Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 01:34
Behavioral task
behavioral1
Sample
71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe
Resource
win10v2004-20241007-en
General
-
Target
71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe
-
Size
783KB
-
MD5
cf1bfee7761c04cb3d6bac55fd17f8e9
-
SHA1
626a9ced8310839072e9025f576060792efcdaae
-
SHA256
71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6
-
SHA512
db31cca344fa6b94591b55ab6aa918058f3165f11fe8dacde5f9513e8d8057714444ceea9d25db95ac5e112309ee16874ed6957569b9a9c8420c9cc7d72dc102
-
SSDEEP
12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2792 2528 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2008 2528 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 2528 schtasks.exe 28 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" csrss.exe -
resource yara_rule behavioral1/memory/2228-1-0x00000000012A0000-0x000000000136A000-memory.dmp dcrat behavioral1/files/0x0006000000016d4a-31.dat dcrat behavioral1/files/0x0007000000014f7b-60.dat dcrat behavioral1/memory/2856-62-0x0000000000B80000-0x0000000000C4A000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2856 csrss.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\find\\csrss.exe\"" 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Recovery\\1b8b1de2-69f6-11ef-9774-62cb582c238c\\Idle.exe\"" 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Windows\\System32\\smss\\sppsvc.exe\"" 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\System32\smss\sppsvc.exe 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe File created C:\Windows\System32\smss\0a1fd5f707cd16ea89afd3d6db52b2da58214a6c 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe File created C:\Windows\System32\find\csrss.exe 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe File created C:\Windows\System32\find\886983d96e3d3e31032c679b2d4ea91b6c05afef 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe File opened for modification C:\Windows\System32\smss\RCX539D.tmp 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe File opened for modification C:\Windows\System32\find\RCX560E.tmp 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe File opened for modification C:\Windows\System32\find\csrss.exe 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe File created C:\Windows\System32\smss\sppsvc.exe 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2008 schtasks.exe 2612 schtasks.exe 2792 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2228 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe 2228 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe 2228 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe 2228 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe 2228 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe 2228 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe 2228 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe 2228 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe 2228 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe 2856 csrss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2228 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe Token: SeDebugPrivilege 2856 csrss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1488 2228 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe 32 PID 2228 wrote to memory of 1488 2228 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe 32 PID 2228 wrote to memory of 1488 2228 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe 32 PID 1488 wrote to memory of 2736 1488 cmd.exe 34 PID 1488 wrote to memory of 2736 1488 cmd.exe 34 PID 1488 wrote to memory of 2736 1488 cmd.exe 34 PID 1488 wrote to memory of 2856 1488 cmd.exe 35 PID 1488 wrote to memory of 2856 1488 cmd.exe 35 PID 1488 wrote to memory of 2856 1488 cmd.exe 35 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe"C:\Users\Admin\AppData\Local\Temp\71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6.exe"1⤵
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2228 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\baDLdpmdjH.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2736
-
-
C:\Windows\System32\find\csrss.exe"C:\Windows\System32\find\csrss.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2856
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\System32\smss\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\find\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2612
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
783KB
MD584889da61753f56f1efd9d213b92f33d
SHA19c52f72d60921b26360593df8803c9d8730f8179
SHA25690370e40b392a1c452e5e7667309fe4f35e7d9c9ca3d68f382777c0b91e8502e
SHA5128b4b7d249405ee2d43872c2dcf8647be83731e70bdbb2f4bd2845a8e33f79f8a42f0e9a835b5ee633bdfa13eefef95f33e36719c88d41a3b34c406b5dec91e88
-
Filesize
198B
MD589113207f6c60e28384e36ea02f564b1
SHA176469ccadc2ac3c1c5c74d6733f3a093ed29c541
SHA25692fa5c3c69ea35b512e468cacfb2e3a365d4e5fd50838a4987f6643fca614f6e
SHA512920f1028ed60e896c81a81d633d5d785a39c70b1b1cb4f62aee57b31fea026cd08cbe8cc17096c128be29e5601a7b00b5af6968c91276b87eed9a968c9385107
-
Filesize
783KB
MD5cf1bfee7761c04cb3d6bac55fd17f8e9
SHA1626a9ced8310839072e9025f576060792efcdaae
SHA25671be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6
SHA512db31cca344fa6b94591b55ab6aa918058f3165f11fe8dacde5f9513e8d8057714444ceea9d25db95ac5e112309ee16874ed6957569b9a9c8420c9cc7d72dc102