Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 14:06
Static task
static1
Behavioral task
behavioral1
Sample
6b4372f45d14a2f2b5d64d153e31b65436936921bceee.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6b4372f45d14a2f2b5d64d153e31b65436936921bceee.exe
Resource
win10v2004-20241007-en
General
-
Target
6b4372f45d14a2f2b5d64d153e31b65436936921bceee.exe
-
Size
2.6MB
-
MD5
95a33349fd2a84e397b2f406d86ecf91
-
SHA1
aa12a73b3de5be31c77dac39d4d3a6a70269429f
-
SHA256
6b4372f45d14a2f2b5d64d153e31b65436936921bceeeb8b01585f71a8c0e1bf
-
SHA512
3fc5579a23da99e5ed41bd91bcbcf241a8cafb466bfa94d131ddc4f1d12c8d755361595d70e19e707d81f1d1ce5efc0e36b8579e47d9372f5da16a05b7c96ea1
-
SSDEEP
49152:0bB7GpqxgFuANb7UqRDIZ63KYV4JOU5/FZ53aqWVPVrNCddRrvawu:0bBSpeOuU7U4SC44U5DprauPu
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 17 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 420 4892 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3504 4892 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2548 4892 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4924 4892 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3112 4892 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4156 4892 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4476 4892 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2952 4892 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5012 4892 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3484 4892 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2032 4892 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3672 4892 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4816 4892 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4104 4892 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1300 4892 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2056 4892 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5016 4892 schtasks.exe 88 -
resource yara_rule behavioral2/files/0x000c000000023b03-6.dat dcrat behavioral2/files/0x000a000000023b5b-25.dat dcrat behavioral2/memory/1664-28-0x0000000000F90000-0x00000000011E2000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chainsavesref.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 6b4372f45d14a2f2b5d64d153e31b65436936921bceee.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Install_JJSploit16.8.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 3 IoCs
pid Process 692 Install_JJSploit16.8.exe 1664 chainsavesref.exe 2776 RuntimeBroker.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\RuntimeBroker.exe chainsavesref.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\9e8d7a4ca61bd9 chainsavesref.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\SKB\LanguageModels\5b884080fd4f94 chainsavesref.exe File created C:\Windows\Cursors\TextInputHost.exe chainsavesref.exe File created C:\Windows\Cursors\22eafd247d37c3 chainsavesref.exe File created C:\Windows\SKB\LanguageModels\fontdrvhost.exe chainsavesref.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install_JJSploit16.8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings chainsavesref.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings Install_JJSploit16.8.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4156 schtasks.exe 2032 schtasks.exe 4104 schtasks.exe 1300 schtasks.exe 2056 schtasks.exe 5068 schtasks.exe 420 schtasks.exe 3112 schtasks.exe 4476 schtasks.exe 4816 schtasks.exe 3672 schtasks.exe 3484 schtasks.exe 5016 schtasks.exe 3504 schtasks.exe 2548 schtasks.exe 4924 schtasks.exe 2952 schtasks.exe 5012 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1664 chainsavesref.exe 1664 chainsavesref.exe 1664 chainsavesref.exe 1664 chainsavesref.exe 1664 chainsavesref.exe 2776 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1664 chainsavesref.exe Token: SeDebugPrivilege 2776 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1116 wrote to memory of 692 1116 6b4372f45d14a2f2b5d64d153e31b65436936921bceee.exe 82 PID 1116 wrote to memory of 692 1116 6b4372f45d14a2f2b5d64d153e31b65436936921bceee.exe 82 PID 1116 wrote to memory of 692 1116 6b4372f45d14a2f2b5d64d153e31b65436936921bceee.exe 82 PID 692 wrote to memory of 4136 692 Install_JJSploit16.8.exe 83 PID 692 wrote to memory of 4136 692 Install_JJSploit16.8.exe 83 PID 692 wrote to memory of 4136 692 Install_JJSploit16.8.exe 83 PID 692 wrote to memory of 3164 692 Install_JJSploit16.8.exe 84 PID 692 wrote to memory of 3164 692 Install_JJSploit16.8.exe 84 PID 692 wrote to memory of 3164 692 Install_JJSploit16.8.exe 84 PID 4136 wrote to memory of 4876 4136 WScript.exe 85 PID 4136 wrote to memory of 4876 4136 WScript.exe 85 PID 4136 wrote to memory of 4876 4136 WScript.exe 85 PID 4876 wrote to memory of 1664 4876 cmd.exe 87 PID 4876 wrote to memory of 1664 4876 cmd.exe 87 PID 1664 wrote to memory of 868 1664 chainsavesref.exe 107 PID 1664 wrote to memory of 868 1664 chainsavesref.exe 107 PID 868 wrote to memory of 640 868 cmd.exe 109 PID 868 wrote to memory of 640 868 cmd.exe 109 PID 868 wrote to memory of 2776 868 cmd.exe 113 PID 868 wrote to memory of 2776 868 cmd.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b4372f45d14a2f2b5d64d153e31b65436936921bceee.exe"C:\Users\Admin\AppData\Local\Temp\6b4372f45d14a2f2b5d64d153e31b65436936921bceee.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Roaming\Install_JJSploit16.8.exe"C:\Users\Admin\AppData\Roaming\Install_JJSploit16.8.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Runtimehost\MYWzp0a6xwrEK5S4UF.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Runtimehost\pQImPX9m1y2f8C.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Runtimehost\chainsavesref.exe"C:\Runtimehost\chainsavesref.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\QLNjhu5Rlm.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\RuntimeBroker.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\RuntimeBroker.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Runtimehost\file.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:3164
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 8 /tr "'C:\Users\Public\sihost.exe'" /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:5068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Users\Public\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Users\Public\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\wscript.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscript" /sc ONLOGON /tr "'C:\Users\Default User\wscript.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\wscript.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Runtimehost\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Runtimehost\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Runtimehost\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Windows\SKB\LanguageModels\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\SKB\LanguageModels\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Windows\SKB\LanguageModels\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 12 /tr "'C:\Windows\Cursors\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\Cursors\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 7 /tr "'C:\Windows\Cursors\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202B
MD5ecf0d0693e7b19616fab6c1923ce1bca
SHA111a4d520d950f72c8575faf33e15037e68d36712
SHA2564b3af66a1c0ed2ef1bf7b55ca6940cada614229200dae62024b03c08b7f843d6
SHA512a8503afbcc63814c567d666c81b8428c2cd00709c89346e1570c065922ebc014fc296663cc3131148a58f4344a45f1142851aa0ed2754b21445912accf05341f
-
Filesize
2.3MB
MD5afc7c278c420c1c025a97af636a4f6cd
SHA1d5af2fd0336518756ee300dd4fb5106959adcaf7
SHA256f817634c1236f507c749742bd1bae393b74d2d29620128ecc50037205f175cc7
SHA51212a401f94aa941e56e116c9981626b50d18e592b1550ff5198fef47895a43a56fcbe77f6e88cd8951d01e7c05a4a6d80ce54176257ec47c9a219b1dece62337a
-
Filesize
34B
MD5677cc4360477c72cb0ce00406a949c61
SHA1b679e8c3427f6c5fc47c8ac46cd0e56c9424de05
SHA256f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b
SHA5127cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a
-
Filesize
34B
MD5315845ba3d99cbfaeec438a8dddee9ae
SHA19b210d6f805af769de23ae060844a1dddcf9cdce
SHA256704a1a651e6b566a4a0e54d95de33d5c55a330d75c0b4456b3fa4c2ba4718a97
SHA5123b5a0364038167ac3133f43f9eb6b85090612a30c27ab3920adc8c18a4a7fc8eb030378819dd9be98227ae668dcdf5779d9feb5993d99e9b02de57bf5622cbc7
-
Filesize
240B
MD51218db6605fd935a5c2cb03d98b90cc4
SHA1e20f2602f9803a524e4eae22d4f68882172a162a
SHA2566cfd761b2be81c69ccf9e337cdc40002dc847ce7063a0380b8ead3f1da109f51
SHA5124ae4cea6c80aadc8658771b81a8192876e383ee8d71de34c23de675a24d815284611e7ead9f8b524b9b78ae4b1f71f3b8efd538c7222ccb02ad22b87aaf8c690
-
Filesize
2.6MB
MD51d3f70e65723398ca3ffefd0f346ef0e
SHA140c6926b7abbfaab25806f6e9bb88e9f52c87007
SHA25650d21266acc179352743c1bf14ada681f4f6517ed240ac1ded4f094a1248a95c
SHA51202044791a8e8b40625bebd7ea902066222ed00d94065a22b5d8ac39d539e5295d5345259f9fabdc6c2a3c95579e978fe8914f6c1fe640b5a2869082499a57d6d