Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-01-2025 09:43

General

  • Target

    d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0.exe

  • Size

    2.7MB

  • MD5

    133f58a8a158d4d0edb84f287c27127f

  • SHA1

    2af95a4364675e01e0d688639bd8a19cf8f12dea

  • SHA256

    d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0

  • SHA512

    c0c6ffe1f272d68231ef9244f77b15645d16ed20b8fbd7706e11339240ba25943f70d7b69150b75abc6b0089e86a77a0800cbc99fda2db5d8500b4b9ccfaa247

  • SSDEEP

    49152:sqyJUSQelMhlk1w19BlUobhENGZXxRWi0UAuqYqqncK:pyJlQgGk1wPko1oO30UA7Yqqr

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 36 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0.exe
    "C:\Users\Admin\AppData\Local\Temp\d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2936
    • C:\Users\Default\NetHood\csrss.exe
      "C:\Users\Default\NetHood\csrss.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:2604
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0d" /sc MINUTE /mo 8 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2604
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0" /sc ONLOGON /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2652
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0d" /sc MINUTE /mo 10 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3044
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Desktop\Idle.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2616
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Admin\Desktop\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:480
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Desktop\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:988
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\csrss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1216
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1716
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2396
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Downloads\wininit.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2148
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Public\Downloads\wininit.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2164
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Downloads\wininit.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1732
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Defender\it-IT\WmiPrvSE.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2544
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\it-IT\WmiPrvSE.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1580
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Defender\it-IT\WmiPrvSE.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2560
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Media Player\Network Sharing\dwm.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1152
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\Network Sharing\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1996
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Media Player\Network Sharing\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2876
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0d" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2908
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2756
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0d" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2472
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Windows\Fonts\dllhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2064
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Fonts\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1736
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Windows\Fonts\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1696
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Windows\Installer\{90140000-002A-0000-1000-0000000FF1CE}\dwm.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2408
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\Installer\{90140000-002A-0000-1000-0000000FF1CE}\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2248
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Windows\Installer\{90140000-002A-0000-1000-0000000FF1CE}\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2236
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Program Files\Internet Explorer\smss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2088
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1048
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Program Files\Internet Explorer\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2240
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\OSPPSVC.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1932
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\OSPPSVC.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1472
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\OSPPSVC.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2964
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Users\Default\NetHood\csrss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3040
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default\NetHood\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2184
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Users\Default\NetHood\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0.exe

    Filesize

    2.7MB

    MD5

    089ede9b5fb7a7f1fbe2fcdc096f84e0

    SHA1

    39a915d34408e0b781534a0d421caf3882cd5281

    SHA256

    d80f322571ef6dacabc6f9339ca3e82de4d2e51f221c3ee011ce1c1cf3e5bc4f

    SHA512

    36e777c69564c3db27bf8a59083de5d86b5c3afa0aede2e8920ac60836f168d67cac28f92a3f330dd4e501af7f60e6653a0506516d270c68197e11476fd57858

  • C:\Program Files\Windows Defender\it-IT\WmiPrvSE.exe

    Filesize

    2.7MB

    MD5

    133f58a8a158d4d0edb84f287c27127f

    SHA1

    2af95a4364675e01e0d688639bd8a19cf8f12dea

    SHA256

    d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0

    SHA512

    c0c6ffe1f272d68231ef9244f77b15645d16ed20b8fbd7706e11339240ba25943f70d7b69150b75abc6b0089e86a77a0800cbc99fda2db5d8500b4b9ccfaa247

  • C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0.exe

    Filesize

    2.7MB

    MD5

    d09282b48c34ff9662c758de97c1a30c

    SHA1

    a22b2bef6b4385d2adcc6428dde6ba2c6394adac

    SHA256

    cf5aadd7c765988ad4a555d262804f082e31244e579417d3ab45fbe5af1d6236

    SHA512

    50c7715b4bc7c2336490da777327885dc21befa348fcb080e7cdcd014cbcf1be44056327629185b8a2de1c99ab597e57efe42765bc5192b626ca4927bb8ed596

  • C:\Users\Default\AppData\Roaming\Microsoft\Windows\Network Shortcuts\csrss.exe

    Filesize

    2.7MB

    MD5

    98a8f0a6c3004556e3937138d8d4e75d

    SHA1

    503dc36a2219af976837cf799f9e4563e1510668

    SHA256

    9c3a774e2f2fc0519cf8e553a80f0102d1da0311f06ee334530159a84c045b19

    SHA512

    cd78057a33217479f3c9e7c2114b5f9db9819d6efe33f35983bd5631a9cade6c13fe93b04ff4474784e5ab19b9e8d44ed2665ed0e71f3d634acae9783c93a13e

  • memory/2604-193-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/2604-192-0x0000000000850000-0x0000000000B04000-memory.dmp

    Filesize

    2.7MB

  • memory/2936-7-0x00000000022E0000-0x00000000022F6000-memory.dmp

    Filesize

    88KB

  • memory/2936-17-0x000000001AA00000-0x000000001AA0C000-memory.dmp

    Filesize

    48KB

  • memory/2936-8-0x0000000002300000-0x0000000002308000-memory.dmp

    Filesize

    32KB

  • memory/2936-9-0x0000000002320000-0x000000000232A000-memory.dmp

    Filesize

    40KB

  • memory/2936-10-0x000000001A980000-0x000000001A9D6000-memory.dmp

    Filesize

    344KB

  • memory/2936-11-0x0000000002310000-0x0000000002318000-memory.dmp

    Filesize

    32KB

  • memory/2936-12-0x0000000002330000-0x0000000002342000-memory.dmp

    Filesize

    72KB

  • memory/2936-13-0x0000000002340000-0x0000000002348000-memory.dmp

    Filesize

    32KB

  • memory/2936-14-0x000000001A9D0000-0x000000001A9D8000-memory.dmp

    Filesize

    32KB

  • memory/2936-15-0x000000001A9E0000-0x000000001A9EC000-memory.dmp

    Filesize

    48KB

  • memory/2936-16-0x000000001A9F0000-0x000000001A9FE000-memory.dmp

    Filesize

    56KB

  • memory/2936-0-0x000007FEF6343000-0x000007FEF6344000-memory.dmp

    Filesize

    4KB

  • memory/2936-18-0x000000001AA10000-0x000000001AA1A000-memory.dmp

    Filesize

    40KB

  • memory/2936-19-0x000000001AA20000-0x000000001AA2C000-memory.dmp

    Filesize

    48KB

  • memory/2936-6-0x00000000008A0000-0x00000000008B0000-memory.dmp

    Filesize

    64KB

  • memory/2936-5-0x0000000000530000-0x0000000000538000-memory.dmp

    Filesize

    32KB

  • memory/2936-4-0x0000000000510000-0x000000000052C000-memory.dmp

    Filesize

    112KB

  • memory/2936-3-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/2936-184-0x000007FEF6343000-0x000007FEF6344000-memory.dmp

    Filesize

    4KB

  • memory/2936-191-0x000007FEF6340000-0x000007FEF6D2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2936-2-0x000007FEF6340000-0x000007FEF6D2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2936-1-0x0000000000240000-0x00000000004F4000-memory.dmp

    Filesize

    2.7MB