Analysis
-
max time kernel
94s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 21:16
Behavioral task
behavioral1
Sample
50887c3ed5676401f9cab09d742bbce4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
50887c3ed5676401f9cab09d742bbce4.exe
Resource
win10v2004-20241007-en
General
-
Target
50887c3ed5676401f9cab09d742bbce4.exe
-
Size
827KB
-
MD5
50887c3ed5676401f9cab09d742bbce4
-
SHA1
1e4016e50cffe51614df5a31817d50de7b85af26
-
SHA256
a22e4b92ef53c22a69ef02fa17403fcdf74d3c4b3efc8d28604040286f4cdedf
-
SHA512
bd8ec53d02ba47c8656c4260d2112f50755526898b681d1affbd50a6bdda69f01fa78d091ff812d3a25454afd03eca815fea7b869f037b4f492b1d188f376ab2
-
SSDEEP
12288:2NultHBphsl8LvoS8wXO0DzXLYFlTvyk31:ZHBp+ovohwDeTv131
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3412 2780 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2408 2780 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 320 2780 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4024 2780 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 432 2780 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3452 2780 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3048 2780 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3936 2780 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4848 2780 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4880 2780 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4012 2780 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1828 2780 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4288 2780 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 2780 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4584 2780 schtasks.exe 82 -
resource yara_rule behavioral2/memory/4564-1-0x0000000000B70000-0x0000000000C46000-memory.dmp dcrat behavioral2/files/0x000a000000023b84-11.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 50887c3ed5676401f9cab09d742bbce4.exe -
Executes dropped EXE 1 IoCs
pid Process 2812 RuntimeBroker.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RuntimeBroker.exe 50887c3ed5676401f9cab09d742bbce4.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RuntimeBroker.exe 50887c3ed5676401f9cab09d742bbce4.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\9e8d7a4ca61bd9 50887c3ed5676401f9cab09d742bbce4.exe File created C:\Program Files (x86)\MSBuild\OfficeClickToRun.exe 50887c3ed5676401f9cab09d742bbce4.exe File created C:\Program Files (x86)\MSBuild\e6c9b481da804f 50887c3ed5676401f9cab09d742bbce4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Speech\smss.exe 50887c3ed5676401f9cab09d742bbce4.exe File created C:\Windows\Speech\69ddcba757bf72 50887c3ed5676401f9cab09d742bbce4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 50887c3ed5676401f9cab09d742bbce4.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3452 schtasks.exe 4012 schtasks.exe 2408 schtasks.exe 3936 schtasks.exe 4848 schtasks.exe 4584 schtasks.exe 4024 schtasks.exe 432 schtasks.exe 3048 schtasks.exe 4288 schtasks.exe 3020 schtasks.exe 3412 schtasks.exe 320 schtasks.exe 4880 schtasks.exe 1828 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4564 50887c3ed5676401f9cab09d742bbce4.exe 4564 50887c3ed5676401f9cab09d742bbce4.exe 4564 50887c3ed5676401f9cab09d742bbce4.exe 4564 50887c3ed5676401f9cab09d742bbce4.exe 4564 50887c3ed5676401f9cab09d742bbce4.exe 4564 50887c3ed5676401f9cab09d742bbce4.exe 4564 50887c3ed5676401f9cab09d742bbce4.exe 4564 50887c3ed5676401f9cab09d742bbce4.exe 4564 50887c3ed5676401f9cab09d742bbce4.exe 2812 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4564 50887c3ed5676401f9cab09d742bbce4.exe Token: SeDebugPrivilege 2812 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4564 wrote to memory of 2020 4564 50887c3ed5676401f9cab09d742bbce4.exe 98 PID 4564 wrote to memory of 2020 4564 50887c3ed5676401f9cab09d742bbce4.exe 98 PID 2020 wrote to memory of 4920 2020 cmd.exe 100 PID 2020 wrote to memory of 4920 2020 cmd.exe 100 PID 2020 wrote to memory of 2812 2020 cmd.exe 101 PID 2020 wrote to memory of 2812 2020 cmd.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\50887c3ed5676401f9cab09d742bbce4.exe"C:\Users\Admin\AppData\Local\Temp\50887c3ed5676401f9cab09d742bbce4.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SwwJiUUJDt.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:4920
-
-
C:\Program Files (x86)\Windows Sidebar\Gadgets\RuntimeBroker.exe"C:\Program Files (x86)\Windows Sidebar\Gadgets\RuntimeBroker.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\MSBuild\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\MSBuild\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Windows\Speech\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\Speech\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Windows\Speech\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Users\All Users\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD550887c3ed5676401f9cab09d742bbce4
SHA11e4016e50cffe51614df5a31817d50de7b85af26
SHA256a22e4b92ef53c22a69ef02fa17403fcdf74d3c4b3efc8d28604040286f4cdedf
SHA512bd8ec53d02ba47c8656c4260d2112f50755526898b681d1affbd50a6bdda69f01fa78d091ff812d3a25454afd03eca815fea7b869f037b4f492b1d188f376ab2
-
Filesize
229B
MD5f5230256cdebba7e50c93730ce31d065
SHA1ec8d94efcce8b5b06838b7bf0b133fd067151f20
SHA25637b65b1ad4f105ac2eb201f4e0baea19e1831f7edc8c3ad2370423d67c9d7081
SHA5124dcaf4ac3d76df2141c9ac1b42c21ae54d2aad57a1c0d3799e24f37f6931601e8515ef2d72494be576a8c7d1a5889994aef6717d96ce22fdb696039e3da3195b