Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 02:50

General

  • Target

    30d404945af42d77bfd6ac92739486e8d00496a977ba6a6f0240cd20b7989f2c.exe

  • Size

    3.3MB

  • MD5

    ca1c3f84e0259d9c423e34e20840f142

  • SHA1

    3efc257f5027a1a1a205adcdbcb999e1ef8b3b7d

  • SHA256

    30d404945af42d77bfd6ac92739486e8d00496a977ba6a6f0240cd20b7989f2c

  • SHA512

    8cf6d715fbcad8eff71f4102479ed189a8e71438613225ae26c4e40dd696152a9d2efec028d602b8e25902aeea25961541749029d30a6f5fce5fd36d997fd5e1

  • SSDEEP

    98304:0LMvB0KtBC+ZiFJCY4zsqyv7TUws7LRh1Bk308m3/T:0gvOK9MF5qy/UZdz8Q/T

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 12 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\30d404945af42d77bfd6ac92739486e8d00496a977ba6a6f0240cd20b7989f2c.exe
    "C:\Users\Admin\AppData\Local\Temp\30d404945af42d77bfd6ac92739486e8d00496a977ba6a6f0240cd20b7989f2c.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2404
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nmtkPgbBRV.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2724
        • C:\Users\Admin\NetHood\System.exe
          "C:\Users\Admin\NetHood\System.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:1640
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\NetHood\System.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1992
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Admin\NetHood\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2800
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\NetHood\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3012
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Internet Explorer\it-IT\spoolsv.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2664
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\it-IT\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2204
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Internet Explorer\it-IT\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2188
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\csrss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2556
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2812
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:836
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Program Files\VideoLAN\VLC\spoolsv.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2560
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2652
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Program Files\VideoLAN\VLC\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2212

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nmtkPgbBRV.bat

      Filesize

      198B

      MD5

      1c93ee01eb108b09b35b2f15e7a7bb4f

      SHA1

      c7c705432d553f964e09a05694244d425b06c4aa

      SHA256

      c24b67ba13e0422658cd60d0477eebe19bec0979128a3f147188a8b66eaf795c

      SHA512

      18a7c2060949a2c77510419409b476e191299139f438fb581b85b2117f4623934b0216bbec833cc2f91d718cea079053d258d4b17c3ae4db857f91e8520c1dd0

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Network Shortcuts\System.exe

      Filesize

      3.3MB

      MD5

      ca1c3f84e0259d9c423e34e20840f142

      SHA1

      3efc257f5027a1a1a205adcdbcb999e1ef8b3b7d

      SHA256

      30d404945af42d77bfd6ac92739486e8d00496a977ba6a6f0240cd20b7989f2c

      SHA512

      8cf6d715fbcad8eff71f4102479ed189a8e71438613225ae26c4e40dd696152a9d2efec028d602b8e25902aeea25961541749029d30a6f5fce5fd36d997fd5e1

    • memory/1640-31-0x00000000024A0000-0x00000000024F6000-memory.dmp

      Filesize

      344KB

    • memory/1640-30-0x00000000005C0000-0x00000000005D2000-memory.dmp

      Filesize

      72KB

    • memory/1640-29-0x00000000007E0000-0x0000000000836000-memory.dmp

      Filesize

      344KB

    • memory/1640-28-0x0000000000A00000-0x0000000000D5C000-memory.dmp

      Filesize

      3.4MB

    • memory/2404-8-0x0000000000A60000-0x0000000000A6C000-memory.dmp

      Filesize

      48KB

    • memory/2404-7-0x0000000001240000-0x0000000001296000-memory.dmp

      Filesize

      344KB

    • memory/2404-0-0x000007FEF56A3000-0x000007FEF56A4000-memory.dmp

      Filesize

      4KB

    • memory/2404-9-0x0000000000A70000-0x0000000000A82000-memory.dmp

      Filesize

      72KB

    • memory/2404-10-0x0000000000B20000-0x0000000000B2E000-memory.dmp

      Filesize

      56KB

    • memory/2404-11-0x0000000000C90000-0x0000000000C9C000-memory.dmp

      Filesize

      48KB

    • memory/2404-24-0x000007FEF56A0000-0x000007FEF608C000-memory.dmp

      Filesize

      9.9MB

    • memory/2404-6-0x0000000000A50000-0x0000000000A5A000-memory.dmp

      Filesize

      40KB

    • memory/2404-5-0x00000000006F0000-0x00000000006F8000-memory.dmp

      Filesize

      32KB

    • memory/2404-4-0x00000000004E0000-0x00000000004FC000-memory.dmp

      Filesize

      112KB

    • memory/2404-3-0x00000000004D0000-0x00000000004DE000-memory.dmp

      Filesize

      56KB

    • memory/2404-2-0x000007FEF56A0000-0x000007FEF608C000-memory.dmp

      Filesize

      9.9MB

    • memory/2404-1-0x00000000012F0000-0x000000000164C000-memory.dmp

      Filesize

      3.4MB