Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 05:19
Behavioral task
behavioral1
Sample
d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe
Resource
win10v2004-20241007-en
General
-
Target
d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe
-
Size
828KB
-
MD5
eba23ee4fa3441dd8972973ac7665007
-
SHA1
a8416561dd666fbeb01688ea9e17dc2cfae18a24
-
SHA256
d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259
-
SHA512
c209b7d8535b5be51dd56fecade2f8ea6b853d48d45877ba9ea708face3031ed01ad85d4ac42a7ffb93568c1f2c58475e8f1fa07f54c5321dd44a5bc8ff53e96
-
SSDEEP
12288:qTwIZR2pvarT1TZnszQGEfIjvOOK2elbuXH82x7F:iZR2pvmpszQcvOOeYsaF
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 27 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2312 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2848 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2948 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2588 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2836 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2820 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2344 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2944 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2868 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2972 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1960 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2144 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1824 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1508 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1532 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2928 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3000 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3036 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2172 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2192 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2336 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 796 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1884 2540 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2804 2540 schtasks.exe 30 -
resource yara_rule behavioral1/memory/1980-1-0x0000000000B70000-0x0000000000C46000-memory.dmp dcrat behavioral1/files/0x000500000001a41a-11.dat dcrat behavioral1/memory/1168-29-0x00000000003B0000-0x0000000000486000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 1168 OSPPSVC.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Uninstall Information\1610b97d3ab4a7 d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe File created C:\Program Files\Windows Media Player\csrss.exe d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe File created C:\Program Files\Windows Media Player\886983d96e3d3e d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe File created C:\Program Files\Common Files\smss.exe d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe File created C:\Program Files\Common Files\69ddcba757bf72 d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe File created C:\Program Files\Common Files\Microsoft Shared\TextConv\lsm.exe d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe File created C:\Program Files\Common Files\Microsoft Shared\TextConv\101b941d020240 d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe File created C:\Program Files (x86)\Uninstall Information\OSPPSVC.exe d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Branding\ShellBrd\Idle.exe d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe File created C:\Windows\Branding\ShellBrd\6ccacd8608530f d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 27 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1508 schtasks.exe 1824 schtasks.exe 1960 schtasks.exe 2948 schtasks.exe 2820 schtasks.exe 3036 schtasks.exe 2172 schtasks.exe 2944 schtasks.exe 2144 schtasks.exe 2804 schtasks.exe 2344 schtasks.exe 1492 schtasks.exe 796 schtasks.exe 2972 schtasks.exe 1532 schtasks.exe 2192 schtasks.exe 2336 schtasks.exe 2848 schtasks.exe 2868 schtasks.exe 2700 schtasks.exe 2776 schtasks.exe 3000 schtasks.exe 2836 schtasks.exe 1884 schtasks.exe 2588 schtasks.exe 2928 schtasks.exe 2312 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1980 d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe 1980 d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe 1980 d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe 1980 d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe 1980 d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe 1168 OSPPSVC.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1980 d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe Token: SeDebugPrivilege 1168 OSPPSVC.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2464 1980 d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe 58 PID 1980 wrote to memory of 2464 1980 d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe 58 PID 1980 wrote to memory of 2464 1980 d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe 58 PID 2464 wrote to memory of 2104 2464 cmd.exe 60 PID 2464 wrote to memory of 2104 2464 cmd.exe 60 PID 2464 wrote to memory of 2104 2464 cmd.exe 60 PID 2464 wrote to memory of 1168 2464 cmd.exe 61 PID 2464 wrote to memory of 1168 2464 cmd.exe 61 PID 2464 wrote to memory of 1168 2464 cmd.exe 61 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe"C:\Users\Admin\AppData\Local\Temp\d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OzjuDajDRK.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2104
-
-
C:\Program Files (x86)\Uninstall Information\OSPPSVC.exe"C:\Program Files (x86)\Uninstall Information\OSPPSVC.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Media Player\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Media Player\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Users\Default User\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Program Files\Common Files\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Common Files\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Program Files\Common Files\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Windows\Branding\ShellBrd\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Windows\Branding\ShellBrd\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Windows\Branding\ShellBrd\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 5 /tr "'C:\Program Files\Common Files\Microsoft Shared\TextConv\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files\Common Files\Microsoft Shared\TextConv\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Program Files\Common Files\Microsoft Shared\TextConv\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Uninstall Information\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files (x86)\Uninstall Information\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Uninstall Information\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Favorites\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\All Users\Favorites\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Favorites\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221B
MD57ab8c2d0afb809c808dd1da358b6d8a7
SHA1816c6403cd05357385cad582f66bf15318204e68
SHA2569e059ce9702b52738758acab8e9af2d1215fab088255a19204bd8d3e469c5e7c
SHA512139b4be721d012663e4d91e75df1faca7b79119bc91d2a7ea884336880e11bf2ef0a25737149554f6dec4f241e757b21ea692dbed558c4b4791a62f9c42ac28d
-
Filesize
828KB
MD5eba23ee4fa3441dd8972973ac7665007
SHA1a8416561dd666fbeb01688ea9e17dc2cfae18a24
SHA256d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259
SHA512c209b7d8535b5be51dd56fecade2f8ea6b853d48d45877ba9ea708face3031ed01ad85d4ac42a7ffb93568c1f2c58475e8f1fa07f54c5321dd44a5bc8ff53e96