Analysis

  • max time kernel
    96s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2025 23:32

General

  • Target

    4b69a0f48caf3523e5c88381a099228e603347664b92dc76e7a5f42754a814cf.exe

  • Size

    682KB

  • MD5

    3e6845042b6b515f56ebf0a1f0fb62dc

  • SHA1

    aa09905cddd7e99653f3ef4bb801d1067c7b3369

  • SHA256

    4b69a0f48caf3523e5c88381a099228e603347664b92dc76e7a5f42754a814cf

  • SHA512

    8070194590310fe4eb0585c23f5d05d10cf8fbb619bae245531ba7e529e677a13290262c64694b4a180ecb83711a0f970048ceec7dd92ba5409bc597791c1dab

  • SSDEEP

    12288:RqnO3mwJNoGFAgHCRvp1i/fjqJRYFInDrX/xTU3JgXDV6blx1wgtra7B:R+O3mwJnCRvEMxnDVSwgY

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 7 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 10 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b69a0f48caf3523e5c88381a099228e603347664b92dc76e7a5f42754a814cf.exe
    "C:\Users\Admin\AppData\Local\Temp\4b69a0f48caf3523e5c88381a099228e603347664b92dc76e7a5f42754a814cf.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4688
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Rouk8dpIOQ.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4632
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2796
        • C:\Windows\System32\KBDSYR1\winlogon.exe
          "C:\Windows\System32\KBDSYR1\winlogon.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:4724
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\bootstat\sysmon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:412
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\KBDSYR1\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4644
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\windowslivelogin\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2020
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\PerfLogs\SppExtComObj.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4120
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\splwow64\sysmon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4548
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "4b69a0f48caf3523e5c88381a099228e603347664b92dc76e7a5f42754a814cf" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI33AF\4b69a0f48caf3523e5c88381a099228e603347664b92dc76e7a5f42754a814cf.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PerfLogs\SppExtComObj.exe

      Filesize

      682KB

      MD5

      59b5be966de12e25c902966445a18739

      SHA1

      0e611dff967c2d7df4d4abf6fdd6c1bada015688

      SHA256

      0ba183c2e9deeb0fb2f0e369d539a879b64f10b56786e7951af9905b239f24c0

      SHA512

      09163324b0fd0a24636fd14c1cae8fb0dea779d668616f99bd7055cb5a326ba041a1e03e9e5f1e9c023e81fd6dd8b7a222af4ea24c4f3c9e9c1bbfba9bad38bb

    • C:\Users\Admin\AppData\Local\Temp\Rouk8dpIOQ.bat

      Filesize

      204B

      MD5

      851f34bc328b3c92c04096c1f6857247

      SHA1

      087a2a83fcf321ab6d51cebb66428e40a4436c34

      SHA256

      bbd583d49beb4609f1acf26bc35bc0c19927063a5380481ad1c21115596f0dab

      SHA512

      9833c39f36719b0382d53a190d514e083711b0a1b42ca175622b626739867c5dc1f6635a894653293f2bd52a4c168b1e7d79497c0b1f0a378bcece253838c647

    • C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI33AF\4b69a0f48caf3523e5c88381a099228e603347664b92dc76e7a5f42754a814cf.exe

      Filesize

      682KB

      MD5

      6d7ae4e6d629cb0ce7cf68db9784c766

      SHA1

      6dde8678c335dd03139b8f5715a6529687bb1ab7

      SHA256

      ae3bd1f2a3907779147e763eda3259f71e901c965b641a243a4b1d6633992d6c

      SHA512

      4898f078e79707892d3b275b140bd991e9e481f6abba4aeada4fc4c5386866b3dc033c583d08f2c7e3f5a015c2e7815a80d6eb475cb567ba61a0d5f524c04df1

    • C:\Windows\System32\KBDSYR1\winlogon.exe

      Filesize

      682KB

      MD5

      b1daa5c95cd896c78bab132658c7fb65

      SHA1

      559eb27faa65a58d9c82ceb5ec2a806640dcf426

      SHA256

      64d17eedb0995dacbddffb88061decea4117b90124130d84d88427a5fcb07e7a

      SHA512

      7da26d035ff3426223f05ed8d328de7138061445863feaa008f0411e5ebf243fd844b1ea9615d3356777575aa1da81ff07394da83dc7e3ecd8c6abfe9085b8ee

    • C:\Windows\System32\windowslivelogin\RuntimeBroker.exe

      Filesize

      682KB

      MD5

      2d604e53a2f7a08a7550fd33c940ee0b

      SHA1

      90b15373af25547ca22b6bd33efa5887055c7381

      SHA256

      5b63537d7b5724e78d09043e6dbac58f0169cc2ebfb15c761d5674fb44488308

      SHA512

      14053161a1b925e53a9e6efcf56f659a3348f7ddfb8f8465bda8e5be66d7a76d9a2f6ef7ba101ade0861ae4ab1228b1e9783c5b00ad48fe741ee947fa544eb23

    • C:\Windows\splwow64\sysmon.exe

      Filesize

      682KB

      MD5

      3e6845042b6b515f56ebf0a1f0fb62dc

      SHA1

      aa09905cddd7e99653f3ef4bb801d1067c7b3369

      SHA256

      4b69a0f48caf3523e5c88381a099228e603347664b92dc76e7a5f42754a814cf

      SHA512

      8070194590310fe4eb0585c23f5d05d10cf8fbb619bae245531ba7e529e677a13290262c64694b4a180ecb83711a0f970048ceec7dd92ba5409bc597791c1dab

    • memory/4688-4-0x0000000000AC0000-0x0000000000ACC000-memory.dmp

      Filesize

      48KB

    • memory/4688-7-0x0000000000B00000-0x0000000000B08000-memory.dmp

      Filesize

      32KB

    • memory/4688-8-0x0000000002520000-0x000000000252C000-memory.dmp

      Filesize

      48KB

    • memory/4688-6-0x0000000000AB0000-0x0000000000ABA000-memory.dmp

      Filesize

      40KB

    • memory/4688-5-0x0000000000AD0000-0x0000000000ADC000-memory.dmp

      Filesize

      48KB

    • memory/4688-0-0x00007FFFA5FC3000-0x00007FFFA5FC5000-memory.dmp

      Filesize

      8KB

    • memory/4688-3-0x00007FFFA5FC0000-0x00007FFFA6A81000-memory.dmp

      Filesize

      10.8MB

    • memory/4688-2-0x0000000000AA0000-0x0000000000AB0000-memory.dmp

      Filesize

      64KB

    • memory/4688-1-0x0000000000240000-0x00000000002F2000-memory.dmp

      Filesize

      712KB

    • memory/4688-99-0x00007FFFA5FC0000-0x00007FFFA6A81000-memory.dmp

      Filesize

      10.8MB

    • memory/4724-103-0x0000000000570000-0x0000000000622000-memory.dmp

      Filesize

      712KB