Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 02:04
Behavioral task
behavioral1
Sample
05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe
Resource
win10v2004-20241007-en
General
-
Target
05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe
-
Size
1.8MB
-
MD5
5d232371c6b04bf6e609ee14fc06f3f6
-
SHA1
d6b7e0e98b0bd964ce6b2256f7c3f52ea2ec39ba
-
SHA256
05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1
-
SHA512
18b7ae05853bbe0109b3f00861b97951a7963036bbe021b3a2ae178c810257033e249613e522c3a4c16ceaa415f3358b8a052c28f321c6128228f38367991cc6
-
SSDEEP
49152:DT+08U5LLZTm94oY5RMRyAhpXDQt1UJo:DT8EL4I5EfG
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 9 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1220 400 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1416 400 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3648 400 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4752 400 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4336 400 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 524 400 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1604 400 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4920 400 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4488 400 schtasks.exe 82 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe -
resource yara_rule behavioral2/memory/1952-1-0x0000000000CC0000-0x0000000000E8C000-memory.dmp dcrat behavioral2/files/0x000b000000023b62-26.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe -
Executes dropped EXE 1 IoCs
pid Process 3012 RuntimeBroker.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RuntimeBroker.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Java\jdk-1.8\lib\RuntimeBroker.exe 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe File created C:\Program Files\Java\jdk-1.8\lib\9e8d7a4ca61bd9 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\tracing\OfficeClickToRun.exe 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe File created C:\Windows\tracing\e6c9b481da804f 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe File created C:\Windows\addins\RuntimeBroker.exe 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe File created C:\Windows\addins\9e8d7a4ca61bd9 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe File created C:\Windows\tracing\OfficeClickToRun.exe 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4920 schtasks.exe 4488 schtasks.exe 1220 schtasks.exe 1416 schtasks.exe 4752 schtasks.exe 4336 schtasks.exe 1604 schtasks.exe 3648 schtasks.exe 524 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1952 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe 1952 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe 1952 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe 3012 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1952 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe Token: SeDebugPrivilege 3012 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2300 1952 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe 92 PID 1952 wrote to memory of 2300 1952 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe 92 PID 2300 wrote to memory of 112 2300 cmd.exe 94 PID 2300 wrote to memory of 112 2300 cmd.exe 94 PID 2300 wrote to memory of 3012 2300 cmd.exe 95 PID 2300 wrote to memory of 3012 2300 cmd.exe 95 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe"C:\Users\Admin\AppData\Local\Temp\05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1952 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YHzujnjJdX.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:112
-
-
C:\Program Files\Java\jdk-1.8\lib\RuntimeBroker.exe"C:\Program Files\Java\jdk-1.8\lib\RuntimeBroker.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3012
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 8 /tr "'C:\Windows\tracing\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\tracing\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 12 /tr "'C:\Windows\tracing\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Program Files\Java\jdk-1.8\lib\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Java\jdk-1.8\lib\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Program Files\Java\jdk-1.8\lib\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Windows\addins\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\addins\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Windows\addins\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4488
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5c3cee006f04ced272e358e677b242cda
SHA1ceb426dfc6b82c682b09cc36f4f36ab682a2f91e
SHA25618c13e1593ec3f55d65dea8c082cebd7156597dcd38f2127e7a152f25a8696ff
SHA512dfe80e5f56c9325637cc7d68f3c4ed1da4d5cc086d11c993c79099b680cfe9af5d6054553e510fd248a65e3bc2c500fdf9b81d92e4480d6c1ede33b92fad4ff4
-
Filesize
1.8MB
MD55d232371c6b04bf6e609ee14fc06f3f6
SHA1d6b7e0e98b0bd964ce6b2256f7c3f52ea2ec39ba
SHA25605c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1
SHA51218b7ae05853bbe0109b3f00861b97951a7963036bbe021b3a2ae178c810257033e249613e522c3a4c16ceaa415f3358b8a052c28f321c6128228f38367991cc6