin.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\42af1c969fbb7b bridgereviewwin.exe File created C:\Program Files (x86)\Windows Defender\en-US\dllhost.exe bridgereviewwin.exe File created C:\Program Files (x86)\Windows Defender\en-US\5940a34987c991 bridgereviewwin.exe File created C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe bridgereviewwin.exe File created C:\Program Files\Windows Photo Viewer\es-ES\24dbde2999530e bridgereviewwin.exe File created C:\Program Files\7-Zip\Lang\wininit.exe bridgereviewwin.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\fr-FR\dllhost.exe bridgereviewwin.exe File created C:\Windows\fr-FR\5940a34987c991 bridgereviewwin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 24 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2640 schtasks.exe 2644 schtasks.exe 780 schtasks.exe 1856 schtasks.exe 1264 schtasks.exe 2976 schtasks.exe 2392 schtasks.exe 2920 schtasks.exe 2324 schtasks.exe 2816 schtasks.exe 936 schtasks.exe 2836 schtasks.exe 532 schtasks.exe 1640 schtasks.exe 2432 schtasks.exe 1084 schtasks.exe 580 schtasks.exe 1652 schtasks.exe 2364 schtasks.exe 296 schtasks.exe 1644 schtasks.exe 2656 schtasks.exe 2476 schtasks.exe 1720 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2352 bridgereviewwin.exe 2072 spoolsv.exe 2072 spoolsv.exe 2072 spoolsv.exe 2072 spoolsv.exe 2072 spoolsv.exe 2072 spoolsv.exe 2072 spoolsv.exe 2072 spoolsv.exe 2072 spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2352 bridgereviewwin.exe Token: SeDebugPrivilege 2072 spoolsv.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2128 wrote to memory of 3048 2128 65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c.exe 30 PID 2128 wrote to memory of 3048 2128 65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c.exe 30 PID 2128 wrote to memory of 3048 2128 65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c.exe 30 PID 2128 wrote to memory of 3048 2128 65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c.exe 30 PID 3048 wrote to memory of 2988 3048 WScript.exe 31 PID 3048 wrote to memory of 2988 3048 WScript.exe 31 PID 3048 wrote to memory of 2988 3048 WScript.exe 31 PID 3048 wrote to memory of 2988 3048 WScript.exe 31 PID 2988 wrote to memory of 2352 2988 cmd.exe 33 PID 2988 wrote to memory of 2352 2988 cmd.exe 33 PID 2988 wrote to memory of 2352 2988 cmd.exe 33 PID 2988 wrote to memory of 2352 2988 cmd.exe 33 PID 2352 wrote to memory of 2404 2352 bridgereviewwin.exe 60 PID 2352 wrote to memory of 2404 2352 bridgereviewwin.exe 60 PID 2352 wrote to memory of 2404 2352 bridgereviewwin.exe 60 PID 2404 wrote to memory of 1632 2404 cmd.exe 62 PID 2404 wrote to memory of 1632 2404 cmd.exe 62 PID 2404 wrote to memory of 1632 2404 cmd.exe 62 PID 2404 wrote to memory of 2072 2404 cmd.exe 63 PID 2404 wrote to memory of 2072 2404 cmd.exe 63 PID 2404 wrote to memory of 2072 2404 cmd.exe 63 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c.exe"C:\Users\Admin\AppData\Local\Temp\65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providerbrowserWebFont\YIgtMaExFJFBncNn1em9wJcGNWr3f.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providerbrowserWebFont\5cmX3eeCizBMduOP4xHF1p.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\providerbrowserWebFont\bridgereviewwin.exe"C:\providerbrowserWebFont\bridgereviewwin.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Q9v2X4ctCI.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1632
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\spoolsv.exe"C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\providerbrowserWebFont\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\providerbrowserWebFont\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\providerbrowserWebFont\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Windows\fr-FR\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\fr-FR\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Windows\fr-FR\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Program Files\VideoLAN\VLC\lua\playlist\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\lua\playlist\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\Program Files\VideoLAN\VLC\lua\playlist\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Defender\en-US\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\en-US\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Defender\en-US\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files\7-Zip\Lang\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Program Files\7-Zip\Lang\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225B
MD59a5ade03919e393a63e17f4e99a1f6b9
SHA108aaafb70e2f026de22f85c5faf2ddcfda9a59d7
SHA2569d7e5588e2e917639235c95d0c60e19c768d99e157aab062a58cb49ee19ba4b5
SHA5129b09aa7f32014fbedddf399902dac46fc1927198ce06cfec936553ff2b466ac165612a1c1d35a83872c73fb5c5673fbbaefca42c4a2def3e1d017aa8a0456685
-
Filesize
47B
MD5e9d505caa65e63b5d93b82e1877f2062
SHA10276dfd379ea89be367b66950300a1455a583571
SHA25621badcf7822aac68d4d060e89fd6f04df3ff68dcd39217ba3863d7503237d101
SHA512077eb5a528e0015e7c6f8ead1b2351d16abf0a05b6132e04a640b9c40a12234091bae5f9268eeb61b75886449320465619cacdacb7733b502d76b7bc3016d917
-
Filesize
221B
MD506865e53406b18d46604d04a3bd9b396
SHA1d9e26ebaa48e997333364143c3d8441eb984dca7
SHA256956279f84b64c8db50862edddfcd9fc43266cab11fced78a0e6d3d2a47e429cc
SHA5121d8b16ed4aa71712900c394b61f2133c305644fc28266ee95e314c09cbb7671d69ed199a544fdbbc618c1ebb803935203da723909da94b2d9d2b3dbec4f7284b
-
Filesize
1.1MB
MD58a6b7ad242f380978aa7318c3fdafe4f
SHA1c78489883e9ce873f7a67c0d3ad662adef9a0c61
SHA256f7a4bc7bacb5fce2daafe9b4db183f60f87528a02832e814417d089a6f6bc2b3
SHA512198e5fe3fb97f7541ec69511a60cb3baffed07046560f6f4455cc403f71d66f17ddf733511d6bd810312028d22d013897be28e66ddcb6eaa1ba5a91b0ab2079c