Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 03:31
Behavioral task
behavioral1
Sample
154029aecb8134930418ece2437864b8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
154029aecb8134930418ece2437864b8.exe
Resource
win10v2004-20241007-en
General
-
Target
154029aecb8134930418ece2437864b8.exe
-
Size
1.5MB
-
MD5
154029aecb8134930418ece2437864b8
-
SHA1
a43825d5c82e4266a37e60a746c31ab128b2a4a1
-
SHA256
394c5bdb282b16f8fc323f01c9a0ebe0a3824c95efbc082a5ae7b1d547ab3617
-
SHA512
2cc0dd8965fb53479fed5107ec2b8ba90ae15dbbc22f1d0d7bffc573cf049d69ce745840fdaa582060940f5be8381cfd5ecec870943d6a3ddda95c9f32a9826c
-
SSDEEP
24576:u/R6JpYYCpuA5TwiNgFE/4vZy270wlc8cz4lc2zVg5OlyxJ:uZ6a8+DsZ5lyzIcUawly
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3992 4760 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2204 4760 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1452 4760 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 4760 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 4760 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5000 4760 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2436 4760 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 348 4760 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3972 4760 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3948 4760 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 432 4760 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4800 4760 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2768 4760 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3332 4760 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2988 4760 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1432 4760 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4576 4760 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2384 4760 schtasks.exe 85 -
resource yara_rule behavioral2/memory/5116-1-0x0000000000890000-0x0000000000A22000-memory.dmp dcrat behavioral2/files/0x0007000000023ccd-21.dat dcrat behavioral2/files/0x0007000000023cd6-50.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 154029aecb8134930418ece2437864b8.exe -
Executes dropped EXE 1 IoCs
pid Process 2196 spoolsv.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File created C:\Program Files\Common Files\9e8d7a4ca61bd9 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\RCXB773.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Common Files\RuntimeBroker.exe 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Common Files\RCXB988.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\sppsvc.exe 154029aecb8134930418ece2437864b8.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\spoolsv.exe 154029aecb8134930418ece2437864b8.exe File created C:\Program Files\Common Files\RuntimeBroker.exe 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\RCXAF0F.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\RCXB348.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\RCXB349.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\RCXB774.tmp 154029aecb8134930418ece2437864b8.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\f3b6ecef712a24 154029aecb8134930418ece2437864b8.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\sppsvc.exe 154029aecb8134930418ece2437864b8.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\0a1fd5f707cd16 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\RCXAEFF.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\spoolsv.exe 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\sppsvc.exe 154029aecb8134930418ece2437864b8.exe File created C:\Program Files (x86)\Windows Portable Devices\sppsvc.exe 154029aecb8134930418ece2437864b8.exe File created C:\Program Files (x86)\Windows Portable Devices\0a1fd5f707cd16 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Common Files\RCXBA06.tmp 154029aecb8134930418ece2437864b8.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SKB\LanguageModels\RCXB55E.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\SKB\LanguageModels\RCXB55F.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\SKB\LanguageModels\System.exe 154029aecb8134930418ece2437864b8.exe File created C:\Windows\SKB\LanguageModels\System.exe 154029aecb8134930418ece2437864b8.exe File created C:\Windows\SKB\LanguageModels\27d1bcfc3c54e0 154029aecb8134930418ece2437864b8.exe File created C:\Windows\Boot\RuntimeBroker.exe 154029aecb8134930418ece2437864b8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 154029aecb8134930418ece2437864b8.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5000 schtasks.exe 2436 schtasks.exe 3972 schtasks.exe 432 schtasks.exe 2384 schtasks.exe 3992 schtasks.exe 1452 schtasks.exe 3948 schtasks.exe 4800 schtasks.exe 2988 schtasks.exe 2204 schtasks.exe 2640 schtasks.exe 3332 schtasks.exe 2440 schtasks.exe 348 schtasks.exe 2768 schtasks.exe 1432 schtasks.exe 4576 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 5116 154029aecb8134930418ece2437864b8.exe 5116 154029aecb8134930418ece2437864b8.exe 5116 154029aecb8134930418ece2437864b8.exe 5116 154029aecb8134930418ece2437864b8.exe 5116 154029aecb8134930418ece2437864b8.exe 5116 154029aecb8134930418ece2437864b8.exe 5116 154029aecb8134930418ece2437864b8.exe 5116 154029aecb8134930418ece2437864b8.exe 5116 154029aecb8134930418ece2437864b8.exe 5116 154029aecb8134930418ece2437864b8.exe 5116 154029aecb8134930418ece2437864b8.exe 5116 154029aecb8134930418ece2437864b8.exe 2196 spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5116 154029aecb8134930418ece2437864b8.exe Token: SeDebugPrivilege 2196 spoolsv.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5116 wrote to memory of 1648 5116 154029aecb8134930418ece2437864b8.exe 105 PID 5116 wrote to memory of 1648 5116 154029aecb8134930418ece2437864b8.exe 105 PID 1648 wrote to memory of 1656 1648 cmd.exe 107 PID 1648 wrote to memory of 1656 1648 cmd.exe 107 PID 1648 wrote to memory of 2196 1648 cmd.exe 116 PID 1648 wrote to memory of 2196 1648 cmd.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\154029aecb8134930418ece2437864b8.exe"C:\Users\Admin\AppData\Local\Temp\154029aecb8134930418ece2437864b8.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kfw7FZjNig.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1656
-
-
C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\spoolsv.exe"C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\spoolsv.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Portable Devices\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Portable Devices\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Windows\SKB\LanguageModels\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\SKB\LanguageModels\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Windows\SKB\LanguageModels\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\Common Files\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Common Files\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Program Files\Common Files\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5154029aecb8134930418ece2437864b8
SHA1a43825d5c82e4266a37e60a746c31ab128b2a4a1
SHA256394c5bdb282b16f8fc323f01c9a0ebe0a3824c95efbc082a5ae7b1d547ab3617
SHA5122cc0dd8965fb53479fed5107ec2b8ba90ae15dbbc22f1d0d7bffc573cf049d69ce745840fdaa582060940f5be8381cfd5ecec870943d6a3ddda95c9f32a9826c
-
Filesize
1.5MB
MD5b66ab928d005c01e272ac126df443b9a
SHA1aa31d93b26e4172953a46a3c9b68a3221e69220a
SHA2566344d2c73350e07c8e30d64180483de154713efe517422b4b23d6a9de376901e
SHA5122d738a0854c1e9e83f9a6e03978e9bb10ba33869f34cfe4cbfb85b22e478269b5f23b5f5f77509b5f4e40d20c242ae0779e308c460f45beb342002ec03afb53e
-
Filesize
226B
MD50d0088b7f8e9c48c367823fe9a604a81
SHA1ab974e24ebdfc19014affc9ecec1de98f9732bb9
SHA25683b4acf63afdd92a33cdccaf41884dab6e4df4803d926225afff85eddd9bed6b
SHA512c6e4dc33cbc9c49cd34d83d7d5d84211091a0ed844907d1119b4fcb71342803681892a5842db737dfb82b7fa6544d2024fc3a84056c00fb3ad5191cc7c5f5edd