Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/01/2025, 05:51 UTC
Behavioral task
behavioral1
Sample
9f7d0b9a32de0f6cefb6a3328f833034.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9f7d0b9a32de0f6cefb6a3328f833034.exe
Resource
win10v2004-20241007-en
General
-
Target
9f7d0b9a32de0f6cefb6a3328f833034.exe
-
Size
2.7MB
-
MD5
9f7d0b9a32de0f6cefb6a3328f833034
-
SHA1
b2f45dab2c76093c317cab36a47873e55e2c7c6e
-
SHA256
6e333e5b68668934186d53525c24d2ed857c35e36b4d21102d06e52e6890ac5f
-
SHA512
0ead99e58a9d244f308405a1cff664479de57f1ee38014a557642ef1ea3fe52f20f433c17da565ea23168a8b8c416fcbcb43e6d3df0c959341d36f592fb97f1d
-
SSDEEP
49152:bBu+dK3GaaTUukCTXO2s2f1sKfmFRd0MdOa5k1kpm/Ufn6sC:duyjAi+j2aK+F54/U/6s
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 9 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2820 2708 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2732 2708 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2684 2708 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2696 2708 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2840 2708 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2976 2708 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 2708 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 2708 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2596 2708 schtasks.exe 31 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9f7d0b9a32de0f6cefb6a3328f833034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 9f7d0b9a32de0f6cefb6a3328f833034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 9f7d0b9a32de0f6cefb6a3328f833034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WMIADAP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" WMIADAP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" WMIADAP.exe -
resource yara_rule behavioral1/memory/2028-1-0x0000000000300000-0x00000000005B4000-memory.dmp dcrat behavioral1/files/0x000c0000000122ce-34.dat dcrat behavioral1/files/0x00060000000190c9-52.dat dcrat behavioral1/memory/472-77-0x00000000008C0000-0x0000000000B74000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 472 WMIADAP.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9f7d0b9a32de0f6cefb6a3328f833034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9f7d0b9a32de0f6cefb6a3328f833034.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WMIADAP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WMIADAP.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files\Windows Defender\spoolsv.exe 9f7d0b9a32de0f6cefb6a3328f833034.exe File opened for modification C:\Program Files\Windows Defender\RCXD4DF.tmp 9f7d0b9a32de0f6cefb6a3328f833034.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\RCXD927.tmp 9f7d0b9a32de0f6cefb6a3328f833034.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\WMIADAP.exe 9f7d0b9a32de0f6cefb6a3328f833034.exe File opened for modification C:\Program Files\Windows Defender\RCXD4DE.tmp 9f7d0b9a32de0f6cefb6a3328f833034.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\RCXD926.tmp 9f7d0b9a32de0f6cefb6a3328f833034.exe File opened for modification C:\Program Files\Windows Defender\spoolsv.exe 9f7d0b9a32de0f6cefb6a3328f833034.exe File created C:\Program Files\Windows Defender\f3b6ecef712a24 9f7d0b9a32de0f6cefb6a3328f833034.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\WMIADAP.exe 9f7d0b9a32de0f6cefb6a3328f833034.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\75a57c1bdf437c 9f7d0b9a32de0f6cefb6a3328f833034.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2820 schtasks.exe 2732 schtasks.exe 2684 schtasks.exe 2696 schtasks.exe 2828 schtasks.exe 2596 schtasks.exe 2840 schtasks.exe 2976 schtasks.exe 2748 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2028 9f7d0b9a32de0f6cefb6a3328f833034.exe 472 WMIADAP.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2028 9f7d0b9a32de0f6cefb6a3328f833034.exe Token: SeDebugPrivilege 472 WMIADAP.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2876 2028 9f7d0b9a32de0f6cefb6a3328f833034.exe 41 PID 2028 wrote to memory of 2876 2028 9f7d0b9a32de0f6cefb6a3328f833034.exe 41 PID 2028 wrote to memory of 2876 2028 9f7d0b9a32de0f6cefb6a3328f833034.exe 41 PID 2876 wrote to memory of 2136 2876 cmd.exe 43 PID 2876 wrote to memory of 2136 2876 cmd.exe 43 PID 2876 wrote to memory of 2136 2876 cmd.exe 43 PID 2876 wrote to memory of 472 2876 cmd.exe 44 PID 2876 wrote to memory of 472 2876 cmd.exe 44 PID 2876 wrote to memory of 472 2876 cmd.exe 44 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9f7d0b9a32de0f6cefb6a3328f833034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 9f7d0b9a32de0f6cefb6a3328f833034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 9f7d0b9a32de0f6cefb6a3328f833034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WMIADAP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" WMIADAP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" WMIADAP.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f7d0b9a32de0f6cefb6a3328f833034.exe"C:\Users\Admin\AppData\Local\Temp\9f7d0b9a32de0f6cefb6a3328f833034.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2028 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dtHMBUzi2f.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\WMIADAP.exe"C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\WMIADAP.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:472
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Defender\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Defender\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Downloads\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Admin\Downloads\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Downloads\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\WMIADAP.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2596
Network
-
Remote address:8.8.8.8:53Requesta1071976.xsph.ruIN AResponsea1071976.xsph.ruIN A141.8.192.164
-
152 B 3
-
152 B 3
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD59f7d0b9a32de0f6cefb6a3328f833034
SHA1b2f45dab2c76093c317cab36a47873e55e2c7c6e
SHA2566e333e5b68668934186d53525c24d2ed857c35e36b4d21102d06e52e6890ac5f
SHA5120ead99e58a9d244f308405a1cff664479de57f1ee38014a557642ef1ea3fe52f20f433c17da565ea23168a8b8c416fcbcb43e6d3df0c959341d36f592fb97f1d
-
Filesize
243B
MD544551438b735d16781abad52fef69c71
SHA124b50550d77a32cc8dd803ffb329cea5eebd58a9
SHA256cb1ad1e42df8b94bc57959c285b99279afbe83ebfe51b5adef3bbc5cddd24588
SHA51261dd572addb6f2715c36d8b0536d9de7b4e49bc562c748c2769a413ccf6af85e5a4f7585f5cff25d0ae84b54ce895b1b1d4e1ca38e77eef95c82c1df869d6e5d
-
Filesize
2.7MB
MD5109b5cb9fd42d796d646a79486f7d6a2
SHA11684597a8b66e56050ae23973ee1ffed55a3ea21
SHA256f1abafb7ed10e847dae29ca5f4241922031406fdd598e5132448b4c72f234ffa
SHA512bd58d39ebfdacad48bddce44e7d865a249115e19b1060d0b57ddaf151c70587d9cb299754d31938e143c4ef0ea822091c9b95eb24acd9ff4950d6045ad429d09