Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2025 06:16

General

  • Target

    f6d9e0292d18f4cc7fde4f34bd9722276a570f94bd6586392bc94fc6380ec0daN.exe

  • Size

    2.7MB

  • MD5

    7c935427ecd47e8deb5ce641226d8980

  • SHA1

    963be2aa84776697aabe1e77d9b0596ba3ff0020

  • SHA256

    f6d9e0292d18f4cc7fde4f34bd9722276a570f94bd6586392bc94fc6380ec0da

  • SHA512

    1afb5e8f858b71fa3efdf0acfd38855d735b928388866e19396b86a874b69b45b00ebbdde233f4fddce2c04eb14acb137acf511e335d327aeb7f98f6d9ac27b2

  • SSDEEP

    49152:5H3ow5/6oEcY2I6DxCP2vAWJ6ZsSVnJTXretG/Q1Hciyc5nIudabGm:5j/NDB9m2v9JqVJ7OG/Q18irfdabGm

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 21 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 21 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6d9e0292d18f4cc7fde4f34bd9722276a570f94bd6586392bc94fc6380ec0daN.exe
    "C:\Users\Admin\AppData\Local\Temp\f6d9e0292d18f4cc7fde4f34bd9722276a570f94bd6586392bc94fc6380ec0daN.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1268
    • C:\Program Files\Windows NT\Accessories\en-US\services.exe
      "C:\Program Files\Windows NT\Accessories\en-US\services.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:944
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\smss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1932
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1624
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2720
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\dllhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2804
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2848
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2952
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\lsass.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2860
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\MSOCache\All Users\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2596
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2844
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows NT\Accessories\en-US\services.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2832
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\en-US\services.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2604
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows NT\Accessories\en-US\services.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2740
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\audiodg.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3060
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\audiodg.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2356
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\audiodg.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2116
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\spoolsv.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1640
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Default User\spoolsv.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:988
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\spoolsv.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1916
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\Idle.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1652
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\MSOCache\All Users\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1712
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\RCXCE5E.tmp

    Filesize

    2.7MB

    MD5

    1ce681229ff644abf2c792561b058666

    SHA1

    55140db67570849cde8ba13168c881e62eef202f

    SHA256

    2cda94141b8d0f06b5c4a0c1200c65aa95a5f4135c5f400a854278cba916375c

    SHA512

    756e546a2abae27905297ee536e6e1f76557e6033461a2326f26a383c28e66c3b7dfd5ca185a915a034ca7eb92486f4941acdbc23a517bd4e50e612c66fbbbb6

  • C:\Program Files (x86)\Mozilla Maintenance Service\logs\audiodg.exe

    Filesize

    2.7MB

    MD5

    7c935427ecd47e8deb5ce641226d8980

    SHA1

    963be2aa84776697aabe1e77d9b0596ba3ff0020

    SHA256

    f6d9e0292d18f4cc7fde4f34bd9722276a570f94bd6586392bc94fc6380ec0da

    SHA512

    1afb5e8f858b71fa3efdf0acfd38855d735b928388866e19396b86a874b69b45b00ebbdde233f4fddce2c04eb14acb137acf511e335d327aeb7f98f6d9ac27b2

  • C:\Program Files\Windows NT\Accessories\en-US\services.exe

    Filesize

    2.7MB

    MD5

    4f348bdf16c46ea3eb2dfc150fcc311e

    SHA1

    738f61e159842b59e70b6edef1cb98f692fc1cea

    SHA256

    e2c51b5d0818aed37c4e325561651517d91d21a8c7c8ad296ee1fd7abe41c214

    SHA512

    3773959aaf7d9c22b6188030b29bb6df2204c64d9b75c49992a887a16229d38d15640e8dc27256fcfc6c5df85080d943be225714ef0a22ea2634f257d251c51c

  • memory/944-126-0x0000000000B90000-0x0000000000BA2000-memory.dmp

    Filesize

    72KB

  • memory/944-124-0x0000000000E70000-0x0000000001122000-memory.dmp

    Filesize

    2.7MB

  • memory/1268-12-0x00000000023A0000-0x00000000023A8000-memory.dmp

    Filesize

    32KB

  • memory/1268-14-0x0000000002550000-0x000000000255C000-memory.dmp

    Filesize

    48KB

  • memory/1268-7-0x00000000009B0000-0x00000000009C6000-memory.dmp

    Filesize

    88KB

  • memory/1268-8-0x0000000002200000-0x0000000002208000-memory.dmp

    Filesize

    32KB

  • memory/1268-9-0x0000000002220000-0x000000000222A000-memory.dmp

    Filesize

    40KB

  • memory/1268-10-0x0000000002230000-0x0000000002286000-memory.dmp

    Filesize

    344KB

  • memory/1268-11-0x0000000002210000-0x0000000002222000-memory.dmp

    Filesize

    72KB

  • memory/1268-0-0x000007FEF5EF3000-0x000007FEF5EF4000-memory.dmp

    Filesize

    4KB

  • memory/1268-13-0x0000000002540000-0x0000000002548000-memory.dmp

    Filesize

    32KB

  • memory/1268-6-0x00000000009A0000-0x00000000009B0000-memory.dmp

    Filesize

    64KB

  • memory/1268-15-0x0000000002560000-0x000000000256E000-memory.dmp

    Filesize

    56KB

  • memory/1268-16-0x0000000002570000-0x000000000257C000-memory.dmp

    Filesize

    48KB

  • memory/1268-17-0x0000000002580000-0x000000000258A000-memory.dmp

    Filesize

    40KB

  • memory/1268-18-0x0000000002590000-0x000000000259C000-memory.dmp

    Filesize

    48KB

  • memory/1268-5-0x00000000007F0000-0x00000000007F8000-memory.dmp

    Filesize

    32KB

  • memory/1268-4-0x0000000000980000-0x000000000099C000-memory.dmp

    Filesize

    112KB

  • memory/1268-3-0x00000000007E0000-0x00000000007EE000-memory.dmp

    Filesize

    56KB

  • memory/1268-2-0x000007FEF5EF0000-0x000007FEF68DC000-memory.dmp

    Filesize

    9.9MB

  • memory/1268-125-0x000007FEF5EF0000-0x000007FEF68DC000-memory.dmp

    Filesize

    9.9MB

  • memory/1268-1-0x00000000002A0000-0x0000000000552000-memory.dmp

    Filesize

    2.7MB