Resubmissions

13-01-2025 05:29

250113-f6xncaxraw 10

12-01-2025 19:21

250112-x2mq1svqe1 10

Analysis

  • max time kernel
    862s
  • max time network
    900s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-01-2025 05:29

General

  • Target

    183CB9283D9C8F6282283BD39F49D33C.exe

  • Size

    2.7MB

  • MD5

    183cb9283d9c8f6282283bd39f49d33c

  • SHA1

    76674564064d31bb9d37f802bdec3821d4a55d89

  • SHA256

    d169e5e99edef6f5c3619faee33bddd20978f514bdc3448b8655fd06ea5f5984

  • SHA512

    14a40235310755e00bfa58a5169978b7fe40890e2f1149500f77780b82ef1aed1354daafb149de18deb3690bbc1b4f6e885be988e4163b6e3acdd16c30d28e22

  • SSDEEP

    49152:Bfj5Pkja3lMPnl9LS7y5PEeQxtD5vLyCse5EPUC1SKGLFSjvzbN+/rV:BfBkyqPnDSOdEeQfocN8GLQLkz

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 8 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\183CB9283D9C8F6282283BD39F49D33C.exe
    C:\Users\Admin\AppData\Local\Temp\183CB9283D9C8F6282283BD39F49D33C.exe cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4252
    • C:\Users\Admin\Links\System.exe
      "C:\Users\Admin\Links\System.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:4292
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Links\System.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1608
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Admin\Links\System.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4816
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Links\System.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4552
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4540
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4024
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2520
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Windows\IME\fr-FR\fontdrvhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3736
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\IME\fr-FR\fontdrvhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1984
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Windows\IME\fr-FR\fontdrvhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4760
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2512
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1764
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1716
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 11 /tr "'C:\Windows\apppatch\CustomSDB\SearchApp.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4864
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\apppatch\CustomSDB\SearchApp.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2316
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 9 /tr "'C:\Windows\apppatch\CustomSDB\SearchApp.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3244
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Common Files\Services\dwm.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4028
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Services\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:5028
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Common Files\Services\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:220
  • C:\Recovery\WindowsRE\sihost.exe
    C:\Recovery\WindowsRE\sihost.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4984
  • C:\Windows\IME\fr-FR\fontdrvhost.exe
    C:\Windows\IME\fr-FR\fontdrvhost.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4568
  • C:\Windows\apppatch\CustomSDB\SearchApp.exe
    C:\Windows\apppatch\CustomSDB\SearchApp.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2612
  • C:\Users\Admin\Links\System.exe
    C:\Users\Admin\Links\System.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4288
  • C:\Program Files (x86)\Common Files\Services\dwm.exe
    "C:\Program Files (x86)\Common Files\Services\dwm.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:3960
  • C:\Recovery\WindowsRE\sysmon.exe
    C:\Recovery\WindowsRE\sysmon.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2448
  • C:\Recovery\WindowsRE\sihost.exe
    C:\Recovery\WindowsRE\sihost.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:3884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recovery\WindowsRE\sihost.exe

    Filesize

    2.7MB

    MD5

    b32d751267ca5b252b933366de53eb88

    SHA1

    89483b75ff27a3fe85beac3d3e46b12dba83f755

    SHA256

    5b06f4217ac12b28082dbec8563bd95c3d750cef3df18c4799088d49eb41bfca

    SHA512

    95cf1594ec74e69627b24c0fcc34aa0f759659dc0d82075b08e6a2bc1f6a68dc928e56859e0f60143eb74acb84b25e2cd87781f46380615a7b7f985522bc5522

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dwm.exe.log

    Filesize

    1KB

    MD5

    baf55b95da4a601229647f25dad12878

    SHA1

    abc16954ebfd213733c4493fc1910164d825cac8

    SHA256

    ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

    SHA512

    24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

  • C:\Users\Admin\Links\System.exe

    Filesize

    2.7MB

    MD5

    55f0f376391cb4dcf8ed9886ebdd2a19

    SHA1

    dcf8a149b72e871a23bc6739077c23308cc31e08

    SHA256

    e49042fc92d7faffd7b9367f82796e21601abad9d533dc619e6867e691a3d52c

    SHA512

    f9d9c4d69d6ee8e1605b3372582828b43d206361363fea01f4be7ba273e8d3193ce4f8ef73cfb02c9a1a86b7f432492eb26351b8733776c2b7c8d41ba85dea20

  • C:\Windows\IME\fr-FR\fontdrvhost.exe

    Filesize

    2.7MB

    MD5

    bad391fd9cbe17291dd4594c9e70236a

    SHA1

    c623375c5c073ef8c808829f6e8a87fe90618284

    SHA256

    1eabd4523c1ab2d366b8650d67e3f231657976a5b038c1ec6e6e964b45631725

    SHA512

    4bad42aa55550e2c0043b05a11f3a4934245b5c71488da3d9a99c1d06b1ab8a34bb546bbdb12711f1d73fdc6c1422a522eb8645a3e9b145f097c508027a49565

  • C:\Windows\apppatch\CustomSDB\SearchApp.exe

    Filesize

    2.7MB

    MD5

    183cb9283d9c8f6282283bd39f49d33c

    SHA1

    76674564064d31bb9d37f802bdec3821d4a55d89

    SHA256

    d169e5e99edef6f5c3619faee33bddd20978f514bdc3448b8655fd06ea5f5984

    SHA512

    14a40235310755e00bfa58a5169978b7fe40890e2f1149500f77780b82ef1aed1354daafb149de18deb3690bbc1b4f6e885be988e4163b6e3acdd16c30d28e22

  • memory/4252-8-0x000000001B520000-0x000000001B536000-memory.dmp

    Filesize

    88KB

  • memory/4252-16-0x000000001BD50000-0x000000001BD58000-memory.dmp

    Filesize

    32KB

  • memory/4252-6-0x000000001B500000-0x000000001B508000-memory.dmp

    Filesize

    32KB

  • memory/4252-0-0x00007FFC4B1C3000-0x00007FFC4B1C5000-memory.dmp

    Filesize

    8KB

  • memory/4252-9-0x000000001B540000-0x000000001B548000-memory.dmp

    Filesize

    32KB

  • memory/4252-11-0x000000001B560000-0x000000001B56A000-memory.dmp

    Filesize

    40KB

  • memory/4252-10-0x000000001B550000-0x000000001B558000-memory.dmp

    Filesize

    32KB

  • memory/4252-12-0x000000001BCD0000-0x000000001BD26000-memory.dmp

    Filesize

    344KB

  • memory/4252-13-0x000000001BD20000-0x000000001BD28000-memory.dmp

    Filesize

    32KB

  • memory/4252-14-0x000000001BE30000-0x000000001BE42000-memory.dmp

    Filesize

    72KB

  • memory/4252-15-0x000000001C370000-0x000000001C898000-memory.dmp

    Filesize

    5.2MB

  • memory/4252-18-0x000000001BD70000-0x000000001BD7C000-memory.dmp

    Filesize

    48KB

  • memory/4252-20-0x000000001BD90000-0x000000001BD9C000-memory.dmp

    Filesize

    48KB

  • memory/4252-19-0x000000001BD80000-0x000000001BD8E000-memory.dmp

    Filesize

    56KB

  • memory/4252-17-0x000000001BD60000-0x000000001BD68000-memory.dmp

    Filesize

    32KB

  • memory/4252-7-0x000000001B510000-0x000000001B520000-memory.dmp

    Filesize

    64KB

  • memory/4252-21-0x000000001BDA0000-0x000000001BDAA000-memory.dmp

    Filesize

    40KB

  • memory/4252-22-0x000000001BDB0000-0x000000001BDBC000-memory.dmp

    Filesize

    48KB

  • memory/4252-5-0x000000001BC80000-0x000000001BCD0000-memory.dmp

    Filesize

    320KB

  • memory/4252-4-0x0000000002BC0000-0x0000000002BDC000-memory.dmp

    Filesize

    112KB

  • memory/4252-3-0x0000000002BB0000-0x0000000002BBE000-memory.dmp

    Filesize

    56KB

  • memory/4252-2-0x00007FFC4B1C0000-0x00007FFC4BC81000-memory.dmp

    Filesize

    10.8MB

  • memory/4252-1-0x0000000000710000-0x00000000009C4000-memory.dmp

    Filesize

    2.7MB

  • memory/4252-167-0x00007FFC4B1C0000-0x00007FFC4BC81000-memory.dmp

    Filesize

    10.8MB

  • memory/4292-168-0x000000001BE20000-0x000000001BE76000-memory.dmp

    Filesize

    344KB

  • memory/4292-169-0x00000000031E0000-0x00000000031F2000-memory.dmp

    Filesize

    72KB

  • memory/4292-166-0x0000000000E50000-0x0000000001104000-memory.dmp

    Filesize

    2.7MB

  • memory/4568-214-0x0000000000260000-0x0000000000514000-memory.dmp

    Filesize

    2.7MB

  • memory/4984-210-0x0000000000160000-0x0000000000414000-memory.dmp

    Filesize

    2.7MB