Analysis

  • max time kernel
    69s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2025 13:22

General

  • Target

    0243e305392e0655c274aae35aa30df5dcbd79c245247fc9da69a8293d3d60a2N.exe

  • Size

    783KB

  • MD5

    f1d938f2dc6463685579c83225764940

  • SHA1

    ddce230b2c30d324736280ec8f3bc2679f0bce11

  • SHA256

    0243e305392e0655c274aae35aa30df5dcbd79c245247fc9da69a8293d3d60a2

  • SHA512

    8ab6c2fa9672bd2aef8dd1a976ab71043c27f72d76e21ca7a2813ac832383f486decffe332920df5197957021efc21df6706333e11912df3ad81cab8a9d6b792

  • SSDEEP

    12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 9 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0243e305392e0655c274aae35aa30df5dcbd79c245247fc9da69a8293d3d60a2N.exe
    "C:\Users\Admin\AppData\Local\Temp\0243e305392e0655c274aae35aa30df5dcbd79c245247fc9da69a8293d3d60a2N.exe"
    1⤵
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2968
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uJm5Ge1IJI.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2512
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1012
        • C:\Users\Default User\spoolsv.exe
          "C:\Users\Default User\spoolsv.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:3016
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "0243e305392e0655c274aae35aa30df5dcbd79c245247fc9da69a8293d3d60a2N" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI1E26\0243e305392e0655c274aae35aa30df5dcbd79c245247fc9da69a8293d3d60a2N.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2388
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\eapphost\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:276
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\ProgramData\Application Data\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2608
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\psisdecd\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2332
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Default User\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1852
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Default User\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2548
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1724
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\printfilterpipelineprxy\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2760
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\TSErrRedir\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI1E26\0243e305392e0655c274aae35aa30df5dcbd79c245247fc9da69a8293d3d60a2N.exe

      Filesize

      783KB

      MD5

      f8f74ece749f81ec84010dce96e0f0f0

      SHA1

      7e8298f68a933067d565eaf35bdd2535eb4db59e

      SHA256

      0daddafdd36549c453cde1533745df23cb5154979f9ef4b18ba699fd84811490

      SHA512

      33e32d5acb5e6e93fe63d46384de0fe02e56c7b4aeaaffa72852f49d5a6410e399d656a8c7dce5550ddc92591155e0d8722703b0d554b94aab86fe9e81df5c6d

    • C:\Users\Admin\AppData\Local\Temp\uJm5Ge1IJI.bat

      Filesize

      197B

      MD5

      cfa86ec10ee223b061b06038e144e2c5

      SHA1

      0f994d754e9b79f9caea0fc69fd01882e0b6562d

      SHA256

      a77fa864abf0822da0ef7a9f23d80fbbd3d379e9f4a2727a79b105b32476fdf5

      SHA512

      d91eb50971b095a1567da4209ba3223d4944f6c85ebeb422bb2d3276f2cc735d317d458026c6ede2b166eb9256a917c1c0e1fd1a4b67eac7db58d55fa8775a30

    • C:\Users\Default User\spoolsv.exe

      Filesize

      783KB

      MD5

      42f55920bd7452a91054655b212c46cf

      SHA1

      52664ec26ab9638175f7138c95c7ecbdcf05d22d

      SHA256

      33ba801a54d40a53cdf88e4ab92828a0512f44af769cc08dcbbcd8f3c5e85fba

      SHA512

      07361171d7ed50c0a1846a568ccce649db794d5259fc4d16ee8a1886b7e2dbc678cc96639897f5361f21112c58608e7c1c072d3aa013ced0e3dd466041c5c877

    • C:\Users\Default\spoolsv.exe

      Filesize

      783KB

      MD5

      f1d938f2dc6463685579c83225764940

      SHA1

      ddce230b2c30d324736280ec8f3bc2679f0bce11

      SHA256

      0243e305392e0655c274aae35aa30df5dcbd79c245247fc9da69a8293d3d60a2

      SHA512

      8ab6c2fa9672bd2aef8dd1a976ab71043c27f72d76e21ca7a2813ac832383f486decffe332920df5197957021efc21df6706333e11912df3ad81cab8a9d6b792

    • memory/2968-18-0x0000000000460000-0x0000000000468000-memory.dmp

      Filesize

      32KB

    • memory/2968-15-0x0000000000540000-0x0000000000548000-memory.dmp

      Filesize

      32KB

    • memory/2968-5-0x0000000000260000-0x0000000000270000-memory.dmp

      Filesize

      64KB

    • memory/2968-7-0x0000000000440000-0x000000000044C000-memory.dmp

      Filesize

      48KB

    • memory/2968-10-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2968-9-0x0000000000420000-0x000000000042A000-memory.dmp

      Filesize

      40KB

    • memory/2968-8-0x0000000000470000-0x000000000047A000-memory.dmp

      Filesize

      40KB

    • memory/2968-12-0x0000000000450000-0x0000000000458000-memory.dmp

      Filesize

      32KB

    • memory/2968-11-0x0000000000430000-0x0000000000438000-memory.dmp

      Filesize

      32KB

    • memory/2968-13-0x0000000000480000-0x0000000000488000-memory.dmp

      Filesize

      32KB

    • memory/2968-0-0x000007FEF66F3000-0x000007FEF66F4000-memory.dmp

      Filesize

      4KB

    • memory/2968-17-0x0000000000560000-0x0000000000568000-memory.dmp

      Filesize

      32KB

    • memory/2968-16-0x0000000000550000-0x0000000000558000-memory.dmp

      Filesize

      32KB

    • memory/2968-6-0x0000000000270000-0x0000000000278000-memory.dmp

      Filesize

      32KB

    • memory/2968-14-0x00000000004A0000-0x00000000004A8000-memory.dmp

      Filesize

      32KB

    • memory/2968-21-0x00000000009B0000-0x00000000009BC000-memory.dmp

      Filesize

      48KB

    • memory/2968-20-0x0000000000570000-0x0000000000578000-memory.dmp

      Filesize

      32KB

    • memory/2968-19-0x0000000000490000-0x0000000000498000-memory.dmp

      Filesize

      32KB

    • memory/2968-22-0x0000000000530000-0x0000000000538000-memory.dmp

      Filesize

      32KB

    • memory/2968-25-0x000007FEF66F0000-0x000007FEF70DC000-memory.dmp

      Filesize

      9.9MB

    • memory/2968-4-0x0000000000250000-0x0000000000258000-memory.dmp

      Filesize

      32KB

    • memory/2968-3-0x0000000000240000-0x0000000000248000-memory.dmp

      Filesize

      32KB

    • memory/2968-2-0x000007FEF66F0000-0x000007FEF70DC000-memory.dmp

      Filesize

      9.9MB

    • memory/2968-109-0x000007FEF66F0000-0x000007FEF70DC000-memory.dmp

      Filesize

      9.9MB

    • memory/2968-1-0x00000000009C0000-0x0000000000A8A000-memory.dmp

      Filesize

      808KB

    • memory/3016-112-0x0000000000180000-0x000000000024A000-memory.dmp

      Filesize

      808KB