Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 23:16
Behavioral task
behavioral1
Sample
f6ce84a3177d88fd779e990ecd08c5b3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6ce84a3177d88fd779e990ecd08c5b3.exe
Resource
win10v2004-20241007-en
General
-
Target
f6ce84a3177d88fd779e990ecd08c5b3.exe
-
Size
1.1MB
-
MD5
f6ce84a3177d88fd779e990ecd08c5b3
-
SHA1
421a718c107138941a908abc5a5ec608f2ff1121
-
SHA256
76e7d1b53c84ccbf7789386bdeffc58d4171f2fbfa650891e980ccc6f77789ba
-
SHA512
f3a721633d9e4d5c0376ebf638e05d454ebd6f75d2cdd842e173c9dc2b1568f686a96ef4d737426dc56ffafe4e28fd56abffa29986c375834b5a4348bcde6770
-
SSDEEP
24576:U2G/nvxW3Ww0tqNUI8y/hByvMnRxzbL6mcYUJV2Vzl:UbA30MF/hRwfMx
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2880 2028 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2856 2028 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 2028 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2680 2028 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3056 2028 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1816 2028 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1540 2028 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2808 2028 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2792 2028 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 592 2028 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2500 2028 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 2028 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1060 2028 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2012 2028 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1264 2028 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2096 2028 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2920 2028 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1336 2028 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x0008000000018d7b-9.dat dcrat behavioral1/memory/2712-13-0x0000000000E20000-0x0000000000EF6000-memory.dmp dcrat behavioral1/memory/2944-32-0x00000000013E0000-0x00000000014B6000-memory.dmp dcrat -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 2712 agentWinmonitor.exe 2944 csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 1648 cmd.exe 1648 cmd.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\DVD Maker\1610b97d3ab4a7 agentWinmonitor.exe File created C:\Program Files\DVD Maker\OSPPSVC.exe agentWinmonitor.exe File opened for modification C:\Program Files\DVD Maker\OSPPSVC.exe agentWinmonitor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6ce84a3177d88fd779e990ecd08c5b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2084 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2880 schtasks.exe 2856 schtasks.exe 2792 schtasks.exe 592 schtasks.exe 2920 schtasks.exe 2680 schtasks.exe 1540 schtasks.exe 2808 schtasks.exe 2012 schtasks.exe 1060 schtasks.exe 1264 schtasks.exe 2096 schtasks.exe 2608 schtasks.exe 1816 schtasks.exe 2500 schtasks.exe 1632 schtasks.exe 3056 schtasks.exe 1336 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2712 agentWinmonitor.exe 2944 csrss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2712 agentWinmonitor.exe Token: SeDebugPrivilege 2944 csrss.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2528 2156 f6ce84a3177d88fd779e990ecd08c5b3.exe 30 PID 2156 wrote to memory of 2528 2156 f6ce84a3177d88fd779e990ecd08c5b3.exe 30 PID 2156 wrote to memory of 2528 2156 f6ce84a3177d88fd779e990ecd08c5b3.exe 30 PID 2156 wrote to memory of 2528 2156 f6ce84a3177d88fd779e990ecd08c5b3.exe 30 PID 2528 wrote to memory of 1648 2528 WScript.exe 31 PID 2528 wrote to memory of 1648 2528 WScript.exe 31 PID 2528 wrote to memory of 1648 2528 WScript.exe 31 PID 2528 wrote to memory of 1648 2528 WScript.exe 31 PID 1648 wrote to memory of 2712 1648 cmd.exe 33 PID 1648 wrote to memory of 2712 1648 cmd.exe 33 PID 1648 wrote to memory of 2712 1648 cmd.exe 33 PID 1648 wrote to memory of 2712 1648 cmd.exe 33 PID 2712 wrote to memory of 2944 2712 agentWinmonitor.exe 54 PID 2712 wrote to memory of 2944 2712 agentWinmonitor.exe 54 PID 2712 wrote to memory of 2944 2712 agentWinmonitor.exe 54 PID 1648 wrote to memory of 2084 1648 cmd.exe 55 PID 1648 wrote to memory of 2084 1648 cmd.exe 55 PID 1648 wrote to memory of 2084 1648 cmd.exe 55 PID 1648 wrote to memory of 2084 1648 cmd.exe 55 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6ce84a3177d88fd779e990ecd08c5b3.exe"C:\Users\Admin\AppData\Local\Temp\f6ce84a3177d88fd779e990ecd08c5b3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Serverwin\EW0p41ez0N7HYRg6N6rv6D.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Serverwin\XWK21vbuz3pBmIIr863tMg.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Serverwin\agentWinmonitor.exe"C:\Serverwin\agentWinmonitor.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\csrss.exe"C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\csrss.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2084
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 12 /tr "'C:\Program Files\DVD Maker\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\DVD Maker\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 6 /tr "'C:\Program Files\DVD Maker\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Serverwin\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Serverwin\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Serverwin\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\Serverwin\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Serverwin\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\Serverwin\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Serverwin\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Serverwin\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Serverwin\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209B
MD5541275260b9ec67c8537c0edad28f1b9
SHA19af23fbfc493604daaccd331efec05ebfc1e64e5
SHA256a32684fc6fdea338d4c29bd0cac3e4dca8afb3f896a009096272cb8a32b3a51e
SHA51247dae81d53a7c1b091eb5cab7d627811fbd7319709f7c22b4e50b628beeb269f3de36f77c7206873b1eea43ef7c665c579230f17ccfd4ca32807d2d65c1c1384
-
Filesize
146B
MD5911702a577938eef8bbc1ce89e6d1bc8
SHA1d7470178892e21f9c5fbc58876bda7ce5741f924
SHA25696f145902bda9186af668c933108ce68dc3d8bba717823cade826dfde518d1bf
SHA512683aeb4f6efb24501e64ca3cbf2734a65dd1fe9672787e472ba04304cff7698c295bdf22f59bdc62295bea5dab3d0f3ae8a6cbdd6fd70daaf6e797405173b274
-
Filesize
828KB
MD551c9ce115354b8ac4e71e8da3f224ff4
SHA171b3ce67ad3d5467e58971a3ec197d4a725669bd
SHA256e4a087a2892f543978031a40e332b829763a7a71b7d641e87fbd137958648e2d
SHA5127636e523a8e7938dddfab02c96a5296e4ce337ebcc5d7595ea711429eae1330db46c22d9a4352c524c2b2d099ac2f27d7d96768a577a39e82a654ac980657406