Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-12-2024 01:09

General

  • Target

    92d7397217e43be9580e67e5d5568a5252966eea16dd213cae536b8b291c0310.exe

  • Size

    952KB

  • MD5

    acab32b0f304cd037ac7255786b4bb02

  • SHA1

    345fee6d21b2a5f66d159c1ead3b859089a0dc6f

  • SHA256

    92d7397217e43be9580e67e5d5568a5252966eea16dd213cae536b8b291c0310

  • SHA512

    8fbdfed630d54e2590ea2f279d6beb2eda7cb20861fc587e61995f40ce272336c9bdf1a609da215679b0322c6b046399bb98a318e7647c1429721122ed4c0daa

  • SSDEEP

    24576:e+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:Z8/KfRTK

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 7 IoCs
  • Process spawned unexpected child process 7 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 14 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 20 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\92d7397217e43be9580e67e5d5568a5252966eea16dd213cae536b8b291c0310.exe
    "C:\Users\Admin\AppData\Local\Temp\92d7397217e43be9580e67e5d5568a5252966eea16dd213cae536b8b291c0310.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2808
    • C:\Windows\System32\NlsData0c1a\smss.exe
      "C:\Windows\System32\NlsData0c1a\smss.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:2836
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Windows\addins\OSPPSVC.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2672
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\NlsData0c1a\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2532
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\MultiDigiMon\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2612
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "92d7397217e43be9580e67e5d5568a5252966eea16dd213cae536b8b291c0310" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\ose00000\92d7397217e43be9580e67e5d5568a5252966eea16dd213cae536b8b291c0310.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:340
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\vcomp140\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1996
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\ieapfltr\taskhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2864
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "92d7397217e43be9580e67e5d5568a5252966eea16dd213cae536b8b291c0310" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\92d7397217e43be9580e67e5d5568a5252966eea16dd213cae536b8b291c0310.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\VideoLAN\VLC\92d7397217e43be9580e67e5d5568a5252966eea16dd213cae536b8b291c0310.exe

    Filesize

    952KB

    MD5

    d903e11b0eb00b6c75239f5103e6e509

    SHA1

    aeb02b3a907a7fe12157d84d8fb017e70be5c683

    SHA256

    a9348c24958af88943abc3064b312b447363b8d2765bf6b82a96f3e018029dc1

    SHA512

    595334d71af70b173509afbdb254de64127b52097a15526932b639f580a52eecf4f27fde9ed8f60258edc9139c4de91b71ee0f50855e0547b8da7c5f35401919

  • C:\Windows\System32\vcomp140\lsass.exe

    Filesize

    952KB

    MD5

    acab32b0f304cd037ac7255786b4bb02

    SHA1

    345fee6d21b2a5f66d159c1ead3b859089a0dc6f

    SHA256

    92d7397217e43be9580e67e5d5568a5252966eea16dd213cae536b8b291c0310

    SHA512

    8fbdfed630d54e2590ea2f279d6beb2eda7cb20861fc587e61995f40ce272336c9bdf1a609da215679b0322c6b046399bb98a318e7647c1429721122ed4c0daa

  • memory/2808-4-0x0000000000460000-0x0000000000470000-memory.dmp

    Filesize

    64KB

  • memory/2808-9-0x0000000000C10000-0x0000000000C1A000-memory.dmp

    Filesize

    40KB

  • memory/2808-0-0x000007FEF5803000-0x000007FEF5804000-memory.dmp

    Filesize

    4KB

  • memory/2808-5-0x0000000000500000-0x000000000050A000-memory.dmp

    Filesize

    40KB

  • memory/2808-6-0x0000000000450000-0x000000000045C000-memory.dmp

    Filesize

    48KB

  • memory/2808-7-0x00000000004F0000-0x00000000004FA000-memory.dmp

    Filesize

    40KB

  • memory/2808-8-0x00000000005C0000-0x00000000005C8000-memory.dmp

    Filesize

    32KB

  • memory/2808-3-0x0000000000140000-0x0000000000150000-memory.dmp

    Filesize

    64KB

  • memory/2808-11-0x0000000000C40000-0x0000000000C4C000-memory.dmp

    Filesize

    48KB

  • memory/2808-10-0x0000000000C20000-0x0000000000C2C000-memory.dmp

    Filesize

    48KB

  • memory/2808-2-0x000007FEF5800000-0x000007FEF61EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2808-1-0x00000000010E0000-0x00000000011D4000-memory.dmp

    Filesize

    976KB

  • memory/2808-119-0x000007FEF5800000-0x000007FEF61EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2836-120-0x0000000000B20000-0x0000000000C14000-memory.dmp

    Filesize

    976KB