Analysis

  • max time kernel
    117s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 14:01

General

  • Target

    3614F4C4B137E627F03D0118F4779D52.exe

  • Size

    1.8MB

  • MD5

    3614f4c4b137e627f03d0118f4779d52

  • SHA1

    07120124f394eddb46c3c2a985063718d17fc48d

  • SHA256

    4acc21ce239f8eadca573c53b92cc49b96a9d7b96f7cfe4a5511847148839a2a

  • SHA512

    bfc1cb74b69f1bc0e47eefee7614760edfe068ac9471ed211a87d4b1a47f8f2e784db2beb79b23988ba7810d525eb2463f75eacf0df9f560a2d2e0e52a0e7c7f

  • SSDEEP

    24576:wwkCsYsgFFuqj/oBxyALwMosh651ZBvISmXqD0Z+rtyumwwI3PXGSfaeiLUb+7xE:B5kBTXYD3Yo0ZKy7IfXGfLU67x6sg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3614F4C4B137E627F03D0118F4779D52.exe
    "C:\Users\Admin\AppData\Local\Temp\3614F4C4B137E627F03D0118F4779D52.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wyxculx0\wyxculx0.cmdline"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2912
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD3D3.tmp" "c:\Windows\System32\CSCD4A4E3E51DF7483FB540CFB0702499A9.TMP"
        3⤵
          PID:2804
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Downloads\spoolsv.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:2380
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Recent\3614F4C4B137E627F03D0118F4779D52.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:2212
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\WMIADAP.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:1964
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Downloaded Program Files\dwm.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:528
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\it-IT\Idle.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:1780
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\3614F4C4B137E627F03D0118F4779D52.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:2336
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cy8ISVXXgP.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\Windows\system32\chcp.com
          chcp 65001
          3⤵
            PID:1708
          • C:\Windows\system32\w32tm.exe
            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
            3⤵
              PID:1912
            • C:\Program Files (x86)\Windows Photo Viewer\it-IT\Idle.exe
              "C:\Program Files (x86)\Windows Photo Viewer\it-IT\Idle.exe"
              3⤵
              • Executes dropped EXE
              • Modifies system certificate store
              • Suspicious use of AdjustPrivilegeToken
              PID:604
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Users\Default\Downloads\spoolsv.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2832
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Default\Downloads\spoolsv.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:744
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Downloads\spoolsv.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2904
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "3614F4C4B137E627F03D0118F4779D523" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Recent\3614F4C4B137E627F03D0118F4779D52.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2640
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "3614F4C4B137E627F03D0118F4779D52" /sc ONLOGON /tr "'C:\Users\Default\Recent\3614F4C4B137E627F03D0118F4779D52.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2284
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "3614F4C4B137E627F03D0118F4779D523" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Recent\3614F4C4B137E627F03D0118F4779D52.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2292
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 7 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\WMIADAP.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2040
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\WMIADAP.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2960
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 5 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\WMIADAP.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2668
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Windows\Downloaded Program Files\dwm.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2936
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\Downloaded Program Files\dwm.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1904
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Windows\Downloaded Program Files\dwm.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1256
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\Idle.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2748
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\Idle.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1148
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\Idle.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1380
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "3614F4C4B137E627F03D0118F4779D523" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\AppData\Local\Temp\3614F4C4B137E627F03D0118F4779D52.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3004
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "3614F4C4B137E627F03D0118F4779D52" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\3614F4C4B137E627F03D0118F4779D52.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2968
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "3614F4C4B137E627F03D0118F4779D523" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\AppData\Local\Temp\3614F4C4B137E627F03D0118F4779D52.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1280

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RESD3D3.tmp

          Filesize

          1KB

          MD5

          185244ce1432041d1b38cb941907d078

          SHA1

          804949d8fdb9c3349054be2d04774417646a0096

          SHA256

          6d25bad122d0bf7f554a67b75f25ba02698eada4d48d94e8c1793216a2b51eff

          SHA512

          05777ba5742cc69bd98e454c8562ceb684a038232e32f8437dd6ee714c774b94ccd69ec9b54217f2dde82d58d63eb7763b6b76817ebf160e3c852ad7964a68c6

        • C:\Users\Admin\AppData\Local\Temp\cy8ISVXXgP.bat

          Filesize

          234B

          MD5

          997e755e20d49d06d4c16d4f69e10784

          SHA1

          a149db9f5cb73b14f9bd60b080a78fc279616b28

          SHA256

          d49a2de3f6c70181c42898201a9c6fc427d8e3e75b45e70fc08ac1724b3d4f7d

          SHA512

          eb477dd236877fc79da5f826117b11a17322abc29d5f5d3552c5c624af5d6025bf54ba8f51d7f73cd59086ed105c323866de6a7929115254b8f0c7dfef905111

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          0484235c379f1de9b109f8037e710f83

          SHA1

          5cd590c75e9499b251d1974afab2436ac57f9da6

          SHA256

          8e6b32831aa2d990b8d627de0e2a5f6ab33ef92bc9145616bcb7abcf98acf421

          SHA512

          1fe6fb51dfbd57e7a44f7f3ad82c7ad4a31cda137b5d46bbedcd98c536fc003bbe5aec276d70ae56a10b2deeece5bab28a1605a7c202e2f0f967b3a7e7b83778

        • C:\Users\Default\Downloads\spoolsv.exe

          Filesize

          1.8MB

          MD5

          3614f4c4b137e627f03d0118f4779d52

          SHA1

          07120124f394eddb46c3c2a985063718d17fc48d

          SHA256

          4acc21ce239f8eadca573c53b92cc49b96a9d7b96f7cfe4a5511847148839a2a

          SHA512

          bfc1cb74b69f1bc0e47eefee7614760edfe068ac9471ed211a87d4b1a47f8f2e784db2beb79b23988ba7810d525eb2463f75eacf0df9f560a2d2e0e52a0e7c7f

        • \??\c:\Users\Admin\AppData\Local\Temp\wyxculx0\wyxculx0.0.cs

          Filesize

          370B

          MD5

          fc29bfd2cc70fc5f9542bc87a1f0f7bd

          SHA1

          87214cf53eda158d22f7721fd85b36904da1e980

          SHA256

          969cb860df4b89baad023e229906b8c2db886bdb6f723fb9f0a730172e337081

          SHA512

          3f03029bf84aec4e76b860059140888638b697c485e3e9a29b18bcdb93359bf8a7a747a62cc56ff23a8954018ff89cbe75387f2ad3c389f4ff98de9a96c7f396

        • \??\c:\Users\Admin\AppData\Local\Temp\wyxculx0\wyxculx0.cmdline

          Filesize

          235B

          MD5

          2996e3e4a18038f162f24687d3ec8f4f

          SHA1

          5012a8eb3dd4a6d1d029029774c664d0951c3a67

          SHA256

          a99030f3b5e13d176b2c68e09c384e3986ceafef47d4186f3a0480a16a289c07

          SHA512

          4e7e98f1e18f3c07dc3b50609e8e26133b9996e0ccdb09a1e93bff114ef73d1ab77abaf2fa12e91446c3309e795ec570397a65071bde2e4cc1b45efb1c554c00

        • \??\c:\Windows\System32\CSCD4A4E3E51DF7483FB540CFB0702499A9.TMP

          Filesize

          1KB

          MD5

          8c85ef91c6071d33745325a8fa351c3e

          SHA1

          e3311ceef28823eec99699cc35be27c94eca52d2

          SHA256

          8db3e3a5515da1933036688a9b1918cfc3339fc687008c5325461271904b2d41

          SHA512

          2bb89b07fe46b1c406ed6a560e88cb2b8402b1d61bb71e10887bad661751f64f1e5317fd6c1b301ea4766785b915da31b64e0475cfe36c1f950b32915b5dab7d

        • memory/528-79-0x00000000026D0000-0x00000000026D8000-memory.dmp

          Filesize

          32KB

        • memory/528-78-0x000000001B6C0000-0x000000001B9A2000-memory.dmp

          Filesize

          2.9MB

        • memory/604-83-0x0000000001360000-0x000000000153E000-memory.dmp

          Filesize

          1.9MB

        • memory/2204-7-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2204-10-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2204-19-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2204-18-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2204-21-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2204-17-0x0000000000330000-0x000000000033C000-memory.dmp

          Filesize

          48KB

        • memory/2204-12-0x0000000000360000-0x0000000000378000-memory.dmp

          Filesize

          96KB

        • memory/2204-14-0x0000000000320000-0x0000000000328000-memory.dmp

          Filesize

          32KB

        • memory/2204-15-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2204-9-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/2204-0-0x000007FEF5A23000-0x000007FEF5A24000-memory.dmp

          Filesize

          4KB

        • memory/2204-67-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2204-6-0x0000000000310000-0x000000000031E000-memory.dmp

          Filesize

          56KB

        • memory/2204-4-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2204-3-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2204-2-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2204-1-0x0000000000380000-0x000000000055E000-memory.dmp

          Filesize

          1.9MB