Analysis
-
max time kernel
18s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 07:03
Behavioral task
behavioral1
Sample
c9fb18f99fe5ec760114c23a3645ceba3686687e88a795031ae982f51e657c78.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c9fb18f99fe5ec760114c23a3645ceba3686687e88a795031ae982f51e657c78.exe
Resource
win10v2004-20241007-en
General
-
Target
c9fb18f99fe5ec760114c23a3645ceba3686687e88a795031ae982f51e657c78.exe
-
Size
1.3MB
-
MD5
f3041cba53d0b7300f3b4301f4debd38
-
SHA1
a629e35f972a00051cf86020f113be26ea95462c
-
SHA256
c9fb18f99fe5ec760114c23a3645ceba3686687e88a795031ae982f51e657c78
-
SHA512
8e285ceebeb6c3bde8cb240d3703b1d5744ca70d3b19ae6a44b03666293363a6122ab9dc58899693dda907c00813f09ee1d366901a1eea3dc15ea9ebfdd37c88
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjCR:UbA30GnzV/q+DnsXg3
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 2664 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 984 2664 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2668 2664 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2536 2664 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2556 2664 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 2664 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x0008000000018bf3-10.dat dcrat behavioral1/memory/2792-13-0x0000000000DD0000-0x0000000000EE0000-memory.dmp dcrat behavioral1/memory/1704-45-0x0000000000D70000-0x0000000000E80000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2580 powershell.exe 2528 powershell.exe 2560 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2792 DllCommonsvc.exe 1704 spoolsv.exe -
Loads dropped DLL 2 IoCs
pid Process 864 cmd.exe 864 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\spoolsv.exe DllCommonsvc.exe File opened for modification C:\Windows\AppCompat\Programs\spoolsv.exe DllCommonsvc.exe File created C:\Windows\AppCompat\Programs\f3b6ecef712a24 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9fb18f99fe5ec760114c23a3645ceba3686687e88a795031ae982f51e657c78.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2760 schtasks.exe 984 schtasks.exe 2668 schtasks.exe 2536 schtasks.exe 2556 schtasks.exe 2508 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2792 DllCommonsvc.exe 2560 powershell.exe 2580 powershell.exe 2528 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2792 DllCommonsvc.exe Token: SeDebugPrivilege 2560 powershell.exe Token: SeDebugPrivilege 2580 powershell.exe Token: SeDebugPrivilege 2528 powershell.exe Token: SeDebugPrivilege 1704 spoolsv.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2388 2280 c9fb18f99fe5ec760114c23a3645ceba3686687e88a795031ae982f51e657c78.exe 30 PID 2280 wrote to memory of 2388 2280 c9fb18f99fe5ec760114c23a3645ceba3686687e88a795031ae982f51e657c78.exe 30 PID 2280 wrote to memory of 2388 2280 c9fb18f99fe5ec760114c23a3645ceba3686687e88a795031ae982f51e657c78.exe 30 PID 2280 wrote to memory of 2388 2280 c9fb18f99fe5ec760114c23a3645ceba3686687e88a795031ae982f51e657c78.exe 30 PID 2388 wrote to memory of 864 2388 WScript.exe 31 PID 2388 wrote to memory of 864 2388 WScript.exe 31 PID 2388 wrote to memory of 864 2388 WScript.exe 31 PID 2388 wrote to memory of 864 2388 WScript.exe 31 PID 864 wrote to memory of 2792 864 cmd.exe 33 PID 864 wrote to memory of 2792 864 cmd.exe 33 PID 864 wrote to memory of 2792 864 cmd.exe 33 PID 864 wrote to memory of 2792 864 cmd.exe 33 PID 2792 wrote to memory of 2528 2792 DllCommonsvc.exe 41 PID 2792 wrote to memory of 2528 2792 DllCommonsvc.exe 41 PID 2792 wrote to memory of 2528 2792 DllCommonsvc.exe 41 PID 2792 wrote to memory of 2560 2792 DllCommonsvc.exe 42 PID 2792 wrote to memory of 2560 2792 DllCommonsvc.exe 42 PID 2792 wrote to memory of 2560 2792 DllCommonsvc.exe 42 PID 2792 wrote to memory of 2580 2792 DllCommonsvc.exe 43 PID 2792 wrote to memory of 2580 2792 DllCommonsvc.exe 43 PID 2792 wrote to memory of 2580 2792 DllCommonsvc.exe 43 PID 2792 wrote to memory of 288 2792 DllCommonsvc.exe 47 PID 2792 wrote to memory of 288 2792 DllCommonsvc.exe 47 PID 2792 wrote to memory of 288 2792 DllCommonsvc.exe 47 PID 288 wrote to memory of 1244 288 cmd.exe 49 PID 288 wrote to memory of 1244 288 cmd.exe 49 PID 288 wrote to memory of 1244 288 cmd.exe 49 PID 288 wrote to memory of 1704 288 cmd.exe 51 PID 288 wrote to memory of 1704 288 cmd.exe 51 PID 288 wrote to memory of 1704 288 cmd.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9fb18f99fe5ec760114c23a3645ceba3686687e88a795031ae982f51e657c78.exe"C:\Users\Admin\AppData\Local\Temp\c9fb18f99fe5ec760114c23a3645ceba3686687e88a795031ae982f51e657c78.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:864 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\AppCompat\Programs\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\yAg1i3HYFu.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1244
-
-
C:\Windows\AppCompat\Programs\spoolsv.exe"C:\Windows\AppCompat\Programs\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Windows\AppCompat\Programs\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\AppCompat\Programs\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Windows\AppCompat\Programs\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\providercommon\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\providercommon\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\providercommon\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206B
MD57aaf7c1b7238a1f98e337d0115e065c7
SHA1263c4b02b480237838ed7c7b2d3f66cfe6eb076c
SHA2566642a18b8335328f067794d0e3e49846ef77664ea29c8c79d2cd86a36a540fab
SHA5129901f63effc55c149e9ec3c8046ce881b17ae104b9abbaa6dcabc017aecc479e1c76d2eef2d0d1f9da2b12505fa0cafc2c2bd5a1f4f64160888f16995f09ed3f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD522f706c37b7f5431a32ee8963019396d
SHA18d5462519a1608ed0669aba217429e6899e5ad5b
SHA2569533c1e7ec34f18140e9449079f14f6dda8bc1cf97c6dccb722afb8056331553
SHA512b7804585241bdfe595652d30b18c1d127d3763c733090356dcf78aae9150ddb80c82b5ce99d870572cb18edfe0b4b4df526c5372398c9f6752ceabd7f9f54ad0
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478