Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 11:41
Behavioral task
behavioral1
Sample
BAE83C597A9F76E1A42B833F108C8C9A.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
BAE83C597A9F76E1A42B833F108C8C9A.exe
Resource
win10v2004-20241007-en
General
-
Target
BAE83C597A9F76E1A42B833F108C8C9A.exe
-
Size
1.1MB
-
MD5
bae83c597a9f76e1a42b833f108c8c9a
-
SHA1
c0be6ab84266d366d22b28c5bc0d68f2be525fc1
-
SHA256
46f77240e4a469bf38e0600e95edf6de249ede13f5a41de3702af584a69b7761
-
SHA512
0b72794bc1d6ce47406a7fc4a12b1a0107633882cb06387f6abe9ef6480a93381bed71ac254e8bfdfa434b65f04419136e4ff992346f420f289075c48484715e
-
SSDEEP
24576:K2G/nvxW3WHKfhIVMjZs1LtHoFJS32TpfXVH:KbA3xZ0Mj6g3
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2360 2168 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3788 2168 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1364 2168 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1744 2168 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 2168 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 2168 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 460 2168 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4608 2168 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2924 2168 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4572 2168 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3276 2168 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 2168 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3252 2168 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2180 2168 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4092 2168 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4560 2168 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4120 2168 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2552 2168 schtasks.exe 87 -
resource yara_rule behavioral2/files/0x0007000000023c68-10.dat dcrat behavioral2/memory/920-13-0x00000000005E0000-0x00000000006B6000-memory.dmp dcrat -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation BAE83C597A9F76E1A42B833F108C8C9A.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation blockweb.exe -
Executes dropped EXE 2 IoCs
pid Process 920 blockweb.exe 3588 lsass.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\ModifiableWindowsApps\backgroundTaskHost.exe blockweb.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Registry.exe blockweb.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\ee2ad38f3d4382 blockweb.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\lsass.exe blockweb.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\6203df4a6bafc7 blockweb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BAE83C597A9F76E1A42B833F108C8C9A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings BAE83C597A9F76E1A42B833F108C8C9A.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings blockweb.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2036 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1492 schtasks.exe 1636 schtasks.exe 4560 schtasks.exe 3276 schtasks.exe 4608 schtasks.exe 2180 schtasks.exe 4092 schtasks.exe 3788 schtasks.exe 1364 schtasks.exe 1744 schtasks.exe 2644 schtasks.exe 3252 schtasks.exe 4120 schtasks.exe 2552 schtasks.exe 2360 schtasks.exe 460 schtasks.exe 2924 schtasks.exe 4572 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 920 blockweb.exe 920 blockweb.exe 920 blockweb.exe 3588 lsass.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 920 blockweb.exe Token: SeDebugPrivilege 3588 lsass.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3672 wrote to memory of 3044 3672 BAE83C597A9F76E1A42B833F108C8C9A.exe 83 PID 3672 wrote to memory of 3044 3672 BAE83C597A9F76E1A42B833F108C8C9A.exe 83 PID 3672 wrote to memory of 3044 3672 BAE83C597A9F76E1A42B833F108C8C9A.exe 83 PID 3044 wrote to memory of 4796 3044 WScript.exe 84 PID 3044 wrote to memory of 4796 3044 WScript.exe 84 PID 3044 wrote to memory of 4796 3044 WScript.exe 84 PID 4796 wrote to memory of 920 4796 cmd.exe 86 PID 4796 wrote to memory of 920 4796 cmd.exe 86 PID 920 wrote to memory of 3620 920 blockweb.exe 106 PID 920 wrote to memory of 3620 920 blockweb.exe 106 PID 4796 wrote to memory of 2036 4796 cmd.exe 108 PID 4796 wrote to memory of 2036 4796 cmd.exe 108 PID 4796 wrote to memory of 2036 4796 cmd.exe 108 PID 3620 wrote to memory of 2712 3620 cmd.exe 109 PID 3620 wrote to memory of 2712 3620 cmd.exe 109 PID 3620 wrote to memory of 3588 3620 cmd.exe 115 PID 3620 wrote to memory of 3588 3620 cmd.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\BAE83C597A9F76E1A42B833F108C8C9A.exe"C:\Users\Admin\AppData\Local\Temp\BAE83C597A9F76E1A42B833F108C8C9A.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ServerBrokerperf\PsCiFwPs5yLlLF7yRNDHfRA.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ServerBrokerperf\yZmK36IDpKQLRFj1psdgPwkClrgJN.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\ServerBrokerperf\blockweb.exe"C:\ServerBrokerperf\blockweb.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\yqwMa95SGU.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2712
-
-
C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\lsass.exe"C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\lsass.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2036
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\ServerBrokerperf\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\ServerBrokerperf\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\ServerBrokerperf\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\ServerBrokerperf\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\ServerBrokerperf\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 8 /tr "'C:\ServerBrokerperf\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\ServerBrokerperf\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\ServerBrokerperf\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\ServerBrokerperf\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222B
MD5e0e59f3a0ad8f6fc6107daf9f5ea2298
SHA13d8c5af544fb8e00a9aef7ceb6e861d34842aa67
SHA2567be9d4ddae790ad15f1fa1ec2f42c22becbf3c53b3f88e77f87dc2d7e86e2370
SHA51221aab8c94d0c6c473c472eeb779810fcf7520fb6249bc6db6945fdf1d03fabc00f9889d744f9b8593cdb1c44a62c69f738d1a13a55ef2bd3b33a7ffeed333639
-
Filesize
827KB
MD57405cb828a4d484032c1507b1780f464
SHA1dfd41854c4ac381431516ec27d12a1535acabb3a
SHA25653404151c9e675018976662123f67680a45b91dd533788501ba2777d0cc932ba
SHA5121439c2204c7aea94514b5d7be5c0d9a7cc2aefc6904eceabb7c616466fd99cc79af0e99a21ca4180da2025dbc2ec8edf682e687d3074db9609d284eb965c39a3
-
Filesize
146B
MD573f4bc9864b7eb9026937170a277b68e
SHA1afec9c4c687c356a4114e282e7f188454911fbe5
SHA25665d9d5d04a37d38026be224b5b6e70941e58d62acd86d177408f7dd041e11ad4
SHA512b63b0700313f581ef56789a811023c9b7ad63aa52d16a8322cd53c82792208b9fb4caf5f3d9118542d96c18ef47cc6aab56f84c99c62e40c1309c48b81110b03
-
Filesize
243B
MD57a9a64b23264532ae90ff9833eca2f90
SHA1c48232550a06110ed084470b95b775310649c3ae
SHA2562aeda770fa8149a340eba8aa67ebd3c2198e9f322aca7c512a7d227833c6ed79
SHA51209a4f1ca6c34771026a5b0dd804f690d1798b92ea31079b77381af90e29044160f91c74f866756e8395c26a962b7489a2b9be736ef72254195998741a7ad2331