Analysis

  • max time kernel
    122s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2025 10:31

General

  • Target

    d1793da857eca536d0d06e1bdfa657ab.exe

  • Size

    2.7MB

  • MD5

    d1793da857eca536d0d06e1bdfa657ab

  • SHA1

    bb07044f5867554c74063d4c9509248657322040

  • SHA256

    60f6c911f8b8f9579e3958699dcb7fb91ade66f3a9bdd435632c6d18006002c2

  • SHA512

    8d35eab524e898a14e17185c64e092c56e310f15e3cd2e0bfd533b15c55b78078dfc2dbaeba3d3a5027a96967fca11cf3c60a4fb859e5ecee28addda04238e4b

  • SSDEEP

    49152:yqyJUSQelMhlk1w19BlUobhENGZXxRWi0UAuqYqqnc:PyJlQgGk1wPko1oO30UA7Yqq

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 21 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 21 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1793da857eca536d0d06e1bdfa657ab.exe
    "C:\Users\Admin\AppData\Local\Temp\d1793da857eca536d0d06e1bdfa657ab.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2632
    • C:\Users\Public\Music\Sample Music\Idle.exe
      "C:\Users\Public\Music\Sample Music\Idle.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:1936
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "d1793da857eca536d0d06e1bdfa657abd" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\d1793da857eca536d0d06e1bdfa657ab.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2528
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "d1793da857eca536d0d06e1bdfa657ab" /sc ONLOGON /tr "'C:\Users\All Users\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\d1793da857eca536d0d06e1bdfa657ab.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2544
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "d1793da857eca536d0d06e1bdfa657abd" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\d1793da857eca536d0d06e1bdfa657ab.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2600
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Program Files\VideoLAN\VLC\locale\Idle.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1092
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\locale\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1200
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Program Files\VideoLAN\VLC\locale\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:692
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Media Player\de-DE\sppsvc.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:988
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\de-DE\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:892
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Media Player\de-DE\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1812
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Music\Sample Music\Idle.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2624
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Public\Music\Sample Music\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2712
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Music\Sample Music\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2564
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Photo Viewer\de-DE\sppsvc.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2280
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\de-DE\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2340
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Photo Viewer\de-DE\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1948
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Downloads\sppsvc.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1672
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\Downloads\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1372
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Downloads\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1964
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files\Mozilla Firefox\fonts\csrss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1796
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\fonts\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1916
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Mozilla Firefox\fonts\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Mozilla Firefox\fonts\csrss.exe

    Filesize

    2.7MB

    MD5

    800ed07d843e10b96b52f9979708b26f

    SHA1

    e8ebf1520ec3a84d4c2b5f46788e187eb187b595

    SHA256

    1bbe32f7f97e6e7f3ce01152da00461943347a087a572510b8e0a870249e01e2

    SHA512

    5d91cdbe44195a5c44a77d310dca124825a16a531de3c970c72fcbae204ef83ce02003d77af787505915c7cb09c6b53db2fb9852611d196711213c4025a24769

  • C:\Program Files\Windows Media Player\de-DE\sppsvc.exe

    Filesize

    2.7MB

    MD5

    18ada4d0d2f414edc7b24735257edebc

    SHA1

    95f81abcf1e4eb40d55f9adae23f62b835019f81

    SHA256

    0ac3aa18ecf4595144a98dbb2fd77a3e24cc0921e9c84972e6704441e1611648

    SHA512

    1918b80ce54aea95b3076c761fea588f93ca470a57ae56802b52cf246c7899ce0dc50e39dc39ef8bf038681f3bda05c72a9afb034da1264c6179a548d67adc50

  • C:\Program Files\Windows Photo Viewer\de-DE\sppsvc.exe

    Filesize

    2.7MB

    MD5

    d1793da857eca536d0d06e1bdfa657ab

    SHA1

    bb07044f5867554c74063d4c9509248657322040

    SHA256

    60f6c911f8b8f9579e3958699dcb7fb91ade66f3a9bdd435632c6d18006002c2

    SHA512

    8d35eab524e898a14e17185c64e092c56e310f15e3cd2e0bfd533b15c55b78078dfc2dbaeba3d3a5027a96967fca11cf3c60a4fb859e5ecee28addda04238e4b

  • C:\ProgramData\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\d1793da857eca536d0d06e1bdfa657ab.exe

    Filesize

    2.7MB

    MD5

    cf9fc339e411d3cd1da1ba96ca867441

    SHA1

    4d401d464f01495d5e7f2a88c4a7f81ed2adeae0

    SHA256

    f57744e1807b93a4cda5cd15bd25da1aae9248495b52de53655c2d023851699c

    SHA512

    84efb4f4e38eca3c0a8a4fc21a7642933269f3b7658df5e96a77d9b716625aa744c27ebe6e53fb58ec8e91f690c94ea48360c937be86447ab85ccd1d51be4a08

  • memory/1936-128-0x0000000000970000-0x0000000000C24000-memory.dmp

    Filesize

    2.7MB

  • memory/2632-12-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

    Filesize

    72KB

  • memory/2632-16-0x00000000011D0000-0x00000000011DE000-memory.dmp

    Filesize

    56KB

  • memory/2632-8-0x0000000000B60000-0x0000000000B68000-memory.dmp

    Filesize

    32KB

  • memory/2632-7-0x0000000000520000-0x0000000000536000-memory.dmp

    Filesize

    88KB

  • memory/2632-9-0x0000000000B70000-0x0000000000B7A000-memory.dmp

    Filesize

    40KB

  • memory/2632-10-0x0000000000B80000-0x0000000000BD6000-memory.dmp

    Filesize

    344KB

  • memory/2632-11-0x0000000000BD0000-0x0000000000BD8000-memory.dmp

    Filesize

    32KB

  • memory/2632-0-0x000007FEF5A23000-0x000007FEF5A24000-memory.dmp

    Filesize

    4KB

  • memory/2632-14-0x00000000011B0000-0x00000000011B8000-memory.dmp

    Filesize

    32KB

  • memory/2632-13-0x0000000000C10000-0x0000000000C18000-memory.dmp

    Filesize

    32KB

  • memory/2632-15-0x00000000011C0000-0x00000000011CC000-memory.dmp

    Filesize

    48KB

  • memory/2632-6-0x0000000000480000-0x0000000000490000-memory.dmp

    Filesize

    64KB

  • memory/2632-17-0x00000000011E0000-0x00000000011EC000-memory.dmp

    Filesize

    48KB

  • memory/2632-18-0x00000000011F0000-0x00000000011FA000-memory.dmp

    Filesize

    40KB

  • memory/2632-19-0x0000000001200000-0x000000000120C000-memory.dmp

    Filesize

    48KB

  • memory/2632-5-0x0000000000470000-0x0000000000478000-memory.dmp

    Filesize

    32KB

  • memory/2632-4-0x0000000000450000-0x000000000046C000-memory.dmp

    Filesize

    112KB

  • memory/2632-3-0x0000000000440000-0x000000000044E000-memory.dmp

    Filesize

    56KB

  • memory/2632-2-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

    Filesize

    9.9MB

  • memory/2632-127-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

    Filesize

    9.9MB

  • memory/2632-1-0x00000000012D0000-0x0000000001584000-memory.dmp

    Filesize

    2.7MB