Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2025 04:44

General

  • Target

    ccd01051f9e8bf3301b3bdd406f0bc24.exe

  • Size

    14.0MB

  • MD5

    ccd01051f9e8bf3301b3bdd406f0bc24

  • SHA1

    4e9f71953bd348261e9342f7dd230f274d808e4a

  • SHA256

    4fa025632546c9a5c346cde16c86c5d129d8381ace82e1a7d59ca865f948c533

  • SHA512

    93839aad8a1c533c48c9ef9cfa87c6b5e3abefe0054be20d7a0f1bd8affa2e1787b529ed4fc0371a6874ba7670b50270b554add56436540d4b197d14337455de

  • SSDEEP

    24576:2TbBv5rUyXVnAkClP6KrD3UGYB2Ue9L35+2WcESjvGMJoIlT1sMNAje+Iv4dr6/n:IBJAhMsccEmgIT1sJjdIvqr4tI5E

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccd01051f9e8bf3301b3bdd406f0bc24.exe
    "C:\Users\Admin\AppData\Local\Temp\ccd01051f9e8bf3301b3bdd406f0bc24.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\ChainBroker\WiJ0Q2cIafyWfcOMJ8mrmlFuDvVbi9nZIDl7gyLiG4eFyDELulT2kNl2MWww.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4620
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\ChainBroker\IrbV6YakyWCvQIuALcoa2IhBwWZ19ItpwUlqov7vyFBfFx5s16nM.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3824
        • C:\ChainBroker\bridgeServerFontSavesMonitor.exe
          "C:\ChainBroker/bridgeServerFontSavesMonitor.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3932
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\q3gxww20\q3gxww20.cmdline"
            5⤵
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:4048
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE474.tmp" "c:\Windows\System32\CSC77EDF692A16E43C5B7E0AC558AE83E6B.TMP"
              6⤵
                PID:4040
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WZqCqcFRCm.bat"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2000
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:1400
                • C:\Windows\system32\w32tm.exe
                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                  6⤵
                    PID:4596
                  • C:\ChainBroker\bridgeServerFontSavesMonitor.exe
                    "C:\ChainBroker\bridgeServerFontSavesMonitor.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1700
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\System.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3856
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2292
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4828
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 9 /tr "'C:\Program Files\Internet Explorer\TextInputHost.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2348
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\TextInputHost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:5044
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 7 /tr "'C:\Program Files\Internet Explorer\TextInputHost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3048
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 8 /tr "'C:\Windows\it-IT\upfc.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2224
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Windows\it-IT\upfc.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4140
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\Windows\it-IT\upfc.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1592
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\StartMenuExperienceHost.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4008
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\All Users\StartMenuExperienceHost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1392
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\StartMenuExperienceHost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3128
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\unsecapp.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1552
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Users\Default User\unsecapp.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3656
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\unsecapp.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2148
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "bridgeServerFontSavesMonitorb" /sc MINUTE /mo 9 /tr "'C:\ChainBroker\bridgeServerFontSavesMonitor.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4464
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "bridgeServerFontSavesMonitor" /sc ONLOGON /tr "'C:\ChainBroker\bridgeServerFontSavesMonitor.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4444
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "bridgeServerFontSavesMonitorb" /sc MINUTE /mo 7 /tr "'C:\ChainBroker\bridgeServerFontSavesMonitor.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4920

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ChainBroker\IrbV6YakyWCvQIuALcoa2IhBwWZ19ItpwUlqov7vyFBfFx5s16nM.bat

          Filesize

          101B

          MD5

          746d44098ab92e627cebe72cfa9c560d

          SHA1

          b51342547c4b9227df75ed19d60c462827f83204

          SHA256

          7ca477b6f171461fa1b2ae2350a938b518d4323a03d4acc95ded7b4f518d1147

          SHA512

          b5f3daa4bee7a3317c1bf23b0c0d12861742328478c31b7714798b5be7ecd7ac6cc799532103db9a8a2a0d90a347b553b92f9cbfad43b2e19e57a16029449b03

        • C:\ChainBroker\WiJ0Q2cIafyWfcOMJ8mrmlFuDvVbi9nZIDl7gyLiG4eFyDELulT2kNl2MWww.vbe

          Filesize

          241B

          MD5

          ee1d4dd46a1cb9b8dcf5841dae6bbc93

          SHA1

          7b5f9134a578673858b826c698dc0360db7d565f

          SHA256

          d2c34e5da842bf7ecb384880d6dbf05dffd1e59775961e017a281e3958f0b434

          SHA512

          9d1db891b0589e02812632d92ec297ae526abdeb7d37367728c0b6cfdeb0ff34acd9f5d8833654984fcec124c328eb41e4ac805fb1f6d9477e2933731eed02b3

        • C:\ChainBroker\bridgeServerFontSavesMonitor.exe

          Filesize

          13.7MB

          MD5

          39953acd4fd32884e6cad0d1e4688051

          SHA1

          31579801f012118285f1fd48ccf63b07ebe1594a

          SHA256

          5773e581ce59418ee4c3f205d4fa16ad74718d16d1d8e4dd37332bb4ecb850bf

          SHA512

          3823ad17c90ef4454a774e59d9b5e37b11abf451d6485c4bf7f54cf04738d01a3b6020346fc7817cb48b32cfcefbce46667b3b185baf44c0ff00ecb4e027df35

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\bridgeServerFontSavesMonitor.exe.log

          Filesize

          1KB

          MD5

          af6acd95d59de87c04642509c30e81c1

          SHA1

          f9549ae93fdb0a5861a79a08f60aa81c4b32377b

          SHA256

          7521ee2d065a78efcab55a194fbd78492f84b70595f139263875f4ea92b194d6

          SHA512

          93ab99bcf588fde553de3240e0d2b0cbd4e4bc5ef5e99d53f45a267d7ff30103a80b5a7aa1c52d6eff1e070af0ec82d2c0b8aafb7099742aa16810edc1815c3a

        • C:\Users\Admin\AppData\Local\Temp\RESE474.tmp

          Filesize

          1KB

          MD5

          15900ed0e738ecbb3624d20ab1350ce7

          SHA1

          2dcc7d373142263e7fc9289f80f3cce7db0c2ff9

          SHA256

          f2d87189a362e63ccb1d780a71e6b7fd1485c0d4a3b30c98a1fef9ded670c174

          SHA512

          62a81aab5754f3c07b488223bf599077650b971bfa1703c63de5a4d49ba37bbd1f61c383ebbbf302875b6f9b56dc19248f60de358f44865b5cdbb23934830aab

        • C:\Users\Admin\AppData\Local\Temp\WZqCqcFRCm.bat

          Filesize

          223B

          MD5

          de5529cd1c3d77f2951249b47a4ea6fc

          SHA1

          db648a56d3f8a41e50a4eab83861110fbf7d9de4

          SHA256

          7326f791d30f00ebe56e7c9fc9a0273c1e78b001ae93fb3d00bcfbd6619765a3

          SHA512

          7b36f616df0bfae26b2f37e29ea586d086a8bd5c61aa1e54ace9fa6e689fac7a5841e9dfd99be6a44d8bc73f5aa37ddf6a50a92026b8446626a8059adf62931c

        • \??\c:\Users\Admin\AppData\Local\Temp\q3gxww20\q3gxww20.0.cs

          Filesize

          364B

          MD5

          472f7a4cfa9e05562b107c45f151a1c6

          SHA1

          6b8d66dc3dbdf77322ab57e56dbdd5f18f678150

          SHA256

          5f60128195f7b6c50125cd5e4a6921946b3537e3c409d480b2e85d74041cb8e2

          SHA512

          5221cc25137901394b6e81b705458ae4c41c7f842a050a6b4c8ad63b79c1350b469c0a980824c14a9478703f338dcdaa19ff15b5e9ce8553eecde7a13ea4cc61

        • \??\c:\Users\Admin\AppData\Local\Temp\q3gxww20\q3gxww20.cmdline

          Filesize

          235B

          MD5

          06fec4ce40dba489d887256b12937719

          SHA1

          d3ea879a4f0dd3dc20130e91ec4c175c17085b92

          SHA256

          5cc28dd6f4de548c88fb781edb26b7b5b201732229c0002ef7db477916e922e9

          SHA512

          515a4f687ba9cb6e189d70cec3ec29ac698890004a511a6295ee62ef1b2f8823e3601fc13fabc63a3f9a00104accbd430d689a6015ae07b11217a47d63fc8301

        • \??\c:\Windows\System32\CSC77EDF692A16E43C5B7E0AC558AE83E6B.TMP

          Filesize

          1KB

          MD5

          d544bac668d308d2aba58ded2c13d82d

          SHA1

          e5dd50ef24d5c16629092f9290661a92387773b3

          SHA256

          84b05d56c45fd0382410fcd59e16aeef467ed0a455595dda88386dd5c87d7a02

          SHA512

          0826de2bc95d93dde2c540d2d768a0188481ee88f1da79f9c7d70d7ccd3c8715b8f1d62053f84d14f19e4d2b0a13e67084d970a158464e6223e340eb0733e1b0

        • memory/3932-13-0x0000000000C50000-0x0000000000E2A000-memory.dmp

          Filesize

          1.9MB

        • memory/3932-22-0x0000000003010000-0x000000000301C000-memory.dmp

          Filesize

          48KB

        • memory/3932-20-0x000000001BA80000-0x000000001BA98000-memory.dmp

          Filesize

          96KB

        • memory/3932-18-0x000000001BAD0000-0x000000001BB20000-memory.dmp

          Filesize

          320KB

        • memory/3932-17-0x0000000003040000-0x000000000305C000-memory.dmp

          Filesize

          112KB

        • memory/3932-15-0x0000000003000000-0x000000000300E000-memory.dmp

          Filesize

          56KB

        • memory/3932-12-0x00007FFC03A93000-0x00007FFC03A95000-memory.dmp

          Filesize

          8KB