Analysis
-
max time kernel
66s -
max time network
61s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 11:51
Behavioral task
behavioral1
Sample
93e35f881bc6e9f03a420d9ecfac81a0af3f71f10918eb9be5c33cb18d7f56c6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
93e35f881bc6e9f03a420d9ecfac81a0af3f71f10918eb9be5c33cb18d7f56c6.exe
Resource
win10v2004-20241007-en
General
-
Target
93e35f881bc6e9f03a420d9ecfac81a0af3f71f10918eb9be5c33cb18d7f56c6.exe
-
Size
1.1MB
-
MD5
8de0b1533dc90527d236cd6c854cbc24
-
SHA1
dd896192fcb96620c82dd1a8a0f94ca658e09f78
-
SHA256
93e35f881bc6e9f03a420d9ecfac81a0af3f71f10918eb9be5c33cb18d7f56c6
-
SHA512
33c279f2890ea572ea3f8921bb35648d7339eac2fd7d7f9f2548b43481fa0ffcee562879ecf521a5ff0b6679aa907731d93dbc45ce0fcb41ccb7fe4ae4762887
-
SSDEEP
24576:U2G/nvxW3Ww0tI2qYVrBvevwx8P9brkuXa:UbA30I2TvkPOX
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 24 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1056 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 396 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2424 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1060 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2168 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1816 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2232 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2188 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2176 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2396 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2444 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2980 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2260 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2316 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2632 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1792 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 716 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1104 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 772 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2460 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2376 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2504 2476 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1944 2476 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x0009000000018f85-9.dat dcrat behavioral1/memory/2832-13-0x00000000011C0000-0x0000000001296000-memory.dmp dcrat behavioral1/memory/1848-37-0x0000000000AC0000-0x0000000000B96000-memory.dmp dcrat -
Executes dropped EXE 2 IoCs
pid Process 2832 MsBlock.exe 1848 OSPPSVC.exe -
Loads dropped DLL 2 IoCs
pid Process 2692 cmd.exe 2692 cmd.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\en-US\dwm.exe MsBlock.exe File created C:\Program Files (x86)\Internet Explorer\en-US\6cb0b6c459d5d3 MsBlock.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\lsm.exe MsBlock.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\101b941d020240 MsBlock.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\TAPI\taskhost.exe MsBlock.exe File created C:\Windows\TAPI\b75386f1303e64 MsBlock.exe File created C:\Windows\Media\Cityscape\audiodg.exe MsBlock.exe File created C:\Windows\Media\Cityscape\42af1c969fbb7b MsBlock.exe File created C:\Windows\addins\winlogon.exe MsBlock.exe File created C:\Windows\Cursors\csrss.exe MsBlock.exe File created C:\Windows\Cursors\886983d96e3d3e MsBlock.exe File created C:\Windows\TAPI\taskhost.exe MsBlock.exe File created C:\Windows\addins\cc11b995f2a76d MsBlock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93e35f881bc6e9f03a420d9ecfac81a0af3f71f10918eb9be5c33cb18d7f56c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 24 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2316 schtasks.exe 2632 schtasks.exe 2460 schtasks.exe 2188 schtasks.exe 1060 schtasks.exe 2396 schtasks.exe 2980 schtasks.exe 2504 schtasks.exe 1056 schtasks.exe 2424 schtasks.exe 2168 schtasks.exe 2232 schtasks.exe 2176 schtasks.exe 1792 schtasks.exe 2024 schtasks.exe 1816 schtasks.exe 2444 schtasks.exe 2260 schtasks.exe 716 schtasks.exe 1104 schtasks.exe 772 schtasks.exe 2376 schtasks.exe 396 schtasks.exe 1944 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2832 MsBlock.exe 1848 OSPPSVC.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2832 MsBlock.exe Token: SeDebugPrivilege 1848 OSPPSVC.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2088 2884 93e35f881bc6e9f03a420d9ecfac81a0af3f71f10918eb9be5c33cb18d7f56c6.exe 30 PID 2884 wrote to memory of 2088 2884 93e35f881bc6e9f03a420d9ecfac81a0af3f71f10918eb9be5c33cb18d7f56c6.exe 30 PID 2884 wrote to memory of 2088 2884 93e35f881bc6e9f03a420d9ecfac81a0af3f71f10918eb9be5c33cb18d7f56c6.exe 30 PID 2884 wrote to memory of 2088 2884 93e35f881bc6e9f03a420d9ecfac81a0af3f71f10918eb9be5c33cb18d7f56c6.exe 30 PID 2088 wrote to memory of 2692 2088 WScript.exe 31 PID 2088 wrote to memory of 2692 2088 WScript.exe 31 PID 2088 wrote to memory of 2692 2088 WScript.exe 31 PID 2088 wrote to memory of 2692 2088 WScript.exe 31 PID 2692 wrote to memory of 2832 2692 cmd.exe 33 PID 2692 wrote to memory of 2832 2692 cmd.exe 33 PID 2692 wrote to memory of 2832 2692 cmd.exe 33 PID 2692 wrote to memory of 2832 2692 cmd.exe 33 PID 2832 wrote to memory of 2420 2832 MsBlock.exe 59 PID 2832 wrote to memory of 2420 2832 MsBlock.exe 59 PID 2832 wrote to memory of 2420 2832 MsBlock.exe 59 PID 2420 wrote to memory of 1376 2420 cmd.exe 61 PID 2420 wrote to memory of 1376 2420 cmd.exe 61 PID 2420 wrote to memory of 1376 2420 cmd.exe 61 PID 2420 wrote to memory of 1848 2420 cmd.exe 62 PID 2420 wrote to memory of 1848 2420 cmd.exe 62 PID 2420 wrote to memory of 1848 2420 cmd.exe 62 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\93e35f881bc6e9f03a420d9ecfac81a0af3f71f10918eb9be5c33cb18d7f56c6.exe"C:\Users\Admin\AppData\Local\Temp\93e35f881bc6e9f03a420d9ecfac81a0af3f71f10918eb9be5c33cb18d7f56c6.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\intoHost\pN2iKIl2JrbfNIx.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\intoHost\z07BaoIs8R5lt5yU6uoZdloB3t.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\intoHost\MsBlock.exe"C:\intoHost\MsBlock.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8QnLGcWWZk.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1376
-
-
C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\OSPPSVC.exe"C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\OSPPSVC.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\Windows\TAPI\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\TAPI\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Windows\TAPI\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Internet Explorer\en-US\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\en-US\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Internet Explorer\en-US\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 6 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 9 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 10 /tr "'C:\Windows\Media\Cityscape\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\Media\Cityscape\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\Windows\Media\Cityscape\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Windows\addins\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\addins\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Windows\addins\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Windows\Cursors\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Cursors\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Windows\Cursors\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225B
MD593e51d1d3a06344c1dec73f383f278e5
SHA126b63ec36fcc06fe94fbeb114796a043faf4eec4
SHA256549ca824de4920ef13b020a87ef033021512c890499ab9ea801313917b46963a
SHA5121a68701d7423c0791feb670aa934855b8f9c7f291f81d7faa7c2e81bddd17b73bd48eede5222c2c5006b5c85a5746f561a4258cc5cdd9452a7803c270b322a03
-
Filesize
211B
MD5672ef18aa1c9cf2cf6c906bba7d1435b
SHA14d72a4c6cb3aaeef5b02cef71ad42211f185c93a
SHA256a016b82ba799c1cf780c9ebb6cf0540c26aad664f5525d1ccc8b470fdaaa0075
SHA5128b5d37f4fb7b1df56118866f9cc18d0ce323167185258b2e8b830d91f20e2ee85eda6b145f25d363630790ddf7d188eb1507f051095fc63be4bfaef1760bc20e
-
Filesize
25B
MD55c9b6d735522c5246a33bbadaa92c7db
SHA1f676e86ecb933d676095e187a50febbd61bbc344
SHA25647148fdb946ede0b9fab190f1ae5dd459d096873cca3585642183674313fe551
SHA51263fafa045ca419b1394b2255ef32bf4fb6a40ff8b45ade892723ec41a50a831cce7c4266e489f825dc4e574d07b38e216c12337a89743c70e6de35470e798875
-
Filesize
828KB
MD5dca7880645d6318a20d020f2a51b7a8c
SHA15c5e493ce685a79ecb58ef2fdc6d9a4364c0a276
SHA2569c03c25f02d71bfc3ab23870d882274e9b34626d1374491529818e19851510b9
SHA5123fa226e65382fed9f3dd959e80e4483866da3b339c277906ab1b08db067be6f6ec1d73b9ad3067b4046e512f8f08940528bf8573edc83d999f18f890fc210807