Analysis
-
max time kernel
95s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 20:17
Behavioral task
behavioral1
Sample
d705a583afd303cbbbddc87d9f4de9387f2f5e10630f46ae4adee5ee5ff180ce.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d705a583afd303cbbbddc87d9f4de9387f2f5e10630f46ae4adee5ee5ff180ce.exe
Resource
win10v2004-20241007-en
General
-
Target
d705a583afd303cbbbddc87d9f4de9387f2f5e10630f46ae4adee5ee5ff180ce.exe
-
Size
2.5MB
-
MD5
2933b54db3817abdc91b58f70ae31b71
-
SHA1
d4b7d3a213882a16e43b37472cf40b50b6573fde
-
SHA256
d705a583afd303cbbbddc87d9f4de9387f2f5e10630f46ae4adee5ee5ff180ce
-
SHA512
a35552886749a4ee9d986f32a5128b81c8df83b152a40d23a16ab04e06e56873cf9b7ba90ebbaeaf14ebf08ce3504fe74941e88a6972eb376551b727725ff764
-
SSDEEP
49152:VbA3GkdXjptfoI3eJIzQ6qTr7X3MFSu+L39lx:VbSXjptfoOeJ56qL8S9/
Malware Config
Signatures
-
DcRat 10 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 5008 schtasks.exe 516 schtasks.exe 4764 schtasks.exe 1600 schtasks.exe 1216 schtasks.exe 2768 schtasks.exe 3712 schtasks.exe 3284 schtasks.exe 1724 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d705a583afd303cbbbddc87d9f4de9387f2f5e10630f46ae4adee5ee5ff180ce.exe -
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/Microsoft\\SppExtComObj.exe\"" PortSurrogate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/Microsoft\\SppExtComObj.exe\", \"C:/Users/Admin/AppData/Local/Microsoft\\csrss.exe\"" PortSurrogate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/Microsoft\\SppExtComObj.exe\", \"C:/Users/Admin/AppData/Local/Microsoft\\csrss.exe\", \"C:/Users/Admin/AppData/Local/Microsoft\\sihost.exe\"" PortSurrogate.exe -
Process spawned unexpected child process 9 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1600 2524 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4764 2524 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5008 2524 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1216 2524 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 516 2524 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2768 2524 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3712 2524 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3284 2524 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1724 2524 schtasks.exe 90 -
resource yara_rule behavioral2/files/0x0007000000023c78-10.dat dcrat behavioral2/memory/1248-13-0x0000000000970000-0x0000000000BC0000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation d705a583afd303cbbbddc87d9f4de9387f2f5e10630f46ae4adee5ee5ff180ce.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation PortSurrogate.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation PortSurrogate.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation PortSurrogate.exe -
Executes dropped EXE 4 IoCs
pid Process 1248 PortSurrogate.exe 3568 PortSurrogate.exe 2188 PortSurrogate.exe 4688 sihost.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:/Users/Admin/AppData/Local/Microsoft\\csrss.exe\"" PortSurrogate.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:/Users/Admin/AppData/Local/Microsoft\\sihost.exe\"" PortSurrogate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:/Users/Admin/AppData/Local/Microsoft\\sihost.exe\"" PortSurrogate.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:/Users/Admin/AppData/Local/Microsoft\\SppExtComObj.exe\"" PortSurrogate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:/Users/Admin/AppData/Local/Microsoft\\SppExtComObj.exe\"" PortSurrogate.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:/Users/Admin/AppData/Local/Microsoft\\csrss.exe\"" PortSurrogate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d705a583afd303cbbbddc87d9f4de9387f2f5e10630f46ae4adee5ee5ff180ce.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings d705a583afd303cbbbddc87d9f4de9387f2f5e10630f46ae4adee5ee5ff180ce.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings PortSurrogate.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings PortSurrogate.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2768 schtasks.exe 3712 schtasks.exe 1600 schtasks.exe 4764 schtasks.exe 5008 schtasks.exe 516 schtasks.exe 1216 schtasks.exe 3284 schtasks.exe 1724 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1248 PortSurrogate.exe 3568 PortSurrogate.exe 2188 PortSurrogate.exe 4688 sihost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1248 PortSurrogate.exe Token: SeDebugPrivilege 3568 PortSurrogate.exe Token: SeDebugPrivilege 2188 PortSurrogate.exe Token: SeDebugPrivilege 4688 sihost.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 768 wrote to memory of 4752 768 d705a583afd303cbbbddc87d9f4de9387f2f5e10630f46ae4adee5ee5ff180ce.exe 85 PID 768 wrote to memory of 4752 768 d705a583afd303cbbbddc87d9f4de9387f2f5e10630f46ae4adee5ee5ff180ce.exe 85 PID 768 wrote to memory of 4752 768 d705a583afd303cbbbddc87d9f4de9387f2f5e10630f46ae4adee5ee5ff180ce.exe 85 PID 4752 wrote to memory of 4684 4752 WScript.exe 87 PID 4752 wrote to memory of 4684 4752 WScript.exe 87 PID 4752 wrote to memory of 4684 4752 WScript.exe 87 PID 4684 wrote to memory of 1248 4684 cmd.exe 89 PID 4684 wrote to memory of 1248 4684 cmd.exe 89 PID 1248 wrote to memory of 1708 1248 PortSurrogate.exe 95 PID 1248 wrote to memory of 1708 1248 PortSurrogate.exe 95 PID 1708 wrote to memory of 4788 1708 cmd.exe 97 PID 1708 wrote to memory of 4788 1708 cmd.exe 97 PID 1708 wrote to memory of 3568 1708 cmd.exe 104 PID 1708 wrote to memory of 3568 1708 cmd.exe 104 PID 3568 wrote to memory of 2188 3568 PortSurrogate.exe 110 PID 3568 wrote to memory of 2188 3568 PortSurrogate.exe 110 PID 2188 wrote to memory of 1236 2188 PortSurrogate.exe 114 PID 2188 wrote to memory of 1236 2188 PortSurrogate.exe 114 PID 1236 wrote to memory of 1528 1236 cmd.exe 116 PID 1236 wrote to memory of 1528 1236 cmd.exe 116 PID 1236 wrote to memory of 4688 1236 cmd.exe 122 PID 1236 wrote to memory of 4688 1236 cmd.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d705a583afd303cbbbddc87d9f4de9387f2f5e10630f46ae4adee5ee5ff180ce.exe"C:\Users\Admin\AppData\Local\Temp\d705a583afd303cbbbddc87d9f4de9387f2f5e10630f46ae4adee5ee5ff180ce.exe"1⤵
- DcRat
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\runtimehost\3mkQ5Vei8pV9InhfGoeqDlnAiAlSPa.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\runtimehost\PdpiKuXv6EuFyAXFTWqHw2RT.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\runtimehost\PortSurrogate.exe"C:\runtimehost\PortSurrogate.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VTM87GbbOd.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:4788
-
-
C:\runtimehost\PortSurrogate.exe"C:\runtimehost\PortSurrogate.exe"6⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\runtimehost\PortSurrogate.exe"C:\runtimehost\PortSurrogate.exe"7⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ohTc3gFaZ1.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:1528
-
-
C:\Users\Admin\AppData\Local\Microsoft\sihost.exe"C:/Users/Admin/AppData/Local/Microsoft\sihost.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 11 /tr "'C:/Users/Admin/AppData/Local/Microsoft\SppExtComObj.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/Microsoft\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 7 /tr "'C:/Users/Admin/AppData/Local/Microsoft\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:/Users/Admin/AppData/Local/Microsoft\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/Microsoft\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:/Users/Admin/AppData/Local/Microsoft\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 11 /tr "'C:/Users/Admin/AppData/Local/Microsoft\sihost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/Microsoft\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:/Users/Admin/AppData/Local/Microsoft\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bbb951a34b516b66451218a3ec3b0ae1
SHA17393835a2476ae655916e0a9687eeaba3ee876e9
SHA256eb70c64ae99d14ac2588b7a84854fbf3c420532d7fe4dfd49c7b5a70c869943a
SHA51263bcbfcf8e7421c66855c487c31b2991a989bdea0c1edd4c40066b52fa3eb3d9d37db1cd21b8eb4f33dd5870cc20532c8f485eab9c0b4f6b0793a35c077f2d6f
-
Filesize
197B
MD52d6eb6928a437dbbd77bc917d8f9ea3b
SHA1c8bf916f1c807b61fa0ab5b76f5fa54073868f72
SHA256e8ac48cae6bb26a095f4a7e2f3ed114e196f5eec1fd88f81ad9c613419f0bcb7
SHA512d31492368d921674c758c05f5da8d822d95d3d018b4044a3acf91eeac6ee17622fd14cdb2052ccb775af6b8e0b9164edbb00652df47e25a478de6ce62ce68fc0
-
Filesize
214B
MD52a430c38d3afe3e3edc0b9cbe5dd8fd3
SHA1e1203ddee7f0f0ec777fbcaa895429d7be9c97a5
SHA2562e60f107368aad9e5d51ebb411d694a0d5547a37214bf6b6c6a00667e9ecd4cf
SHA512d899f07dc66bca3cb35ad67ffcf22ef4b88f0eec5894b52789581848b2f0b0379695b8c33a1988e12e2a84a66b32d6cb5ad4464e9129f765bf44aa0144966345
-
Filesize
212B
MD58a7b7145f3e1dc4cd5535ad5c8fad2d4
SHA1871db235a3ee0f38a6b286552d94352cc7af7d73
SHA256bedaae27cc003eabe1573c8f084c91782b3b245dc0e7b4da6781e795edeee370
SHA5129e5412732ba683b28b0d2176f0d3a504065a2ce56c1e3539d65dc413499d85071ef82675aaa8019b16903d681eb50f35b133bb88b48cf509d2f8242e8c717692
-
Filesize
34B
MD5f88bbae1814263b066d3d191d28e71b7
SHA11c1cdbfa0aa34e5240856f00cddffe2dccd94d2a
SHA2560e058470ed95daa5da5075a4047a7f2090bcbb439ce975ff78bff72af9bc5035
SHA512c0f47280c8559c5aef969e2f97e7787331daf3dd20c8f4c9b4d829a976a718b9888764babf4c200e15cbdb7bfd34f8cc07300b6ef23beff45b6f20fd9782eebf
-
Filesize
2.3MB
MD576842313355a159ae3f15beb42b7523c
SHA1f07888bc191e4d7f42908b66a1ae9600a5d82d4e
SHA256a2b1a70b88ad260dadf9f99d38f850e7256e3f9ba6f1d96ac017c70d81f7c262
SHA5129f66f217faacf5ed8684b778b305cdfd3c66f99e11fc0adb330221db2f75c5d2798a701b8a55aa7da94fead1fd94052242e094313c641d5b21c3e314667ce330