Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/01/2025, 03:44
Behavioral task
behavioral1
Sample
154029aecb8134930418ece2437864b8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
154029aecb8134930418ece2437864b8.exe
Resource
win10v2004-20241007-en
General
-
Target
154029aecb8134930418ece2437864b8.exe
-
Size
1.5MB
-
MD5
154029aecb8134930418ece2437864b8
-
SHA1
a43825d5c82e4266a37e60a746c31ab128b2a4a1
-
SHA256
394c5bdb282b16f8fc323f01c9a0ebe0a3824c95efbc082a5ae7b1d547ab3617
-
SHA512
2cc0dd8965fb53479fed5107ec2b8ba90ae15dbbc22f1d0d7bffc573cf049d69ce745840fdaa582060940f5be8381cfd5ecec870943d6a3ddda95c9f32a9826c
-
SSDEEP
24576:u/R6JpYYCpuA5TwiNgFE/4vZy270wlc8cz4lc2zVg5OlyxJ:uZ6a8+DsZ5lyzIcUawly
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 2320 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 2320 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2816 2320 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2864 2320 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2496 2320 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2652 2320 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 2320 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2872 2320 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 2320 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 2320 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2648 2320 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2692 2320 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3064 2320 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2292 2320 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1780 2320 schtasks.exe 30 -
resource yara_rule behavioral1/memory/2444-1-0x0000000000B00000-0x0000000000C92000-memory.dmp dcrat behavioral1/files/0x00050000000193c9-20.dat dcrat behavioral1/files/0x0005000000019501-38.dat dcrat behavioral1/files/0x0008000000019503-66.dat dcrat behavioral1/files/0x000b000000016cf8-79.dat dcrat behavioral1/memory/2808-89-0x0000000001070000-0x0000000001202000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2808 winlogon.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\Windows NT\Accessories\fr-FR\6ccacd8608530f 154029aecb8134930418ece2437864b8.exe File created C:\Program Files\Microsoft Office\Office14\1033\WmiPrvSE.exe 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\fr-FR\Idle.exe 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\RCXD516.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\WmiPrvSE.exe 154029aecb8134930418ece2437864b8.exe File created C:\Program Files (x86)\Windows NT\Accessories\fr-FR\Idle.exe 154029aecb8134930418ece2437864b8.exe File created C:\Program Files\Microsoft Office\Office14\1033\24dbde2999530e 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\fr-FR\RCXD08E.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\fr-FR\RCXD08F.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\RCXD515.tmp 154029aecb8134930418ece2437864b8.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File created C:\Windows\Logs\DPX\winlogon.exe 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\Logs\DPX\winlogon.exe 154029aecb8134930418ece2437864b8.exe File created C:\Windows\AppPatch\de-DE\smss.exe 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\AppPatch\de-DE\smss.exe 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\AppPatch\de-DE\RCXD301.tmp 154029aecb8134930418ece2437864b8.exe File created C:\Windows\Logs\DPX\cc11b995f2a76d 154029aecb8134930418ece2437864b8.exe File created C:\Windows\Microsoft.NET\assembly\csrss.exe 154029aecb8134930418ece2437864b8.exe File created C:\Windows\AppPatch\de-DE\69ddcba757bf72 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\Logs\DPX\RCXCB8C.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\Microsoft.NET\assembly\csrss.exe 154029aecb8134930418ece2437864b8.exe File created C:\Windows\Microsoft.NET\assembly\886983d96e3d3e 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\Logs\DPX\RCXCB1E.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\Microsoft.NET\assembly\RCXCD9F.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\Microsoft.NET\assembly\RCXCE1D.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\AppPatch\de-DE\RCXD293.tmp 154029aecb8134930418ece2437864b8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2292 schtasks.exe 2616 schtasks.exe 2652 schtasks.exe 2872 schtasks.exe 2644 schtasks.exe 1780 schtasks.exe 2816 schtasks.exe 2864 schtasks.exe 2496 schtasks.exe 2640 schtasks.exe 2324 schtasks.exe 2648 schtasks.exe 2692 schtasks.exe 3064 schtasks.exe 2760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2444 154029aecb8134930418ece2437864b8.exe 2808 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2444 154029aecb8134930418ece2437864b8.exe Token: SeDebugPrivilege 2808 winlogon.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2808 2444 154029aecb8134930418ece2437864b8.exe 47 PID 2444 wrote to memory of 2808 2444 154029aecb8134930418ece2437864b8.exe 47 PID 2444 wrote to memory of 2808 2444 154029aecb8134930418ece2437864b8.exe 47 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\154029aecb8134930418ece2437864b8.exe"C:\Users\Admin\AppData\Local\Temp\154029aecb8134930418ece2437864b8.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\Logs\DPX\winlogon.exe"C:\Windows\Logs\DPX\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Windows\Logs\DPX\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\Logs\DPX\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Windows\Logs\DPX\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Windows\Microsoft.NET\assembly\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Microsoft.NET\assembly\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Windows\Microsoft.NET\assembly\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows NT\Accessories\fr-FR\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\fr-FR\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows NT\Accessories\fr-FR\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Windows\AppPatch\de-DE\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\AppPatch\de-DE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Windows\AppPatch\de-DE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Office\Office14\1033\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office14\1033\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Program Files\Microsoft Office\Office14\1033\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5b66ab928d005c01e272ac126df443b9a
SHA1aa31d93b26e4172953a46a3c9b68a3221e69220a
SHA2566344d2c73350e07c8e30d64180483de154713efe517422b4b23d6a9de376901e
SHA5122d738a0854c1e9e83f9a6e03978e9bb10ba33869f34cfe4cbfb85b22e478269b5f23b5f5f77509b5f4e40d20c242ae0779e308c460f45beb342002ec03afb53e
-
Filesize
1.5MB
MD5154029aecb8134930418ece2437864b8
SHA1a43825d5c82e4266a37e60a746c31ab128b2a4a1
SHA256394c5bdb282b16f8fc323f01c9a0ebe0a3824c95efbc082a5ae7b1d547ab3617
SHA5122cc0dd8965fb53479fed5107ec2b8ba90ae15dbbc22f1d0d7bffc573cf049d69ce745840fdaa582060940f5be8381cfd5ecec870943d6a3ddda95c9f32a9826c
-
Filesize
1.5MB
MD54e8a6c19aedcc6f021a44e67e36dd398
SHA1ac2843cc59c332ba148795ddea96a5b171b8d873
SHA256c01e80cbd7d25ae5504bd4fd03eb6fde2faf0a520a7b645bba63cd212cb4e392
SHA5127bdaef7415df37add6b4011798030a47a9787734130eacab35cc00fbd04aa2534ba861531d2b56b6d817e27f579a039e9bb2425bd1c70c40cb9ec0fbd85752ed
-
Filesize
1.5MB
MD584b195ce8bf506a8bbd1293174866be1
SHA1467620d5f7cb35e732f95f69cb317b9d964518e0
SHA256d052f16f1ff0904ca34323705e37358aca2ca578788e7e163b3f9571b10f27be
SHA512299017f69ad65b640566896464d1f8d4ff3fc72c961b491e54359b0c5b828fbadb10044ceb5dff16713df7312d4927497f393ec32faa122f838323f4aec8efb7