Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2025 18:11

General

  • Target

    3c85ad90afa66cd4c5d1cccf63adc862.exe

  • Size

    4.2MB

  • MD5

    3c85ad90afa66cd4c5d1cccf63adc862

  • SHA1

    ed3e4c1e2c9d3d588c48a855cad21dfe0a556930

  • SHA256

    00564ed0e7500f4ed88ae136b1c140425556bf536c6bd8c6c74b7d9665d6fe20

  • SHA512

    9358c25d694a546dfa91faddb9517a5f3b8602364cc0e3b5ec55818dd49b111f09b7635f646670a56da3e77e179630120ce034f8a3bb73b39df6b35739766e87

  • SSDEEP

    98304:fbNBi6P/9/7w3zThAILRk5/919K6K2ze2jIN:fBV9/7azT+ILcxKR2fjIN

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 21 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 12 IoCs
  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 21 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • System policy modification 1 TTPs 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c85ad90afa66cd4c5d1cccf63adc862.exe
    "C:\Users\Admin\AppData\Local\Temp\3c85ad90afa66cd4c5d1cccf63adc862.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Hypercontainer\vn0WDvdQhnymz38qOIXaYP3Vb.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2188
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Hypercontainer\n880E6sbFEumx9tx.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4368
        • C:\Hypercontainer\blockwin.exe
          "C:\Hypercontainer\blockwin.exe"
          4⤵
          • UAC bypass
          • Checks computer location settings
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:4756
          • C:\Program Files\VideoLAN\VLC\lua\playlist\unsecapp.exe
            "C:\Program Files\VideoLAN\VLC\lua\playlist\unsecapp.exe"
            5⤵
            • UAC bypass
            • Checks computer location settings
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:1664
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9f352090-cb3b-4ac8-8a9e-1f18ecd08e4b.vbs"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4336
              • C:\Program Files\VideoLAN\VLC\lua\playlist\unsecapp.exe
                "C:\Program Files\VideoLAN\VLC\lua\playlist\unsecapp.exe"
                7⤵
                • UAC bypass
                • Checks computer location settings
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:396
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\35339d06-c9da-497f-b191-79cbb14adb3a.vbs"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4760
                  • C:\Program Files\VideoLAN\VLC\lua\playlist\unsecapp.exe
                    "C:\Program Files\VideoLAN\VLC\lua\playlist\unsecapp.exe"
                    9⤵
                    • UAC bypass
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Checks whether UAC is enabled
                    • Modifies registry class
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    • System policy modification
                    PID:2400
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0c536261-b78d-411c-87e0-f83a666611da.vbs"
                      10⤵
                        PID:3896
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5db17821-447b-481b-aba3-2d26d4408720.vbs"
                        10⤵
                          PID:1472
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\509574fb-1320-4112-8747-bb647448d91c.vbs"
                      8⤵
                        PID:540
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9a29feaf-e3c5-4a95-9656-c881d6b8a795.vbs"
                    6⤵
                      PID:4516
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 13 /tr "'C:\Hypercontainer\sysmon.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4840
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Hypercontainer\sysmon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4796
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 11 /tr "'C:\Hypercontainer\sysmon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3860
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3360
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1440
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3756
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 7 /tr "'C:\Program Files\Internet Explorer\sysmon.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2224
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\sysmon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:5100
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 13 /tr "'C:\Program Files\Internet Explorer\sysmon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3564
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 10 /tr "'C:\Program Files\VideoLAN\VLC\lua\playlist\unsecapp.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:216
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\lua\playlist\unsecapp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4024
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 9 /tr "'C:\Program Files\VideoLAN\VLC\lua\playlist\unsecapp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2340
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Windows\DiagTrack\OfficeClickToRun.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3748
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\DiagTrack\OfficeClickToRun.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3828
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Windows\DiagTrack\OfficeClickToRun.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4736
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\System.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4576
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3076
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1848
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 12 /tr "'C:\Windows\Registration\CRMLog\sysmon.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:448
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\Registration\CRMLog\sysmon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:444
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 12 /tr "'C:\Windows\Registration\CRMLog\sysmon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4884

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Hypercontainer\blockwin.exe

            Filesize

            3.7MB

            MD5

            3e2ca8a03a09e9232a24945d78e87398

            SHA1

            26c4f20fe3fbfe14f27611c949ca7989ecf7dbd8

            SHA256

            64e73ffba3cbf8754b24831016a6a9ce43a1e0b111b898f528e7be65f88a5357

            SHA512

            9e7ad75b2d2689ae92a843a50180df34d04b3728a1783c8f9d3dd2dd725e68290e32e022cb0129732b2fc968807aa07a9e91fc25c4f5fb0a0a1bba61f44dbf6c

          • C:\Hypercontainer\n880E6sbFEumx9tx.bat

            Filesize

            32B

            MD5

            1fe47a1f963b69d57e6ea01cd6153758

            SHA1

            2f4fa015c8558811c0928f9dc4e919609a3364c3

            SHA256

            2974ac71a1c7925397ca4bbad37392f1fdde5dbdfad8f7f96acb85a1877caa13

            SHA512

            69318cbce7b6b65f29aa6835079aca0222806d28dc053d4bdc5148ff48cb5d16315726c77dbdece621b15e7ff2b61d80182cecbbccaa1080f2353d053a2d0970

          • C:\Hypercontainer\vn0WDvdQhnymz38qOIXaYP3Vb.vbe

            Filesize

            207B

            MD5

            8b836240f8332ed3aea9a1a7f923a808

            SHA1

            036cd5a0ab5ddae9d53f66111e408ca315308505

            SHA256

            007155d2a8af49ef8544c930d7e3b860ef796f788544aa118ed61c0ef80ae579

            SHA512

            67a96622f17c0a0146f71f22a3ec4a2851398cbcc2d8883eb5b0b4546ac4cbb2894fd1acf303aedf0a9932e7a6aa3ae0e45491ee5aaac0df6d7b0196eb49747f

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\unsecapp.exe.log

            Filesize

            1KB

            MD5

            49b64127208271d8f797256057d0b006

            SHA1

            b99bd7e2b4e9ed24de47fb3341ea67660b84cca1

            SHA256

            2a5d403a2e649d8eceef8f785eeb0f6d33888ec6bbf251b3c347e34cb32b1e77

            SHA512

            f7c728923c893dc9bc88ad2159e0abcda41e1b40ff7e7756e6252d135ed238a2248a2662b3392449836dd1b0b580f0c866cc33e409527484fe4602e3d3f10e3e

          • C:\Users\Admin\AppData\Local\Temp\0c536261-b78d-411c-87e0-f83a666611da.vbs

            Filesize

            731B

            MD5

            b3d60f55bd61ca60bec5446da2aebd0d

            SHA1

            3b396bef01234a5adc3e2c02091403fb9d4989fe

            SHA256

            79f145bd4c6347c47431ce1155788783ec060a876ba1237e937ffcc67e831eba

            SHA512

            3eb0b0a429c34c77d3381d81874a48e12bce9192cfc355b6ddc355c6f82a168079e933501e63188608cf974be116517cc700c2f1081cb258484cfcbf3832fd19

          • C:\Users\Admin\AppData\Local\Temp\35339d06-c9da-497f-b191-79cbb14adb3a.vbs

            Filesize

            730B

            MD5

            d8407f86b0a7550e219b454217f6ba0e

            SHA1

            7a43c658ae099cac69766c03663a0e215d384b5c

            SHA256

            44f23083d85fe3935132f59203a03a76cd8226d74d59f9484ddd0a71581530c1

            SHA512

            ae1fce67792ae9e18646e87001d62e326997041e0a567ee84b1761c60bac32902af5caaaed937b9940757100ddf1c57aa050388c400d258495a9ff9dfd0cc728

          • C:\Users\Admin\AppData\Local\Temp\9a29feaf-e3c5-4a95-9656-c881d6b8a795.vbs

            Filesize

            507B

            MD5

            e92a950972e8a4d2b14dd92d13642e72

            SHA1

            ba933ce746d7261fdad6d2aae64609663e53a36f

            SHA256

            e85cd25412e3c33e864dc6b0fa106fc47850de7b1023bfc9536b94cf59f5ece6

            SHA512

            cfbedcc055d38e30fd8a56d82ec8fca3e3a9d7fbf544a4f5eb13a4fc06070e93d9ed9010f3e55a45a2cddd2d64ad210f9e32448fc1191440cf37643cfee30e20

          • C:\Users\Admin\AppData\Local\Temp\9f352090-cb3b-4ac8-8a9e-1f18ecd08e4b.vbs

            Filesize

            731B

            MD5

            006edea59bf9f8aa0c2ebcf173400640

            SHA1

            c41fc0ef8edea38f670d0077346567973ad0b28b

            SHA256

            1624158a0e88c551198d45af19bf14247aedc3e0167e202c14fabd1b5851dc4f

            SHA512

            0a2c5bdf4ca396b74873d9b57671d525e33ed7fc0a69f957222056cffce1ceebb5aabecbb74660a04c4dd9dc09a1526a6f2d499d5295a234505033e65ce54d81

          • memory/396-72-0x0000000002800000-0x0000000002812000-memory.dmp

            Filesize

            72KB

          • memory/4756-26-0x000000001BB50000-0x000000001BB5C000-memory.dmp

            Filesize

            48KB

          • memory/4756-30-0x000000001BCE0000-0x000000001BCEE000-memory.dmp

            Filesize

            56KB

          • memory/4756-20-0x000000001B290000-0x000000001B29A000-memory.dmp

            Filesize

            40KB

          • memory/4756-21-0x000000001BAC0000-0x000000001BB16000-memory.dmp

            Filesize

            344KB

          • memory/4756-22-0x000000001B2A0000-0x000000001B2AC000-memory.dmp

            Filesize

            48KB

          • memory/4756-23-0x000000001BB10000-0x000000001BB22000-memory.dmp

            Filesize

            72KB

          • memory/4756-24-0x000000001C070000-0x000000001C598000-memory.dmp

            Filesize

            5.2MB

          • memory/4756-18-0x000000001B260000-0x000000001B276000-memory.dmp

            Filesize

            88KB

          • memory/4756-29-0x000000001BCD0000-0x000000001BCDA000-memory.dmp

            Filesize

            40KB

          • memory/4756-32-0x000000001BD00000-0x000000001BD0E000-memory.dmp

            Filesize

            56KB

          • memory/4756-31-0x000000001BCF0000-0x000000001BCF8000-memory.dmp

            Filesize

            32KB

          • memory/4756-19-0x000000001B280000-0x000000001B28C000-memory.dmp

            Filesize

            48KB

          • memory/4756-28-0x000000001BBC0000-0x000000001BBC8000-memory.dmp

            Filesize

            32KB

          • memory/4756-27-0x000000001BB60000-0x000000001BB68000-memory.dmp

            Filesize

            32KB

          • memory/4756-25-0x000000001BB40000-0x000000001BB48000-memory.dmp

            Filesize

            32KB

          • memory/4756-33-0x000000001BBE0000-0x000000001BBEA000-memory.dmp

            Filesize

            40KB

          • memory/4756-34-0x000000001BBF0000-0x000000001BBFC000-memory.dmp

            Filesize

            48KB

          • memory/4756-17-0x000000001B250000-0x000000001B258000-memory.dmp

            Filesize

            32KB

          • memory/4756-16-0x000000001B8C0000-0x000000001B910000-memory.dmp

            Filesize

            320KB

          • memory/4756-15-0x000000001B230000-0x000000001B24C000-memory.dmp

            Filesize

            112KB

          • memory/4756-14-0x000000001B220000-0x000000001B22E000-memory.dmp

            Filesize

            56KB

          • memory/4756-13-0x0000000000260000-0x0000000000620000-memory.dmp

            Filesize

            3.8MB

          • memory/4756-12-0x00007FF98B033000-0x00007FF98B035000-memory.dmp

            Filesize

            8KB