Analysis

  • max time kernel
    74s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2025 23:26

General

  • Target

    3cbf0de4a009f792d15a2cdc4c31f46ee3de539493849ccc31cde03ec2d2ffdd.exe

  • Size

    783KB

  • MD5

    ed7cbc3cc36f96754bf4b4748c5998b6

  • SHA1

    ae7867de6dc05871e3e4e7d34c0231383e416dd1

  • SHA256

    3cbf0de4a009f792d15a2cdc4c31f46ee3de539493849ccc31cde03ec2d2ffdd

  • SHA512

    eac51f170a344feb0958733eaa6c6ee80b4934f1e70270f932e3593ce572d899bbe9d18e3075c394437d452a30f0341d12da8dc78080da8b93ebc08f458e4744

  • SSDEEP

    12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 7 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 16 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cbf0de4a009f792d15a2cdc4c31f46ee3de539493849ccc31cde03ec2d2ffdd.exe
    "C:\Users\Admin\AppData\Local\Temp\3cbf0de4a009f792d15a2cdc4c31f46ee3de539493849ccc31cde03ec2d2ffdd.exe"
    1⤵
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2044
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iHm8J0eyAe.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1340
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2504
        • C:\Windows\System32\wiadefui\services.exe
          "C:\Windows\System32\wiadefui\services.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:2052
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\System32\wiadefui\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2512
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\netmsg\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2812
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\explorer\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2928
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\PerfLogs\Admin\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2484
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\mfc140\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:264
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "3cbf0de4a009f792d15a2cdc4c31f46ee3de539493849ccc31cde03ec2d2ffdd" /sc ONLOGON /tr "'C:\Windows\ModemLogs\3cbf0de4a009f792d15a2cdc4c31f46ee3de539493849ccc31cde03ec2d2ffdd.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1084
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\C_20866\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2332

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PerfLogs\Admin\RCXB7A0.tmp

      Filesize

      783KB

      MD5

      4ede0eec3ebe5f1bcdbe84cee20ef423

      SHA1

      a0ea5e7c60c2c2063c82c1e51707728f58a3ca40

      SHA256

      78d46dfae4fc23df0eebe39a5f8e0c19c454e182085d20ac62f5e0392ee821d3

      SHA512

      946bb02a6136affc498aca89e5dd8eead09482dcf12b7cca9de8ec05e90c34d201479f104e1c14d29f78de6ce986d141f9973bb6f500aafb7a5ad1f40d4a1319

    • C:\Users\Admin\AppData\Local\Temp\iHm8J0eyAe.bat

      Filesize

      205B

      MD5

      5c6f5e36005f9becad0682642f93cbe1

      SHA1

      3cf5ce1f4ff43ed0791b6c2be4647a9f9ebc12d8

      SHA256

      34c3ac24787d384ccc09154e6cd21bb3394b61258fd1797fe3710bd2b03c7ff3

      SHA512

      51bd80b2aa27ca533b61d15fdefae0a364f3dd535d427611a1bcb627bbf8e9b74002a38bf1d05f142a05956685902bf1ee80fb90be5cc4ec3f9451d4292bfb19

    • C:\Windows\System32\C_20866\RCXBDBB.tmp

      Filesize

      783KB

      MD5

      9cae0c1983aa6e8e5c4e3a1c98667a46

      SHA1

      b54d101bfc76fff4277f2a11ef23e5984d1d0427

      SHA256

      7901363b9cb31861e0f8e2976e5fc135633cd54ead7960f8e28c131b6714a5d9

      SHA512

      1f6311965141bb602c115772db82220f8871d576cab3ed5c62df1d543dc30b510dd715b6a67ce57449c3ebfb7e30b6209a2019f7d616f8bcb764ea9efd2e92f0

    • C:\Windows\System32\mfc140\lsm.exe

      Filesize

      783KB

      MD5

      ed7cbc3cc36f96754bf4b4748c5998b6

      SHA1

      ae7867de6dc05871e3e4e7d34c0231383e416dd1

      SHA256

      3cbf0de4a009f792d15a2cdc4c31f46ee3de539493849ccc31cde03ec2d2ffdd

      SHA512

      eac51f170a344feb0958733eaa6c6ee80b4934f1e70270f932e3593ce572d899bbe9d18e3075c394437d452a30f0341d12da8dc78080da8b93ebc08f458e4744

    • C:\Windows\System32\wiadefui\services.exe

      Filesize

      783KB

      MD5

      1d48d57e9fda1ae79cb1e67eab8f19dd

      SHA1

      5b9bce22d26803452b8230bcab10717881da70bf

      SHA256

      26d2e9c805f1f3df37c8890448f6fb30d84295f0afcd99e4f00281604e7102ac

      SHA512

      eee867e0abd5d3b9dfeeab842a08f95ada7fb5db568b0fbf7e2ec2707e91f91fef2878a6ab2efc0c9656d7be9b5e3b8498ea38785c3be25d162256ae796e2e24

    • memory/2044-16-0x0000000002040000-0x0000000002048000-memory.dmp

      Filesize

      32KB

    • memory/2044-20-0x000000001A6E0000-0x000000001A6E8000-memory.dmp

      Filesize

      32KB

    • memory/2044-7-0x0000000001F30000-0x0000000001F3C000-memory.dmp

      Filesize

      48KB

    • memory/2044-8-0x0000000001F50000-0x0000000001F5A000-memory.dmp

      Filesize

      40KB

    • memory/2044-9-0x0000000001EA0000-0x0000000001EAA000-memory.dmp

      Filesize

      40KB

    • memory/2044-10-0x0000000001F40000-0x0000000001F48000-memory.dmp

      Filesize

      32KB

    • memory/2044-11-0x0000000001E90000-0x0000000001E98000-memory.dmp

      Filesize

      32KB

    • memory/2044-12-0x0000000001F60000-0x0000000001F68000-memory.dmp

      Filesize

      32KB

    • memory/2044-13-0x0000000001F70000-0x0000000001F78000-memory.dmp

      Filesize

      32KB

    • memory/2044-14-0x0000000001F90000-0x0000000001F98000-memory.dmp

      Filesize

      32KB

    • memory/2044-15-0x0000000002030000-0x0000000002038000-memory.dmp

      Filesize

      32KB

    • memory/2044-0-0x000007FEF5A63000-0x000007FEF5A64000-memory.dmp

      Filesize

      4KB

    • memory/2044-17-0x000000001A6C0000-0x000000001A6C8000-memory.dmp

      Filesize

      32KB

    • memory/2044-18-0x000000001A6F0000-0x000000001A6F8000-memory.dmp

      Filesize

      32KB

    • memory/2044-19-0x0000000001F80000-0x0000000001F88000-memory.dmp

      Filesize

      32KB

    • memory/2044-6-0x0000000001E80000-0x0000000001E88000-memory.dmp

      Filesize

      32KB

    • memory/2044-21-0x000000001A6D0000-0x000000001A6DC000-memory.dmp

      Filesize

      48KB

    • memory/2044-22-0x0000000001FA0000-0x0000000001FA8000-memory.dmp

      Filesize

      32KB

    • memory/2044-25-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

      Filesize

      9.9MB

    • memory/2044-30-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

      Filesize

      9.9MB

    • memory/2044-4-0x0000000001E60000-0x0000000001E68000-memory.dmp

      Filesize

      32KB

    • memory/2044-35-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

      Filesize

      9.9MB

    • memory/2044-5-0x0000000001E70000-0x0000000001E80000-memory.dmp

      Filesize

      64KB

    • memory/2044-3-0x0000000001E50000-0x0000000001E58000-memory.dmp

      Filesize

      32KB

    • memory/2044-81-0x000007FEF5A63000-0x000007FEF5A64000-memory.dmp

      Filesize

      4KB

    • memory/2044-2-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

      Filesize

      9.9MB

    • memory/2044-95-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

      Filesize

      9.9MB

    • memory/2044-1-0x0000000000110000-0x00000000001DA000-memory.dmp

      Filesize

      808KB

    • memory/2052-98-0x0000000001320000-0x00000000013EA000-memory.dmp

      Filesize

      808KB