Analysis

  • max time kernel
    145s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2025 15:30

General

  • Target

    DCRatBuild.exe

  • Size

    1.3MB

  • MD5

    7dac76fcfd7f87fd4df2f890d7136046

  • SHA1

    7c835d1de4334e1e3a552f4f68d792b668c5e865

  • SHA256

    1683412372883414e362d6513e7329a7177b0cc7ddb3fb46375ac023f51379e5

  • SHA512

    58e159d8a34a5536fb9893af6dfbbbc544a21dd5b7b520094961be93b2a7684f0696cff7fa14918dff115af2e52fbc1c70cd4c73f026657cd5060458a7a70ce1

  • SSDEEP

    24576:U2G/nvxW3Ww0tY6jb/ozlw21m0MTGFR4cx6SRrFBZDiFNwHJItght:UbA30SlwqeGDFrrZbJF

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 21 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 21 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe
    "C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\hypercomcomponentMonitor\cTC6SVOisKhTNkLoVDPlcoNPpT.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\hypercomcomponentMonitor\fe0LIWO.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\hypercomcomponentMonitor\intoBrokercrt.exe
          "C:\hypercomcomponentMonitor\intoBrokercrt.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AmNezkFRjx.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2264
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:2260
              • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\audiodg.exe
                "C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\audiodg.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2952
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\914b74de-9f3e-475f-a0f2-dbf5533e0c50.vbs"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:600
                  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\audiodg.exe
                    "C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\audiodg.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2456
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f5d522c3-94c7-483c-b21d-730854856a74.vbs"
                      9⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2232
                      • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\audiodg.exe
                        "C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\audiodg.exe"
                        10⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2740
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\18487c61-329f-431e-9b89-10b6e319e5aa.vbs"
                          11⤵
                            PID:2748
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bb77f4d2-369d-46da-ac5b-785e6cec4593.vbs"
                            11⤵
                              PID:1060
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\908249c6-a9a7-4d95-90d7-b6015e6d5c2d.vbs"
                          9⤵
                            PID:1540
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5026e62c-c12b-4e59-8e04-64e2db8cfe15.vbs"
                        7⤵
                          PID:1300
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 5 /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\WMIADAP.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2796
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\WMIADAP.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2604
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 6 /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\WMIADAP.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2712
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\audiodg.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2748
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\audiodg.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2608
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\audiodg.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2172
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Program Files\Java\jdk1.7.0_80\wininit.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2884
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Java\jdk1.7.0_80\wininit.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2076
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Program Files\Java\jdk1.7.0_80\wininit.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2044
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Windows\Installer\WmiPrvSE.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2564
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\Installer\WmiPrvSE.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1668
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Windows\Installer\WmiPrvSE.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1376
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 7 /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\WMIADAP.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2636
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\WMIADAP.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1892
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 14 /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\WMIADAP.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:236
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\dwm.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1628
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\dwm.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1940
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\dwm.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1976
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Windows\IME\de-DE\wininit.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1348
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\IME\de-DE\wininit.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2944
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Windows\IME\de-DE\wininit.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2920

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\18487c61-329f-431e-9b89-10b6e319e5aa.vbs

              Filesize

              750B

              MD5

              daf1423279f3132eb7f82c8c5b28a00d

              SHA1

              a0fefced8fa6f75130028af91398dfd5694acd5c

              SHA256

              1f42c618b05588d46ff169a8d8886fde8dfede572241ecca90867e9aa6856752

              SHA512

              8a4be8b4b002972c1cf3e9c78ad7692e7ba68cce6afc624d2f52ef49dd24bd815de97fd6523bf232348c29001373c397e64cb1c15b127cf2252db64a9103fcc4

            • C:\Users\Admin\AppData\Local\Temp\5026e62c-c12b-4e59-8e04-64e2db8cfe15.vbs

              Filesize

              526B

              MD5

              a9adfe41041dc5ccb03de533e65d9036

              SHA1

              7296bbd04ab6208aa279c757e136d53cbb4e6732

              SHA256

              4c01d7931fe31e1279ef71e9bead858dd648f3ee0f5093b246236de9c607740a

              SHA512

              d3b0a61c5560798688aeb97954337f37eb18853aaeb0cee361d159bc4f89ae920b1c26bfb702d3517da4de660561efc8e1d7616be9bfb8b7bfbe1e4137e08400

            • C:\Users\Admin\AppData\Local\Temp\914b74de-9f3e-475f-a0f2-dbf5533e0c50.vbs

              Filesize

              750B

              MD5

              f296765868af49d0494c79ba7a5ac0f8

              SHA1

              6dcaf9b416b0253852df834f4855622c922ebc70

              SHA256

              0a1ae4c120371168484babdeaa601c29fa763ad3ae34d44bea8840ff7efe4519

              SHA512

              647f26f6ca4305484c47325a808cf935d9e94c7e2107c344e6a21432f7a802f8d061411b9f05734735c29bf0b3f27773a0170cd72ed16038d28c780dc9cdf515

            • C:\Users\Admin\AppData\Local\Temp\AmNezkFRjx.bat

              Filesize

              239B

              MD5

              ba0ff1a5985de23793368077f89fd5b7

              SHA1

              d0ddcf92b5e4f32263b0a44dc0e6cae9fa2fcc8b

              SHA256

              c86b399ba5a6fd2c8637ffd23253dc7b12743cf685b30a3ddf34ffd1934084d0

              SHA512

              5d8b18dbf9b32647d2377b5de654aa4198b1f1e2d0a6187ab1dda63bc2a4814503aba3251d6cd42511cff7a30c734f29868c485d7e8dc4904a4ae4ed42469f5d

            • C:\Users\Admin\AppData\Local\Temp\f5d522c3-94c7-483c-b21d-730854856a74.vbs

              Filesize

              750B

              MD5

              48ad12ccc569666ed001e32ba7a2775e

              SHA1

              2852cde13126667e4960f72798e1281afcc074b8

              SHA256

              aaf7b2a285c286a8cb2e912b7d127dc0e31f2169964d656f0b555edc8c860c09

              SHA512

              bde1ac0fe8aee6711e94e4b482f69e410113f06e1d949d31686e641c23ebb8bac5409d12479d96dad8f77fc3acb4d5058140c760419968bbcba6b2d43dec2777

            • C:\hypercomcomponentMonitor\cTC6SVOisKhTNkLoVDPlcoNPpT.vbe

              Filesize

              208B

              MD5

              d3f786c1f7db35714f2d28d7b0c1c8d3

              SHA1

              51e89447c9409ef87edd18d9e9007f05de895188

              SHA256

              2373e0595ed11db6cb32fec72ea7ef41067d457dac579cb1b25a32716ffff1ad

              SHA512

              cba9515d8e07dca2f9b6b7d71cf54436616f306bb99b31523c64441da32c51f9fc32cb4a7d262c9f70edbc3cc29cc6ad56efce922bb6ce2c3df05dc7ec913dfc

            • C:\hypercomcomponentMonitor\fe0LIWO.bat

              Filesize

              47B

              MD5

              7c2f5422014db387cccae3fdb0bdbaea

              SHA1

              b89fc23e7fa00ce1ee16b732846a87771118b0f3

              SHA256

              113fb30c637c13bfd8a4b0f912bd3fd7fe84bce3b70b9f244cbae99449a4a17b

              SHA512

              301c621a4a861b873899f68b798ac12334d814e2feca10fcbd08529841b537cfa15d3abe9ce08854907d7ee88af9342acadd731ae711c461abccb7f1bf8006de

            • \hypercomcomponentMonitor\intoBrokercrt.exe

              Filesize

              1.0MB

              MD5

              fe2791b424b6b8c50199b31b800803f4

              SHA1

              d9fc58b1f6665165b5e0bfd1c124f3ad656c8f8f

              SHA256

              1e0c6e492e0ea31f22daea3003467d9ba56fa47d6643a07c8746c24e047e12ff

              SHA512

              209bc4f74d782f989194e921f4c2ef489399ec282edee1cc34008c5ffba74449fb1d931751c928991886641c8ffe8b48f89e7c3f8960049f56b88acc72a76c25

            • memory/2684-16-0x0000000001FC0000-0x0000000001FCA000-memory.dmp

              Filesize

              40KB

            • memory/2684-17-0x0000000001FD0000-0x0000000001FDC000-memory.dmp

              Filesize

              48KB

            • memory/2684-15-0x0000000001FB0000-0x0000000001FBC000-memory.dmp

              Filesize

              48KB

            • memory/2684-14-0x00000000006D0000-0x00000000006DE000-memory.dmp

              Filesize

              56KB

            • memory/2684-13-0x00000000000D0000-0x00000000001D8000-memory.dmp

              Filesize

              1.0MB

            • memory/2740-61-0x0000000000B90000-0x0000000000C98000-memory.dmp

              Filesize

              1.0MB

            • memory/2952-39-0x0000000000B70000-0x0000000000C78000-memory.dmp

              Filesize

              1.0MB