Analysis

  • max time kernel
    78s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2025 04:48

General

  • Target

    601c80172781fb1a9442666be536e617c330f822f9f4f467d7608f7d81eaeabe.exe

  • Size

    952KB

  • MD5

    dd96a30a7bca43cb9a3dcece5b8402a5

  • SHA1

    831695e0af7321506f7a67f5957d0a9b50bd1e77

  • SHA256

    601c80172781fb1a9442666be536e617c330f822f9f4f467d7608f7d81eaeabe

  • SHA512

    854ff9d2b117922b1e7cb8c9e96a1c2a3e6c3746005c2a2f76e4e7d468e245258308342c0ed9e3940eb95a4b2ae0798ddb0bbd2e97a851b8cee370ffcdb9acd8

  • SSDEEP

    24576:W+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX+:x8/KfRTKE

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 20 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\601c80172781fb1a9442666be536e617c330f822f9f4f467d7608f7d81eaeabe.exe
    "C:\Users\Admin\AppData\Local\Temp\601c80172781fb1a9442666be536e617c330f822f9f4f467d7608f7d81eaeabe.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2868
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ksYzy4CPKy.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1092
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2216
        • C:\Program Files (x86)\Windows Photo Viewer\en-US\dwm.exe
          "C:\Program Files (x86)\Windows Photo Viewer\en-US\dwm.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:1620
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "601c80172781fb1a9442666be536e617c330f822f9f4f467d7608f7d81eaeabe" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\wmsetup\601c80172781fb1a9442666be536e617c330f822f9f4f467d7608f7d81eaeabe.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2632
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\mscandui\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2340
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\compstui\lsass.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2168
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2624
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\api-ms-win-crt-string-l1-1-0\wininit.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2332
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\netcfg\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3044

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Windows Photo Viewer\en-US\dwm.exe

      Filesize

      952KB

      MD5

      8db13604b968b179da1f73d15e66ff30

      SHA1

      4e81c65089f54c7b76dcf7a39031cb934b2957be

      SHA256

      2a1d00c992230e45f6f6b4b0b55ef5b0b31d0f1abe23d96e9877c68aa5f20235

      SHA512

      02fd444136942fdea5fb955ce4843ea3b28a830ee612005e00b7b2959d17ebbaa350ebcdc3da323488c8caf5a75e621c06e02dc9b7fbdb90274701e9b8447624

    • C:\Users\Admin\AppData\Local\Temp\ksYzy4CPKy.bat

      Filesize

      221B

      MD5

      52594275ec39b781ec1199b1ae6a64e0

      SHA1

      0cee084a46076ca35573223d7a843fe2ba3298a2

      SHA256

      943b6efeb588bd004e0ce0f216b43b486a2043e8364e7aa69cbbbc6c929fc630

      SHA512

      1b37d059bc6eab2d736ece42858ced2b4771d72b4c65a12d78c52e0b00035e4725e4404bf26d13dabb4bc04d95bbc765ab636b1eb404eccf83ef09a18b661e36

    • C:\Windows\System32\api-ms-win-crt-string-l1-1-0\wininit.exe

      Filesize

      952KB

      MD5

      dd96a30a7bca43cb9a3dcece5b8402a5

      SHA1

      831695e0af7321506f7a67f5957d0a9b50bd1e77

      SHA256

      601c80172781fb1a9442666be536e617c330f822f9f4f467d7608f7d81eaeabe

      SHA512

      854ff9d2b117922b1e7cb8c9e96a1c2a3e6c3746005c2a2f76e4e7d468e245258308342c0ed9e3940eb95a4b2ae0798ddb0bbd2e97a851b8cee370ffcdb9acd8

    • C:\Windows\System32\api-ms-win-crt-string-l1-1-0\wininit.exe

      Filesize

      952KB

      MD5

      fba4d76a2ed83cb144ca1bbf1d3bf6f3

      SHA1

      4b325e80291c1197f7a9ff6337a86b0aa2672619

      SHA256

      e477953049d02e1d741a370cd929eabaffdfcd2b21f85d229b1b60665c3a3bf6

      SHA512

      cd20e83cf3a10b5fb7c646da5b46bfca8dd67b16b96e737abf576d8e536969b6a82e9e344400fa5e7fe44d4c39294dca8b12a8271911e48738627e96095bca71

    • C:\Windows\System32\compstui\lsass.exe

      Filesize

      952KB

      MD5

      12ff8fc4ed06a512ba60c7ffc731fdc2

      SHA1

      4996d778fe65eea929e76a9bba513babd7af40b3

      SHA256

      6cba028f1789184057764b2a8a17678c546290d6074bd0e58be488e31c8f8efb

      SHA512

      28bddf5e3c1213998677e05c716190fec110d21bc032202e200356b10f12f3fa0d32e612f275f4003cfe7d0761746f10ae500dee734ecde01d9bb601405314e4

    • memory/1620-106-0x0000000000B00000-0x0000000000BF4000-memory.dmp

      Filesize

      976KB

    • memory/2868-4-0x00000000003E0000-0x00000000003F0000-memory.dmp

      Filesize

      64KB

    • memory/2868-7-0x0000000000550000-0x000000000055A000-memory.dmp

      Filesize

      40KB

    • memory/2868-8-0x0000000000510000-0x0000000000518000-memory.dmp

      Filesize

      32KB

    • memory/2868-9-0x0000000000520000-0x000000000052A000-memory.dmp

      Filesize

      40KB

    • memory/2868-10-0x00000000005A0000-0x00000000005AC000-memory.dmp

      Filesize

      48KB

    • memory/2868-11-0x0000000000560000-0x000000000056C000-memory.dmp

      Filesize

      48KB

    • memory/2868-6-0x0000000000500000-0x000000000050C000-memory.dmp

      Filesize

      48KB

    • memory/2868-5-0x00000000003F0000-0x00000000003FA000-memory.dmp

      Filesize

      40KB

    • memory/2868-0-0x000007FEF5A53000-0x000007FEF5A54000-memory.dmp

      Filesize

      4KB

    • memory/2868-3-0x00000000003D0000-0x00000000003E0000-memory.dmp

      Filesize

      64KB

    • memory/2868-2-0x000007FEF5A50000-0x000007FEF643C000-memory.dmp

      Filesize

      9.9MB

    • memory/2868-103-0x000007FEF5A50000-0x000007FEF643C000-memory.dmp

      Filesize

      9.9MB

    • memory/2868-1-0x00000000002D0000-0x00000000003C4000-memory.dmp

      Filesize

      976KB