Analysis
-
max time kernel
122s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 10:31
Behavioral task
behavioral1
Sample
d1793da857eca536d0d06e1bdfa657ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1793da857eca536d0d06e1bdfa657ab.exe
Resource
win10v2004-20241007-en
General
-
Target
d1793da857eca536d0d06e1bdfa657ab.exe
-
Size
2.7MB
-
MD5
d1793da857eca536d0d06e1bdfa657ab
-
SHA1
bb07044f5867554c74063d4c9509248657322040
-
SHA256
60f6c911f8b8f9579e3958699dcb7fb91ade66f3a9bdd435632c6d18006002c2
-
SHA512
8d35eab524e898a14e17185c64e092c56e310f15e3cd2e0bfd533b15c55b78078dfc2dbaeba3d3a5027a96967fca11cf3c60a4fb859e5ecee28addda04238e4b
-
SSDEEP
49152:yqyJUSQelMhlk1w19BlUobhENGZXxRWi0UAuqYqqnc:PyJlQgGk1wPko1oO30UA7Yqq
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 21 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2528 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2544 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2600 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1092 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1200 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 692 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 988 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 892 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1812 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2624 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2712 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2564 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2280 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2340 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1672 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1372 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1964 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1796 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1916 2688 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 632 2688 schtasks.exe 30 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d1793da857eca536d0d06e1bdfa657ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" d1793da857eca536d0d06e1bdfa657ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" d1793da857eca536d0d06e1bdfa657ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Idle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Idle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Idle.exe -
resource yara_rule behavioral1/memory/2632-1-0x00000000012D0000-0x0000000001584000-memory.dmp dcrat behavioral1/files/0x0006000000016cd1-28.dat dcrat behavioral1/files/0x0005000000018792-47.dat dcrat behavioral1/files/0x000a000000012119-70.dat dcrat behavioral1/files/0x000e000000015d8f-117.dat dcrat behavioral1/memory/1936-128-0x0000000000970000-0x0000000000C24000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 1936 Idle.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d1793da857eca536d0d06e1bdfa657ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d1793da857eca536d0d06e1bdfa657ab.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Idle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Idle.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\fonts\RCX60A5.tmp d1793da857eca536d0d06e1bdfa657ab.exe File created C:\Program Files\VideoLAN\VLC\locale\6ccacd8608530f d1793da857eca536d0d06e1bdfa657ab.exe File created C:\Program Files\Windows Photo Viewer\de-DE\sppsvc.exe d1793da857eca536d0d06e1bdfa657ab.exe File created C:\Program Files\Windows Photo Viewer\de-DE\0a1fd5f707cd16 d1793da857eca536d0d06e1bdfa657ab.exe File created C:\Program Files\Mozilla Firefox\fonts\886983d96e3d3e d1793da857eca536d0d06e1bdfa657ab.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\RCX5883.tmp d1793da857eca536d0d06e1bdfa657ab.exe File opened for modification C:\Program Files\Windows Photo Viewer\de-DE\RCX5C8C.tmp d1793da857eca536d0d06e1bdfa657ab.exe File opened for modification C:\Program Files\Windows Photo Viewer\de-DE\sppsvc.exe d1793da857eca536d0d06e1bdfa657ab.exe File created C:\Program Files\VideoLAN\VLC\locale\Idle.exe d1793da857eca536d0d06e1bdfa657ab.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\RCX5610.tmp d1793da857eca536d0d06e1bdfa657ab.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\sppsvc.exe d1793da857eca536d0d06e1bdfa657ab.exe File opened for modification C:\Program Files\Mozilla Firefox\fonts\RCX6113.tmp d1793da857eca536d0d06e1bdfa657ab.exe File opened for modification C:\Program Files\Mozilla Firefox\fonts\csrss.exe d1793da857eca536d0d06e1bdfa657ab.exe File created C:\Program Files\Windows Media Player\de-DE\sppsvc.exe d1793da857eca536d0d06e1bdfa657ab.exe File opened for modification C:\Program Files\Windows Photo Viewer\de-DE\RCX5C8D.tmp d1793da857eca536d0d06e1bdfa657ab.exe File created C:\Program Files\Windows Media Player\de-DE\0a1fd5f707cd16 d1793da857eca536d0d06e1bdfa657ab.exe File created C:\Program Files\Mozilla Firefox\fonts\csrss.exe d1793da857eca536d0d06e1bdfa657ab.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\RCX5611.tmp d1793da857eca536d0d06e1bdfa657ab.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\Idle.exe d1793da857eca536d0d06e1bdfa657ab.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\RCX5815.tmp d1793da857eca536d0d06e1bdfa657ab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 21 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2712 schtasks.exe 1372 schtasks.exe 1964 schtasks.exe 2600 schtasks.exe 692 schtasks.exe 1812 schtasks.exe 1672 schtasks.exe 1916 schtasks.exe 1200 schtasks.exe 988 schtasks.exe 2280 schtasks.exe 2564 schtasks.exe 2340 schtasks.exe 1948 schtasks.exe 2528 schtasks.exe 2544 schtasks.exe 892 schtasks.exe 632 schtasks.exe 1092 schtasks.exe 2624 schtasks.exe 1796 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2632 d1793da857eca536d0d06e1bdfa657ab.exe 1936 Idle.exe 1936 Idle.exe 1936 Idle.exe 1936 Idle.exe 1936 Idle.exe 1936 Idle.exe 1936 Idle.exe 1936 Idle.exe 1936 Idle.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1936 Idle.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2632 d1793da857eca536d0d06e1bdfa657ab.exe Token: SeDebugPrivilege 1936 Idle.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2632 wrote to memory of 1936 2632 d1793da857eca536d0d06e1bdfa657ab.exe 52 PID 2632 wrote to memory of 1936 2632 d1793da857eca536d0d06e1bdfa657ab.exe 52 PID 2632 wrote to memory of 1936 2632 d1793da857eca536d0d06e1bdfa657ab.exe 52 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" d1793da857eca536d0d06e1bdfa657ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Idle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Idle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Idle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d1793da857eca536d0d06e1bdfa657ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" d1793da857eca536d0d06e1bdfa657ab.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1793da857eca536d0d06e1bdfa657ab.exe"C:\Users\Admin\AppData\Local\Temp\d1793da857eca536d0d06e1bdfa657ab.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2632 -
C:\Users\Public\Music\Sample Music\Idle.exe"C:\Users\Public\Music\Sample Music\Idle.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1936
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "d1793da857eca536d0d06e1bdfa657abd" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\d1793da857eca536d0d06e1bdfa657ab.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "d1793da857eca536d0d06e1bdfa657ab" /sc ONLOGON /tr "'C:\Users\All Users\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\d1793da857eca536d0d06e1bdfa657ab.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "d1793da857eca536d0d06e1bdfa657abd" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\d1793da857eca536d0d06e1bdfa657ab.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Program Files\VideoLAN\VLC\locale\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\locale\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Program Files\VideoLAN\VLC\locale\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Media Player\de-DE\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\de-DE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Media Player\de-DE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Music\Sample Music\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Public\Music\Sample Music\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Music\Sample Music\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Photo Viewer\de-DE\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\de-DE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Photo Viewer\de-DE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Downloads\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\Downloads\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Downloads\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files\Mozilla Firefox\fonts\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\fonts\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Mozilla Firefox\fonts\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:632
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5800ed07d843e10b96b52f9979708b26f
SHA1e8ebf1520ec3a84d4c2b5f46788e187eb187b595
SHA2561bbe32f7f97e6e7f3ce01152da00461943347a087a572510b8e0a870249e01e2
SHA5125d91cdbe44195a5c44a77d310dca124825a16a531de3c970c72fcbae204ef83ce02003d77af787505915c7cb09c6b53db2fb9852611d196711213c4025a24769
-
Filesize
2.7MB
MD518ada4d0d2f414edc7b24735257edebc
SHA195f81abcf1e4eb40d55f9adae23f62b835019f81
SHA2560ac3aa18ecf4595144a98dbb2fd77a3e24cc0921e9c84972e6704441e1611648
SHA5121918b80ce54aea95b3076c761fea588f93ca470a57ae56802b52cf246c7899ce0dc50e39dc39ef8bf038681f3bda05c72a9afb034da1264c6179a548d67adc50
-
Filesize
2.7MB
MD5d1793da857eca536d0d06e1bdfa657ab
SHA1bb07044f5867554c74063d4c9509248657322040
SHA25660f6c911f8b8f9579e3958699dcb7fb91ade66f3a9bdd435632c6d18006002c2
SHA5128d35eab524e898a14e17185c64e092c56e310f15e3cd2e0bfd533b15c55b78078dfc2dbaeba3d3a5027a96967fca11cf3c60a4fb859e5ecee28addda04238e4b
-
C:\ProgramData\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\d1793da857eca536d0d06e1bdfa657ab.exe
Filesize2.7MB
MD5cf9fc339e411d3cd1da1ba96ca867441
SHA14d401d464f01495d5e7f2a88c4a7f81ed2adeae0
SHA256f57744e1807b93a4cda5cd15bd25da1aae9248495b52de53655c2d023851699c
SHA51284efb4f4e38eca3c0a8a4fc21a7642933269f3b7658df5e96a77d9b716625aa744c27ebe6e53fb58ec8e91f690c94ea48360c937be86447ab85ccd1d51be4a08