Analysis

  • max time kernel
    104s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-01-2025 14:27

General

  • Target

    40a25f4406c2c119fdbee6a530b4dbd78dfad9e98eb0ac785290997976d75d7dN.exe

  • Size

    2.7MB

  • MD5

    8e6d3e4cdb00a133fd3f33cfde6e37c0

  • SHA1

    91233309e54797dac7c00a9576c38456bc14acba

  • SHA256

    40a25f4406c2c119fdbee6a530b4dbd78dfad9e98eb0ac785290997976d75d7d

  • SHA512

    a1604b3da2eb2dfec99ed830eaa8077e0ba2b2f66c377bf8c1bdea8e8668f2bee7fa90411fdd62f358f1be87ae58dd5e1de71a58f46428550c64262664c671a6

  • SSDEEP

    49152:sqyJUSQelMhlk1w19BlUobhENGZXxRWi0UAuqYqqnc:pyJlQgGk1wPko1oO30UA7Yqq

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\40a25f4406c2c119fdbee6a530b4dbd78dfad9e98eb0ac785290997976d75d7dN.exe
    "C:\Users\Admin\AppData\Local\Temp\40a25f4406c2c119fdbee6a530b4dbd78dfad9e98eb0ac785290997976d75d7dN.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3636
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ea0WjfTxms.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:4280
        • C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\sppsvc.exe
          "C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\sppsvc.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:3736
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Pictures\upfc.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4352
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Users\Public\Pictures\upfc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:736
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Pictures\upfc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4564
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3176
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4460
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2592
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Favorites\Links\SearchApp.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3996
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Users\Admin\Favorites\Links\SearchApp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:5116
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Favorites\Links\SearchApp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1264
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\services.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4884
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2868
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1252
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Windows\ImmersiveControlPanel\pris\fontdrvhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2760
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\ImmersiveControlPanel\pris\fontdrvhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4664
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Windows\ImmersiveControlPanel\pris\fontdrvhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2004
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\sppsvc.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1872
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2672
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3716

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\WindowsRE\services.exe

      Filesize

      2.7MB

      MD5

      d5544b7e031eb6796158cb5c7c2b19d5

      SHA1

      db3ecf70450f336c6e53f18a21a19b7af5411411

      SHA256

      0dbfa8d7878a36d497f0c23481106f206200f4f3b1935f3f83b9cd54146cfb16

      SHA512

      0ccdacbb0bfbb53dfa453993fe429195798a6553119bef6eb9e096a053ef9a3db90294763a8ad1fb5c3e7e80f59753ade248f2a3fa2387136ca3caad7542c744

    • C:\Recovery\WindowsRE\sysmon.exe

      Filesize

      2.7MB

      MD5

      797039a45a0b72ddf9582a812d4da87d

      SHA1

      d61e56a216d9b56b0703a11edde436a9477e9cb2

      SHA256

      7249a6ae6fa205299c80464b415d181390050f97fbf22c9b48101e1898d9be59

      SHA512

      30e15e794bdd4b9c36cbd3cabab71f14033ece0db6014159114d242c52db4fd3909602aa9031314394f1c36b14ec35d083bac49e387c0b1892958365ba5cece6

    • C:\Users\Admin\AppData\Local\Temp\ea0WjfTxms.bat

      Filesize

      245B

      MD5

      6d3f270b7c55db460f7d95d90cab797b

      SHA1

      6d32b1f39a046647c90a63ad1526de8f49bffb0c

      SHA256

      2b5958889c282db31e47c2d819a466799c30c791e8f8ce4e3a2d5841953a4cd7

      SHA512

      72b4b72d5bb6c5ef046bb21da72c75b2b2840d7b70e4abb7a0a6be6b11b936d8dba5db66586afdacfb5afa6938e9640dece8eef35d433f58fa1094e20a5962b6

    • C:\Users\Public\Pictures\upfc.exe

      Filesize

      2.7MB

      MD5

      2a35f6b174d2b46cda13ad105d0c3f15

      SHA1

      503f3e9d6d4e1e4d12778f522e7df846b9ebf5a5

      SHA256

      b10c446fd12c881a62eec03c6fe434f40eea6810282c4cc606d1dfdd6499736b

      SHA512

      eb66c610f175fcabef3c5419260bd597d2a542846aa45765f28e48d58520e4393a6224c171c3ec65a3ad5ae9710b38646933b4be39a6c666d133349030245350

    • C:\Windows\ImmersiveControlPanel\pris\fontdrvhost.exe

      Filesize

      2.7MB

      MD5

      8e6d3e4cdb00a133fd3f33cfde6e37c0

      SHA1

      91233309e54797dac7c00a9576c38456bc14acba

      SHA256

      40a25f4406c2c119fdbee6a530b4dbd78dfad9e98eb0ac785290997976d75d7d

      SHA512

      a1604b3da2eb2dfec99ed830eaa8077e0ba2b2f66c377bf8c1bdea8e8668f2bee7fa90411fdd62f358f1be87ae58dd5e1de71a58f46428550c64262664c671a6

    • C:\Windows\ImmersiveControlPanel\pris\fontdrvhost.exe

      Filesize

      2.7MB

      MD5

      8bffe1ce57dc2eceb6a4fb7876402f5f

      SHA1

      f34335364fae6153c3a12443d4a81ca05c1fe8f8

      SHA256

      3b5e2e86ab844cba552b0d898b6526218bd8a4946789b1bd1714963dd7c9ba34

      SHA512

      96e8d75f9f29d5ed98a883e9ad84a7ec846f2fc2468e2b5a8a903561eb39812f97ad6656952fba400a04f8b2520f722dc3d1c479a0284597da4c616299f83481

    • memory/3636-14-0x000000001C2B0000-0x000000001C7D8000-memory.dmp

      Filesize

      5.2MB

    • memory/3636-19-0x000000001BDC0000-0x000000001BDCC000-memory.dmp

      Filesize

      48KB

    • memory/3636-8-0x000000001B760000-0x000000001B776000-memory.dmp

      Filesize

      88KB

    • memory/3636-7-0x000000001B630000-0x000000001B640000-memory.dmp

      Filesize

      64KB

    • memory/3636-10-0x000000001B7A0000-0x000000001B7AA000-memory.dmp

      Filesize

      40KB

    • memory/3636-11-0x000000001BD10000-0x000000001BD66000-memory.dmp

      Filesize

      344KB

    • memory/3636-12-0x000000001B780000-0x000000001B788000-memory.dmp

      Filesize

      32KB

    • memory/3636-13-0x000000001B790000-0x000000001B7A2000-memory.dmp

      Filesize

      72KB

    • memory/3636-0-0x00007FF9024F3000-0x00007FF9024F5000-memory.dmp

      Filesize

      8KB

    • memory/3636-15-0x000000001BD80000-0x000000001BD88000-memory.dmp

      Filesize

      32KB

    • memory/3636-17-0x000000001BDA0000-0x000000001BDAC000-memory.dmp

      Filesize

      48KB

    • memory/3636-9-0x000000001B640000-0x000000001B648000-memory.dmp

      Filesize

      32KB

    • memory/3636-18-0x000000001BDB0000-0x000000001BDBE000-memory.dmp

      Filesize

      56KB

    • memory/3636-16-0x000000001BD90000-0x000000001BD98000-memory.dmp

      Filesize

      32KB

    • memory/3636-21-0x000000001BDE0000-0x000000001BDEC000-memory.dmp

      Filesize

      48KB

    • memory/3636-20-0x000000001BDD0000-0x000000001BDDA000-memory.dmp

      Filesize

      40KB

    • memory/3636-6-0x000000001B620000-0x000000001B628000-memory.dmp

      Filesize

      32KB

    • memory/3636-5-0x000000001B7B0000-0x000000001B800000-memory.dmp

      Filesize

      320KB

    • memory/3636-4-0x000000001B600000-0x000000001B61C000-memory.dmp

      Filesize

      112KB

    • memory/3636-3-0x000000001B5F0000-0x000000001B5FE000-memory.dmp

      Filesize

      56KB

    • memory/3636-2-0x00007FF9024F0000-0x00007FF902FB1000-memory.dmp

      Filesize

      10.8MB

    • memory/3636-1-0x0000000000750000-0x0000000000A04000-memory.dmp

      Filesize

      2.7MB

    • memory/3636-113-0x00007FF9024F0000-0x00007FF902FB1000-memory.dmp

      Filesize

      10.8MB

    • memory/3736-117-0x000000001BA70000-0x000000001BA82000-memory.dmp

      Filesize

      72KB