Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2025 02:01

General

  • Target

    00564ed0e7500f4ed88ae136b1c140425556bf536c6bd8c6c74b7d9665d6fe20.exe

  • Size

    4.2MB

  • MD5

    3c85ad90afa66cd4c5d1cccf63adc862

  • SHA1

    ed3e4c1e2c9d3d588c48a855cad21dfe0a556930

  • SHA256

    00564ed0e7500f4ed88ae136b1c140425556bf536c6bd8c6c74b7d9665d6fe20

  • SHA512

    9358c25d694a546dfa91faddb9517a5f3b8602364cc0e3b5ec55818dd49b111f09b7635f646670a56da3e77e179630120ce034f8a3bb73b39df6b35739766e87

  • SSDEEP

    98304:fbNBi6P/9/7w3zThAILRk5/919K6K2ze2jIN:fBV9/7azT+ILcxKR2fjIN

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 12 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 12 IoCs
  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • System policy modification 1 TTPs 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\00564ed0e7500f4ed88ae136b1c140425556bf536c6bd8c6c74b7d9665d6fe20.exe
    "C:\Users\Admin\AppData\Local\Temp\00564ed0e7500f4ed88ae136b1c140425556bf536c6bd8c6c74b7d9665d6fe20.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Hypercontainer\vn0WDvdQhnymz38qOIXaYP3Vb.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Hypercontainer\n880E6sbFEumx9tx.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2896
        • C:\Hypercontainer\blockwin.exe
          "C:\Hypercontainer\blockwin.exe"
          4⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2488
          • C:\Program Files (x86)\Common Files\SpeechEngines\blockwin.exe
            "C:\Program Files (x86)\Common Files\SpeechEngines\blockwin.exe"
            5⤵
            • UAC bypass
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2612
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\275de0cd-7276-4803-8a4d-33cff4733a3d.vbs"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:764
              • C:\Program Files (x86)\Common Files\SpeechEngines\blockwin.exe
                "C:\Program Files (x86)\Common Files\SpeechEngines\blockwin.exe"
                7⤵
                • UAC bypass
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:2952
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\96b01fd7-078e-4650-80f9-feb3dd435e9c.vbs"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2848
                  • C:\Program Files (x86)\Common Files\SpeechEngines\blockwin.exe
                    "C:\Program Files (x86)\Common Files\SpeechEngines\blockwin.exe"
                    9⤵
                    • UAC bypass
                    • Executes dropped EXE
                    • Checks whether UAC is enabled
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    • System policy modification
                    PID:2884
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6e5eb973-7efe-499e-a290-3de6d6afc9ee.vbs"
                      10⤵
                        PID:1708
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7f3d655a-fa79-4b64-9f5e-0db3ad35940f.vbs"
                        10⤵
                          PID:2120
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\182fc6b5-e2cb-4f90-8eb9-912aa57736cf.vbs"
                      8⤵
                        PID:1684
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9a49dafa-2608-4b23-bb84-981386308984.vbs"
                    6⤵
                      PID:2388
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\conhost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1732
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\conhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1772
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\conhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1276
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Hypercontainer\Idle.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2548
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Hypercontainer\Idle.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1548
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Hypercontainer\Idle.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1904
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "blockwinb" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Common Files\SpeechEngines\blockwin.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2512
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "blockwin" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\SpeechEngines\blockwin.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2236
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "blockwinb" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Common Files\SpeechEngines\blockwin.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2432
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\cmd.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2348
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\cmd.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:884
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 14 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\cmd.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:972

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Hypercontainer\blockwin.exe

            Filesize

            3.7MB

            MD5

            3e2ca8a03a09e9232a24945d78e87398

            SHA1

            26c4f20fe3fbfe14f27611c949ca7989ecf7dbd8

            SHA256

            64e73ffba3cbf8754b24831016a6a9ce43a1e0b111b898f528e7be65f88a5357

            SHA512

            9e7ad75b2d2689ae92a843a50180df34d04b3728a1783c8f9d3dd2dd725e68290e32e022cb0129732b2fc968807aa07a9e91fc25c4f5fb0a0a1bba61f44dbf6c

          • C:\Hypercontainer\n880E6sbFEumx9tx.bat

            Filesize

            32B

            MD5

            1fe47a1f963b69d57e6ea01cd6153758

            SHA1

            2f4fa015c8558811c0928f9dc4e919609a3364c3

            SHA256

            2974ac71a1c7925397ca4bbad37392f1fdde5dbdfad8f7f96acb85a1877caa13

            SHA512

            69318cbce7b6b65f29aa6835079aca0222806d28dc053d4bdc5148ff48cb5d16315726c77dbdece621b15e7ff2b61d80182cecbbccaa1080f2353d053a2d0970

          • C:\Hypercontainer\vn0WDvdQhnymz38qOIXaYP3Vb.vbe

            Filesize

            207B

            MD5

            8b836240f8332ed3aea9a1a7f923a808

            SHA1

            036cd5a0ab5ddae9d53f66111e408ca315308505

            SHA256

            007155d2a8af49ef8544c930d7e3b860ef796f788544aa118ed61c0ef80ae579

            SHA512

            67a96622f17c0a0146f71f22a3ec4a2851398cbcc2d8883eb5b0b4546ac4cbb2894fd1acf303aedf0a9932e7a6aa3ae0e45491ee5aaac0df6d7b0196eb49747f

          • C:\Users\Admin\AppData\Local\Temp\275de0cd-7276-4803-8a4d-33cff4733a3d.vbs

            Filesize

            738B

            MD5

            5f9446645bd10c9911390a78414072c5

            SHA1

            1d2de617e4e86d2bfc1fb87c267e5d59f374aba8

            SHA256

            34854665c2673fd1c17b0f556e9b41c759036e07765b76bcd36de4daa90977ed

            SHA512

            1e7f3f6150fe2c5cd4a409686d3a0dd0490c559ff404d72e3fb3f4c6f7b5058fa9d99245f6adfbb64bf8b225d8fd4b66ecbbcf58505564393822448e5198bc6e

          • C:\Users\Admin\AppData\Local\Temp\53bf1e73d06f439e882894ef4843377dba0b9512.exe

            Filesize

            3.7MB

            MD5

            7232aecad120b4e4793aafaa02533c9f

            SHA1

            35bbccc56f4845eae362585e4f6d954306d193b7

            SHA256

            081a23193d3df78576be34a1e5efd93ad3695f7a657dd13f73281bd93c68ba68

            SHA512

            54e3d84d702bd3c21d33ea0f35893df7345ef76f529a0807c78c875d83e9d31b79b797e3e0af5b3834ab52c1826d244a6605138f9aff42928f825316c59d1271

          • C:\Users\Admin\AppData\Local\Temp\6e5eb973-7efe-499e-a290-3de6d6afc9ee.vbs

            Filesize

            738B

            MD5

            6ca8d03ee3524765efe7bc5035d9f574

            SHA1

            230b623931a078b067be63e4a57d137b5e721084

            SHA256

            39b467e0ad72cfc88a32894eec8c899656e5050005f2e700bfe3fe0351afc075

            SHA512

            74f1d272cf4c2305792bc000969fb5222d77998b7194532a2a4d9f55937c12b1263e764173b1c537b6db8ff8475fb49f4f40e52c57bbbdc0feb88e58bcaab5ee

          • C:\Users\Admin\AppData\Local\Temp\96b01fd7-078e-4650-80f9-feb3dd435e9c.vbs

            Filesize

            738B

            MD5

            feea41c310760874a6d3ba26f68cae87

            SHA1

            f6948ccb2be60c2728c34336013f7ebe124a193e

            SHA256

            820c928ebd4545776b06afd69a60fe9bb024ff37eb50b9229d365f0b3850003f

            SHA512

            0cc712295f828f1c4f1f82a8bebf67ac4af86e98e32602812e307844735b01c374eaf3f0b7517676bfcd6078f8dd4069827399cf03b194a27293b0cf32de8012

          • C:\Users\Admin\AppData\Local\Temp\9a49dafa-2608-4b23-bb84-981386308984.vbs

            Filesize

            514B

            MD5

            dffc54ef5015b1d07a979a51aea41882

            SHA1

            dcd04fe4a3755a4d8cc1e9b7d02249a154742172

            SHA256

            96867fce89cc4d2be8375abde0835b3ba24630a2a7963daf019edfa612e2aa93

            SHA512

            6606a9ed08c5cc550f921c99344c6b86a4430303a3ec344dba6a3c85e2446565545b9214ec6696d2cd8708bfc0b0294b4b0c72f9d5513a42d6c984ac3137494b

          • memory/2488-26-0x0000000000600000-0x0000000000608000-memory.dmp

            Filesize

            32KB

          • memory/2488-29-0x0000000000630000-0x0000000000638000-memory.dmp

            Filesize

            32KB

          • memory/2488-20-0x00000000004C0000-0x0000000000516000-memory.dmp

            Filesize

            344KB

          • memory/2488-21-0x0000000000510000-0x000000000051C000-memory.dmp

            Filesize

            48KB

          • memory/2488-22-0x0000000000520000-0x0000000000532000-memory.dmp

            Filesize

            72KB

          • memory/2488-23-0x00000000005D0000-0x00000000005D8000-memory.dmp

            Filesize

            32KB

          • memory/2488-24-0x00000000005E0000-0x00000000005EC000-memory.dmp

            Filesize

            48KB

          • memory/2488-25-0x00000000005F0000-0x00000000005F8000-memory.dmp

            Filesize

            32KB

          • memory/2488-18-0x0000000000200000-0x000000000020C000-memory.dmp

            Filesize

            48KB

          • memory/2488-27-0x0000000000610000-0x000000000061A000-memory.dmp

            Filesize

            40KB

          • memory/2488-28-0x0000000000620000-0x000000000062E000-memory.dmp

            Filesize

            56KB

          • memory/2488-19-0x0000000000380000-0x000000000038A000-memory.dmp

            Filesize

            40KB

          • memory/2488-30-0x0000000000B70000-0x0000000000B7E000-memory.dmp

            Filesize

            56KB

          • memory/2488-31-0x0000000000B90000-0x0000000000B9A000-memory.dmp

            Filesize

            40KB

          • memory/2488-32-0x0000000000BA0000-0x0000000000BAC000-memory.dmp

            Filesize

            48KB

          • memory/2488-13-0x0000000000FC0000-0x0000000001380000-memory.dmp

            Filesize

            3.8MB

          • memory/2488-14-0x00000000001C0000-0x00000000001CE000-memory.dmp

            Filesize

            56KB

          • memory/2488-17-0x00000000004A0000-0x00000000004B6000-memory.dmp

            Filesize

            88KB

          • memory/2488-16-0x00000000001F0000-0x00000000001F8000-memory.dmp

            Filesize

            32KB

          • memory/2488-15-0x00000000001D0000-0x00000000001EC000-memory.dmp

            Filesize

            112KB

          • memory/2612-48-0x0000000000D70000-0x0000000000D82000-memory.dmp

            Filesize

            72KB

          • memory/2612-47-0x0000000001030000-0x00000000013F0000-memory.dmp

            Filesize

            3.8MB

          • memory/2884-71-0x00000000012B0000-0x0000000001670000-memory.dmp

            Filesize

            3.8MB

          • memory/2952-59-0x00000000002A0000-0x0000000000660000-memory.dmp

            Filesize

            3.8MB