Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-01-2025 01:26

General

  • Target

    f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe

  • Size

    2.2MB

  • MD5

    7fb943a550881e7c59acdbba1164cbfd

  • SHA1

    ed5bb95d080cbcc5fafaaa0949fdcdfaece4dabe

  • SHA256

    f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510

  • SHA512

    a4b7e40e07f1d5b24fd2bec828c433d984087ee22478f11da9a2ab4bfb42c3c4609e3d24ba19e8fd0239bfffa532c6e4526d6ff9eb7e3a3d1788cb3e5f6e66fc

  • SSDEEP

    49152:K31tZUmbFNH1wLJDPqTo9lIS/MXU2F4/1l5eQ7K6:KltZUE6NDyTo9lv2F+VvK6

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 12 IoCs
  • DCRat payload 7 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • System policy modification 1 TTPs 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe
    "C:\Users\Admin\AppData\Local\Temp\f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Drops file in Drivers directory
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:5072
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wFtC02oQlx.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3816
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:4112
        • C:\Users\Default User\upfc.exe
          "C:\Users\Default User\upfc.exe"
          3⤵
          • UAC bypass
          • Checks computer location settings
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:4464
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7eea2720-7224-46e3-91c6-ed7c0e042fc2.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1264
            • C:\Users\Default User\upfc.exe
              "C:\Users\Default User\upfc.exe"
              5⤵
              • UAC bypass
              • Checks computer location settings
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:3140
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\468b6928-4df3-4ff6-ba11-f492e3aff92b.vbs"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4020
                • C:\Users\Default User\upfc.exe
                  "C:\Users\Default User\upfc.exe"
                  7⤵
                  • UAC bypass
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  • System policy modification
                  PID:548
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8cf472f1-9f80-409c-8417-ea3525e6548c.vbs"
                    8⤵
                      PID:344
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6f9f8f70-9672-40a8-baa0-51c2e56ec343.vbs"
                      8⤵
                        PID:3700
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\aa5da750-70d2-49ed-a092-6267a0bdc78e.vbs"
                    6⤵
                      PID:4348
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b2e16bf5-d832-4d5a-b602-47f72b13685c.vbs"
                  4⤵
                    PID:1160
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Pictures\upfc.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:68
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Users\Public\Pictures\upfc.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2956
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Pictures\upfc.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2504
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Cookies\dllhost.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3104
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Admin\Cookies\dllhost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2004
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Cookies\dllhost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1060
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files\Crashpad\reports\dllhost.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2064
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Crashpad\reports\dllhost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1820
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Program Files\Crashpad\reports\dllhost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4456
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Start Menu\services.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:628
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Default\Start Menu\services.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4724
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Start Menu\services.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2648
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Windows\TAPI\dllhost.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2476
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\TAPI\dllhost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3536
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\TAPI\dllhost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2108
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\upfc.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:812
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Users\Default User\upfc.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4296
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\upfc.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4656

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\Crashpad\reports\dllhost.exe

              Filesize

              2.2MB

              MD5

              75d7335722d8eab8eb604649490bd21b

              SHA1

              2c328d1f04f80bbdc9b3726592211def5e5a3db6

              SHA256

              6f7b9e4393563f093ab80b167d755d5da8222dcc0383c8edaeac605a465c3df0

              SHA512

              adf2b4678c23c5401698bb81bb3b803c1ae8dee3ccce975f69274da1747845b25e906e6d7dd29a6a2b69af598283284b82ddee26a8bf5624a8e29c94734d6409

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\upfc.exe.log

              Filesize

              1KB

              MD5

              49b64127208271d8f797256057d0b006

              SHA1

              b99bd7e2b4e9ed24de47fb3341ea67660b84cca1

              SHA256

              2a5d403a2e649d8eceef8f785eeb0f6d33888ec6bbf251b3c347e34cb32b1e77

              SHA512

              f7c728923c893dc9bc88ad2159e0abcda41e1b40ff7e7756e6252d135ed238a2248a2662b3392449836dd1b0b580f0c866cc33e409527484fe4602e3d3f10e3e

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\dllhost.exe

              Filesize

              2.2MB

              MD5

              05484a9be0914be94aebac7ac8f45dee

              SHA1

              a9d034ad73faba11992a3975b44d988bec84cb54

              SHA256

              38ce695b3b06ef2422a8ffd7029d0c032c5b2c1ef39148fe1911328953c4b3a0

              SHA512

              d0cbdaf45f76d50f9406c32322390c050f7a4a4f9a6d3cebb209804935330f77ef2072d310b340727de31aeae0597111be012974fa49bf3afc9c6831d6531ae4

            • C:\Users\Admin\AppData\Local\Temp\468b6928-4df3-4ff6-ba11-f492e3aff92b.vbs

              Filesize

              706B

              MD5

              662fd0b7f591fe93784eea59d76787a6

              SHA1

              8b28197d11680bb3101b9b16df44d9543edc6572

              SHA256

              20f3e32fa861768fc655412798c1f60d1422e7cb3f29ee06315a10a304b94d01

              SHA512

              4e2e043484e62523916ecf3021d11313d78924f97e751b5750c01451022e9ffa5a59021ec69c0147889184e5ef7b8917f62452a62ae5ea924d1569e04be4db54

            • C:\Users\Admin\AppData\Local\Temp\7eea2720-7224-46e3-91c6-ed7c0e042fc2.vbs

              Filesize

              706B

              MD5

              da126b34f75cb7ca902504814c94203c

              SHA1

              e9286ef5114b43f25151f27457a506f0e6dc4191

              SHA256

              4d52c17651335d4edd956553b05633495955924f40ae22614ec2831033da9321

              SHA512

              3fa1e16c9413cae0adf42b8d4d05e05d842af5baa358b038bc53f4d0f3853e20434a1ed5e996efc4aff953269627f4a253451f6f4304a51600a03740dfe02e84

            • C:\Users\Admin\AppData\Local\Temp\8cf472f1-9f80-409c-8417-ea3525e6548c.vbs

              Filesize

              705B

              MD5

              da6a6c8249683a93a61db10cc3d61026

              SHA1

              3dc706518775fc6a3319f33b3fa44e195b345633

              SHA256

              1c1d4a72654b3a6507a95cd73eb56096fb7194bee818a07861919048728c13d4

              SHA512

              7a9342a3de24593de064d75b6f6863b7b28c438306764caeb0588297549a5f71102335c050a831e19cd0f344ff94ca6391a446bf959e2abc6704224136331a28

            • C:\Users\Admin\AppData\Local\Temp\b2e16bf5-d832-4d5a-b602-47f72b13685c.vbs

              Filesize

              482B

              MD5

              6c6f5bf4d4ae1cbe472b33e9d52892e0

              SHA1

              f219e3296f5ef7ff36fd37184997fc2ef8a3c944

              SHA256

              63ee35902e3cfe66e3a7c6e3ef03250ca057bc977d7f663f3ca3cb7a219eaa82

              SHA512

              63221443ce19b9e7a209d4d51d950c780208429770136a2e6c60385efa41866ce6db1c7debfe85fa9d29e731f98fe9dbb3257534b293c1e0c03f3ceb895bf949

            • C:\Users\Admin\AppData\Local\Temp\wFtC02oQlx.bat

              Filesize

              195B

              MD5

              9d588ceac0c899d3990429358edecce5

              SHA1

              912c88962e20c86c83adee7ffd4ba63f3e584b23

              SHA256

              9b1c92688f81c5e925edb8ea6723a7470086675a1e674add86e7ce5f612cfb08

              SHA512

              5ea589caf11006cc1f798070cc652133e9b95a207787c6cdaf318df6199df2bdd8cad94ac6a0909789f949ae5537a5390a0c9b1e4a349238aa56e7bc3d409281

            • C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\services.exe

              Filesize

              2.2MB

              MD5

              d18f66a5568536b35c48ba5f06f447e6

              SHA1

              911aee72eacab12f9add7c7549c4136bc0ce39d9

              SHA256

              d7fe141c3eed44357e7304347a81316e0664aeefb5c740ba280638eeaf388e87

              SHA512

              b62343913478cf0ca3b91f971e7f42b2ec6c1c989d00b57a4b625e8ff432c13fbfc771a7e1f610b87cacafdb7568e95e6d5e1237ed4a2236c5706ee42078be48

            • C:\Users\Default\upfc.exe

              Filesize

              2.2MB

              MD5

              e58495a802532c2de155203e05904fde

              SHA1

              a78df764700d424bf36a4b29f7b83300278880e1

              SHA256

              87c18962a6450cf5dec8e0580dc8f7a85df22833097e4529322eac71b0b0121f

              SHA512

              18889de5c7aa868ea2e73d1a8d7d843e7f39dec2758bbf3bb4d873e0175be8d91a34421a8d226144abffbaaf2147a39f21f492cb4d8da6cd19c36e1c0f7c9872

            • C:\Windows\TAPI\dllhost.exe

              Filesize

              2.2MB

              MD5

              7fb943a550881e7c59acdbba1164cbfd

              SHA1

              ed5bb95d080cbcc5fafaaa0949fdcdfaece4dabe

              SHA256

              f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510

              SHA512

              a4b7e40e07f1d5b24fd2bec828c433d984087ee22478f11da9a2ab4bfb42c3c4609e3d24ba19e8fd0239bfffa532c6e4526d6ff9eb7e3a3d1788cb3e5f6e66fc

            • memory/4464-128-0x00000000002A0000-0x00000000004CE000-memory.dmp

              Filesize

              2.2MB

            • memory/5072-11-0x000000001BBE0000-0x000000001BBE8000-memory.dmp

              Filesize

              32KB

            • memory/5072-27-0x000000001C550000-0x000000001C55E000-memory.dmp

              Filesize

              56KB

            • memory/5072-14-0x000000001BC00000-0x000000001BC0C000-memory.dmp

              Filesize

              48KB

            • memory/5072-15-0x000000001BC20000-0x000000001BC28000-memory.dmp

              Filesize

              32KB

            • memory/5072-16-0x000000001BC30000-0x000000001BC3C000-memory.dmp

              Filesize

              48KB

            • memory/5072-17-0x000000001BC40000-0x000000001BC48000-memory.dmp

              Filesize

              32KB

            • memory/5072-19-0x000000001C2B0000-0x000000001C2C2000-memory.dmp

              Filesize

              72KB

            • memory/5072-20-0x000000001C810000-0x000000001CD38000-memory.dmp

              Filesize

              5.2MB

            • memory/5072-21-0x000000001C2E0000-0x000000001C2EC000-memory.dmp

              Filesize

              48KB

            • memory/5072-22-0x000000001C2F0000-0x000000001C2FC000-memory.dmp

              Filesize

              48KB

            • memory/5072-23-0x000000001C300000-0x000000001C30C000-memory.dmp

              Filesize

              48KB

            • memory/5072-25-0x000000001C510000-0x000000001C51E000-memory.dmp

              Filesize

              56KB

            • memory/5072-24-0x000000001C580000-0x000000001C58A000-memory.dmp

              Filesize

              40KB

            • memory/5072-28-0x000000001C520000-0x000000001C52C000-memory.dmp

              Filesize

              48KB

            • memory/5072-30-0x00007FFBA8E00000-0x00007FFBA98C1000-memory.dmp

              Filesize

              10.8MB

            • memory/5072-31-0x000000001C560000-0x000000001C56C000-memory.dmp

              Filesize

              48KB

            • memory/5072-29-0x000000001C530000-0x000000001C538000-memory.dmp

              Filesize

              32KB

            • memory/5072-13-0x000000001BBF0000-0x000000001BBFA000-memory.dmp

              Filesize

              40KB

            • memory/5072-26-0x000000001C540000-0x000000001C548000-memory.dmp

              Filesize

              32KB

            • memory/5072-34-0x00007FFBA8E00000-0x00007FFBA98C1000-memory.dmp

              Filesize

              10.8MB

            • memory/5072-12-0x000000001BC10000-0x000000001BC20000-memory.dmp

              Filesize

              64KB

            • memory/5072-0-0x00007FFBA8E03000-0x00007FFBA8E05000-memory.dmp

              Filesize

              8KB

            • memory/5072-9-0x000000001BBB0000-0x000000001BBC6000-memory.dmp

              Filesize

              88KB

            • memory/5072-10-0x00000000031B0000-0x00000000031BC000-memory.dmp

              Filesize

              48KB

            • memory/5072-7-0x0000000003190000-0x0000000003198000-memory.dmp

              Filesize

              32KB

            • memory/5072-123-0x00007FFBA8E00000-0x00007FFBA98C1000-memory.dmp

              Filesize

              10.8MB

            • memory/5072-8-0x00000000031A0000-0x00000000031B0000-memory.dmp

              Filesize

              64KB

            • memory/5072-6-0x000000001C260000-0x000000001C2B0000-memory.dmp

              Filesize

              320KB

            • memory/5072-5-0x0000000003170000-0x000000000318C000-memory.dmp

              Filesize

              112KB

            • memory/5072-4-0x0000000003160000-0x000000000316E000-memory.dmp

              Filesize

              56KB

            • memory/5072-3-0x0000000003150000-0x000000000315E000-memory.dmp

              Filesize

              56KB

            • memory/5072-2-0x00007FFBA8E00000-0x00007FFBA98C1000-memory.dmp

              Filesize

              10.8MB

            • memory/5072-1-0x0000000000D10000-0x0000000000F3E000-memory.dmp

              Filesize

              2.2MB