Analysis
-
max time kernel
94s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/01/2025, 03:33
Behavioral task
behavioral1
Sample
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692N.exe
Resource
win10v2004-20241007-en
General
-
Target
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692N.exe
-
Size
1.1MB
-
MD5
d2f57cf55387c9146158f49dbcf5b540
-
SHA1
57fb9892bdf6362073eb3cb1452a291568b49e23
-
SHA256
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692
-
SHA512
5d2da7dcbe87ceee345b95d99fc47a209a5621c88483fdb3484493f75fe0e8cc5802703dcd44e068a83738401b7e6a8edaeef7b098a804ae4989ccfb2ef4f78e
-
SSDEEP
24576:U2G/nvxW3Ww0tI2qYVrBvevwx8P9brkuXq:UbA30I2TvkPOf
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1724 4192 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2200 4192 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3316 4192 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4080 4192 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1416 4192 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4472 4192 schtasks.exe 86 -
resource yara_rule behavioral2/memory/4664-13-0x00000000008A0000-0x0000000000976000-memory.dmp dcrat behavioral2/files/0x0007000000023caa-11.dat dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692N.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation MsBlock.exe -
Executes dropped EXE 2 IoCs
pid Process 4664 MsBlock.exe 320 sihost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4080 schtasks.exe 1416 schtasks.exe 4472 schtasks.exe 1724 schtasks.exe 2200 schtasks.exe 3316 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4664 MsBlock.exe 4664 MsBlock.exe 4664 MsBlock.exe 4664 MsBlock.exe 4664 MsBlock.exe 4664 MsBlock.exe 4664 MsBlock.exe 4664 MsBlock.exe 4664 MsBlock.exe 4664 MsBlock.exe 4664 MsBlock.exe 4664 MsBlock.exe 4664 MsBlock.exe 320 sihost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4664 MsBlock.exe Token: SeDebugPrivilege 320 sihost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4988 wrote to memory of 216 4988 9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692N.exe 82 PID 4988 wrote to memory of 216 4988 9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692N.exe 82 PID 4988 wrote to memory of 216 4988 9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692N.exe 82 PID 216 wrote to memory of 2660 216 WScript.exe 83 PID 216 wrote to memory of 2660 216 WScript.exe 83 PID 216 wrote to memory of 2660 216 WScript.exe 83 PID 2660 wrote to memory of 4664 2660 cmd.exe 85 PID 2660 wrote to memory of 4664 2660 cmd.exe 85 PID 4664 wrote to memory of 320 4664 MsBlock.exe 93 PID 4664 wrote to memory of 320 4664 MsBlock.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692N.exe"C:\Users\Admin\AppData\Local\Temp\9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\intoHost\pN2iKIl2JrbfNIx.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\intoHost\z07BaoIs8R5lt5yU6uoZdloB3t.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\intoHost\MsBlock.exe"C:\intoHost\MsBlock.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Default User\sihost.exe"C:\Users\Default User\sihost.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Users\Default User\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD5dca7880645d6318a20d020f2a51b7a8c
SHA15c5e493ce685a79ecb58ef2fdc6d9a4364c0a276
SHA2569c03c25f02d71bfc3ab23870d882274e9b34626d1374491529818e19851510b9
SHA5123fa226e65382fed9f3dd959e80e4483866da3b339c277906ab1b08db067be6f6ec1d73b9ad3067b4046e512f8f08940528bf8573edc83d999f18f890fc210807
-
Filesize
211B
MD5672ef18aa1c9cf2cf6c906bba7d1435b
SHA14d72a4c6cb3aaeef5b02cef71ad42211f185c93a
SHA256a016b82ba799c1cf780c9ebb6cf0540c26aad664f5525d1ccc8b470fdaaa0075
SHA5128b5d37f4fb7b1df56118866f9cc18d0ce323167185258b2e8b830d91f20e2ee85eda6b145f25d363630790ddf7d188eb1507f051095fc63be4bfaef1760bc20e
-
Filesize
25B
MD55c9b6d735522c5246a33bbadaa92c7db
SHA1f676e86ecb933d676095e187a50febbd61bbc344
SHA25647148fdb946ede0b9fab190f1ae5dd459d096873cca3585642183674313fe551
SHA51263fafa045ca419b1394b2255ef32bf4fb6a40ff8b45ade892723ec41a50a831cce7c4266e489f825dc4e574d07b38e216c12337a89743c70e6de35470e798875