Analysis

  • max time kernel
    96s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2025 01:21

General

  • Target

    31e7e6d6c1d606c6d6b33d32724885e5.exe

  • Size

    2.9MB

  • MD5

    31e7e6d6c1d606c6d6b33d32724885e5

  • SHA1

    400a1f509d4b22ff8849a3fcb1a990f3fab15950

  • SHA256

    6c29d8bad383d0c43571ca79bb4887596c18c54053e174bb4d551a717ac33dc0

  • SHA512

    b82cbae4484e26e31345c5a1a321b86bfb69f57e21198ae292851964ea5b8024e844955f74a2250aa36784dcf15e7ee3b0f10a37b1eaeee33ffe0b86d9cac9d4

  • SSDEEP

    49152:vD9sH0CMRmyW/15LcxvoV5FgyG3sF1XIFRTGJi2pHXr1IjmTyDrJDax8Yk:vD9sUCMXwwvCFA3sFZqRti3r1IjmuDt8

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 21 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 21 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\31e7e6d6c1d606c6d6b33d32724885e5.exe
    "C:\Users\Admin\AppData\Local\Temp\31e7e6d6c1d606c6d6b33d32724885e5.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:208
    • C:\Recovery\WindowsRE\smss.exe
      "C:\Recovery\WindowsRE\smss.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:4816
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Windows\addins\Idle.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2052
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Windows\addins\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4552
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Windows\addins\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4732
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4872
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2628
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2500
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\smss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2328
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1412
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:924
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Libraries\dwm.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4420
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Public\Libraries\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3764
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Libraries\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:5048
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows NT\Accessories\RuntimeBroker.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2380
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\RuntimeBroker.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:724
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows NT\Accessories\RuntimeBroker.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:5100
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\Program Files\Java\jre-1.8\bin\dtplugin\Registry.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3008
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\Java\jre-1.8\bin\dtplugin\Registry.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2940
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 5 /tr "'C:\Program Files\Java\jre-1.8\bin\dtplugin\Registry.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:5088
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3340
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3364
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows NT\Accessories\RuntimeBroker.exe

    Filesize

    2.9MB

    MD5

    31e7e6d6c1d606c6d6b33d32724885e5

    SHA1

    400a1f509d4b22ff8849a3fcb1a990f3fab15950

    SHA256

    6c29d8bad383d0c43571ca79bb4887596c18c54053e174bb4d551a717ac33dc0

    SHA512

    b82cbae4484e26e31345c5a1a321b86bfb69f57e21198ae292851964ea5b8024e844955f74a2250aa36784dcf15e7ee3b0f10a37b1eaeee33ffe0b86d9cac9d4

  • memory/208-14-0x000000001B490000-0x000000001B498000-memory.dmp

    Filesize

    32KB

  • memory/208-1-0x0000000000600000-0x00000000008F0000-memory.dmp

    Filesize

    2.9MB

  • memory/208-3-0x00000000010A0000-0x00000000010AE000-memory.dmp

    Filesize

    56KB

  • memory/208-4-0x0000000002A00000-0x0000000002A0E000-memory.dmp

    Filesize

    56KB

  • memory/208-5-0x0000000002A10000-0x0000000002A18000-memory.dmp

    Filesize

    32KB

  • memory/208-6-0x0000000002A20000-0x0000000002A3C000-memory.dmp

    Filesize

    112KB

  • memory/208-8-0x0000000002A40000-0x0000000002A48000-memory.dmp

    Filesize

    32KB

  • memory/208-12-0x000000001B480000-0x000000001B492000-memory.dmp

    Filesize

    72KB

  • memory/208-11-0x0000000002A90000-0x0000000002A98000-memory.dmp

    Filesize

    32KB

  • memory/208-10-0x0000000002A70000-0x0000000002A86000-memory.dmp

    Filesize

    88KB

  • memory/208-9-0x0000000002A50000-0x0000000002A60000-memory.dmp

    Filesize

    64KB

  • memory/208-7-0x000000001B4D0000-0x000000001B520000-memory.dmp

    Filesize

    320KB

  • memory/208-13-0x000000001B4A0000-0x000000001B4AC000-memory.dmp

    Filesize

    48KB

  • memory/208-2-0x00007FFE00F30000-0x00007FFE019F1000-memory.dmp

    Filesize

    10.8MB

  • memory/208-19-0x000000001B590000-0x000000001B598000-memory.dmp

    Filesize

    32KB

  • memory/208-16-0x000000001B4C0000-0x000000001B4CA000-memory.dmp

    Filesize

    40KB

  • memory/208-17-0x000000001B520000-0x000000001B576000-memory.dmp

    Filesize

    344KB

  • memory/208-18-0x000000001B580000-0x000000001B58C000-memory.dmp

    Filesize

    48KB

  • memory/208-15-0x000000001B4B0000-0x000000001B4C0000-memory.dmp

    Filesize

    64KB

  • memory/208-20-0x000000001B5A0000-0x000000001B5AC000-memory.dmp

    Filesize

    48KB

  • memory/208-21-0x000000001B5B0000-0x000000001B5B8000-memory.dmp

    Filesize

    32KB

  • memory/208-22-0x000000001B5C0000-0x000000001B5D2000-memory.dmp

    Filesize

    72KB

  • memory/208-23-0x000000001C390000-0x000000001C8B8000-memory.dmp

    Filesize

    5.2MB

  • memory/208-25-0x000000001C080000-0x000000001C08C000-memory.dmp

    Filesize

    48KB

  • memory/208-24-0x000000001B5F0000-0x000000001B5FC000-memory.dmp

    Filesize

    48KB

  • memory/208-0-0x00007FFE00F33000-0x00007FFE00F35000-memory.dmp

    Filesize

    8KB

  • memory/208-51-0x00007FFE00F30000-0x00007FFE019F1000-memory.dmp

    Filesize

    10.8MB

  • memory/4816-52-0x000000001DA90000-0x000000001DAE6000-memory.dmp

    Filesize

    344KB