Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 04:30
Static task
static1
Behavioral task
behavioral1
Sample
877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe
Resource
win10v2004-20241007-en
General
-
Target
877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe
-
Size
1.8MB
-
MD5
3d213353948aba4d80c28823d8661951
-
SHA1
8c7dadac2ee5f348a8940ab47187b39fd025bead
-
SHA256
877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19
-
SHA512
36ba2c76563094e5c8248a05c088ad9c496573ccb6a9799759c38ef77f89e61b9832c617abc7322646c7c029ec8e573f82a4a1cc25b656bee5af82a188cab6c1
-
SSDEEP
24576:/r34Nhem94rOh31QzGpKHaHYSvvv22db+PowhGhomMJV4ynedX4QD/d5lBxdU7it:/I6g1AqY2v22pVfSJKyiXRd5lKu
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4684 4872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4412 4872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3484 4872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4976 4872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2952 4872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2796 4872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 4872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 4872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4048 4872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1304 4872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 4872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 4872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4776 4872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 732 4872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4092 4872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3392 4872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4836 4872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4120 4872 schtasks.exe 83 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe -
Executes dropped EXE 1 IoCs
pid Process 1912 fontdrvhost.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\f3b6ecef712a24 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\fontdrvhost.exe 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\fontdrvhost.exe 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\5b884080fd4f94 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\spoolsv.exe 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4836 schtasks.exe 4684 schtasks.exe 1304 schtasks.exe 1888 schtasks.exe 4776 schtasks.exe 4092 schtasks.exe 3392 schtasks.exe 3484 schtasks.exe 2952 schtasks.exe 2220 schtasks.exe 2904 schtasks.exe 2796 schtasks.exe 4120 schtasks.exe 732 schtasks.exe 4412 schtasks.exe 4976 schtasks.exe 4048 schtasks.exe 1636 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe Token: SeDebugPrivilege 1912 fontdrvhost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2288 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 102 PID 2704 wrote to memory of 2288 2704 877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe 102 PID 2288 wrote to memory of 64 2288 cmd.exe 104 PID 2288 wrote to memory of 64 2288 cmd.exe 104 PID 2288 wrote to memory of 1092 2288 cmd.exe 105 PID 2288 wrote to memory of 1092 2288 cmd.exe 105 PID 2288 wrote to memory of 1912 2288 cmd.exe 112 PID 2288 wrote to memory of 1912 2288 cmd.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe"C:\Users\Admin\AppData\Local\Temp\877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dxh2Krkmfz.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:64
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1092
-
-
C:\Program Files (x86)\Windows Sidebar\Gadgets\fontdrvhost.exe"C:\Program Files (x86)\Windows Sidebar\Gadgets\fontdrvhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Documents\My Videos\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Public\Documents\My Videos\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Documents\My Videos\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e198" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\AppData\Local\Temp\877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e198" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\AppData\Local\Temp\877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD53d213353948aba4d80c28823d8661951
SHA18c7dadac2ee5f348a8940ab47187b39fd025bead
SHA256877671c4a555e37e34c6b9ecab2cc958b28cc9617c6f53e3841a6386de180e19
SHA51236ba2c76563094e5c8248a05c088ad9c496573ccb6a9799759c38ef77f89e61b9832c617abc7322646c7c029ec8e573f82a4a1cc25b656bee5af82a188cab6c1
-
Filesize
238B
MD5153c462294b05923de94b90155219570
SHA1d52c61793de3862f236eed713521a5356f2c65a4
SHA256e5f51e9089d44107bedf9feef6b275867aeab7d7aca6696b053177abb1d00d5b
SHA512742a9b5b9f4578cbc128255fdd4ceffd5897a0098540a95f0d47bd5350523e7a545bc414da31e1138c4d0362da782f4677cb8e9e1224c5c6d5679a077ae8d1df