Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 05:38
Behavioral task
behavioral1
Sample
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe
Resource
win10v2004-20241007-en
General
-
Target
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe
-
Size
1.1MB
-
MD5
d2f57cf55387c9146158f49dbcf5b540
-
SHA1
57fb9892bdf6362073eb3cb1452a291568b49e23
-
SHA256
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692
-
SHA512
5d2da7dcbe87ceee345b95d99fc47a209a5621c88483fdb3484493f75fe0e8cc5802703dcd44e068a83738401b7e6a8edaeef7b098a804ae4989ccfb2ef4f78e
-
SSDEEP
24576:U2G/nvxW3Ww0tI2qYVrBvevwx8P9brkuXq:UbA30I2TvkPOf
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 24 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4312 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3040 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4888 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3384 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 992 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2304 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4508 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3284 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3048 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 524 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4832 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4952 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2128 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3028 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2744 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 376 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 952 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3044 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4296 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2084 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3036 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3872 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3768 2796 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4412 2796 schtasks.exe 86 -
resource yara_rule behavioral2/files/0x0007000000023c93-10.dat dcrat behavioral2/memory/3992-13-0x0000000000710000-0x00000000007E6000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation MsBlock.exe -
Executes dropped EXE 2 IoCs
pid Process 3992 MsBlock.exe 728 fontdrvhost.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files\Windows Defender\en-US\sihost.exe MsBlock.exe File created C:\Program Files\Uninstall Information\fontdrvhost.exe MsBlock.exe File created C:\Program Files\Windows Mail\conhost.exe MsBlock.exe File opened for modification C:\Program Files\Windows Mail\conhost.exe MsBlock.exe File created C:\Program Files\Windows Mail\088424020bedd6 MsBlock.exe File created C:\Program Files\Windows Defender\en-US\66fc9ff0ee96c2 MsBlock.exe File created C:\Program Files\Uninstall Information\5b884080fd4f94 MsBlock.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\SppExtComObj.exe MsBlock.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\e1ef82546f0b02 MsBlock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings MsBlock.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 24 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4508 schtasks.exe 3044 schtasks.exe 4412 schtasks.exe 3284 schtasks.exe 3028 schtasks.exe 2744 schtasks.exe 376 schtasks.exe 952 schtasks.exe 3040 schtasks.exe 4888 schtasks.exe 2304 schtasks.exe 2084 schtasks.exe 3768 schtasks.exe 2128 schtasks.exe 4296 schtasks.exe 3872 schtasks.exe 4312 schtasks.exe 992 schtasks.exe 4952 schtasks.exe 4832 schtasks.exe 3036 schtasks.exe 3384 schtasks.exe 3048 schtasks.exe 524 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3992 MsBlock.exe 3992 MsBlock.exe 3992 MsBlock.exe 3992 MsBlock.exe 3992 MsBlock.exe 728 fontdrvhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3992 MsBlock.exe Token: SeDebugPrivilege 728 fontdrvhost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5100 wrote to memory of 1388 5100 9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe 82 PID 5100 wrote to memory of 1388 5100 9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe 82 PID 5100 wrote to memory of 1388 5100 9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe 82 PID 1388 wrote to memory of 4376 1388 WScript.exe 83 PID 1388 wrote to memory of 4376 1388 WScript.exe 83 PID 1388 wrote to memory of 4376 1388 WScript.exe 83 PID 4376 wrote to memory of 3992 4376 cmd.exe 85 PID 4376 wrote to memory of 3992 4376 cmd.exe 85 PID 3992 wrote to memory of 1732 3992 MsBlock.exe 111 PID 3992 wrote to memory of 1732 3992 MsBlock.exe 111 PID 1732 wrote to memory of 2368 1732 cmd.exe 113 PID 1732 wrote to memory of 2368 1732 cmd.exe 113 PID 1732 wrote to memory of 728 1732 cmd.exe 114 PID 1732 wrote to memory of 728 1732 cmd.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe"C:\Users\Admin\AppData\Local\Temp\9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\intoHost\pN2iKIl2JrbfNIx.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\intoHost\z07BaoIs8R5lt5yU6uoZdloB3t.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\intoHost\MsBlock.exe"C:\intoHost\MsBlock.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\llUQLnA1Ab.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2368
-
-
C:\intoHost\fontdrvhost.exe"C:\intoHost\fontdrvhost.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Mail\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Mail\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsBlockM" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Local Settings\MsBlock.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsBlock" /sc ONLOGON /tr "'C:\Users\Admin\Local Settings\MsBlock.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsBlockM" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Local Settings\MsBlock.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Defender\en-US\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\en-US\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Defender\en-US\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Program Files\Uninstall Information\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Program Files\Uninstall Information\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\intoHost\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\intoHost\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\intoHost\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\intoHost\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\intoHost\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\intoHost\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD587d608d62e1ba80ee63a4ca0c998c118
SHA101d50d3616b21741ee305c406a621ab5ef70e9ca
SHA25695a3e95d38a4b29fb1385fbe4ee934af33eaa81563bec95c1fa6b3f3c18e0729
SHA5121a2d6e29d6a2ed9fd0e71acc104eedf9bda1b022b22b3636b6b4a957ab4f7349b049c6a45c50a2e4caf44da70fa9f8009d5256158ea5a42322700a3091763541
-
Filesize
828KB
MD5dca7880645d6318a20d020f2a51b7a8c
SHA15c5e493ce685a79ecb58ef2fdc6d9a4364c0a276
SHA2569c03c25f02d71bfc3ab23870d882274e9b34626d1374491529818e19851510b9
SHA5123fa226e65382fed9f3dd959e80e4483866da3b339c277906ab1b08db067be6f6ec1d73b9ad3067b4046e512f8f08940528bf8573edc83d999f18f890fc210807
-
Filesize
211B
MD5672ef18aa1c9cf2cf6c906bba7d1435b
SHA14d72a4c6cb3aaeef5b02cef71ad42211f185c93a
SHA256a016b82ba799c1cf780c9ebb6cf0540c26aad664f5525d1ccc8b470fdaaa0075
SHA5128b5d37f4fb7b1df56118866f9cc18d0ce323167185258b2e8b830d91f20e2ee85eda6b145f25d363630790ddf7d188eb1507f051095fc63be4bfaef1760bc20e
-
Filesize
25B
MD55c9b6d735522c5246a33bbadaa92c7db
SHA1f676e86ecb933d676095e187a50febbd61bbc344
SHA25647148fdb946ede0b9fab190f1ae5dd459d096873cca3585642183674313fe551
SHA51263fafa045ca419b1394b2255ef32bf4fb6a40ff8b45ade892723ec41a50a831cce7c4266e489f825dc4e574d07b38e216c12337a89743c70e6de35470e798875