Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 12:31
Behavioral task
behavioral1
Sample
D0CD2568BF153709F5ED4491BD8534AB.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
D0CD2568BF153709F5ED4491BD8534AB.exe
Resource
win10v2004-20241007-en
General
-
Target
D0CD2568BF153709F5ED4491BD8534AB.exe
-
Size
826KB
-
MD5
d0cd2568bf153709f5ed4491bd8534ab
-
SHA1
070e2b33bd4e51417eb1ac74301f25afb35d7ec2
-
SHA256
4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798
-
SHA512
0ea13e0dff1c362eeb02f75ebef502a3605f5c381082f05548dfd0213cdc78aa90757876f9bae5348255794645a99eb83a0c72fb27e64d4b1c02d9d0cc1c6b98
-
SSDEEP
12288:82NE1Iv7VIWfLEcNif4F4aJHIi4ENQj0SeyZIZOJ59bsAzeA7:e1aV9fLofI4aVNYGZ059bNyI
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 30 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2936 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2924 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1748 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2872 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2576 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2064 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1600 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1608 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 672 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2376 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1248 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2780 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2880 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1952 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2792 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 300 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2364 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1256 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2900 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1208 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 880 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 348 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1696 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2988 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2136 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2240 2180 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1176 2180 schtasks.exe 30 -
resource yara_rule behavioral1/memory/2820-1-0x0000000000E60000-0x0000000000F36000-memory.dmp dcrat behavioral1/files/0x0005000000019fb9-11.dat dcrat behavioral1/memory/1288-31-0x0000000000A50000-0x0000000000B26000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 1288 audiodg.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\ja-JP\886983d96e3d3e D0CD2568BF153709F5ED4491BD8534AB.exe File created C:\Program Files\Internet Explorer\ja-JP\taskhost.exe D0CD2568BF153709F5ED4491BD8534AB.exe File created C:\Program Files\Internet Explorer\ja-JP\b75386f1303e64 D0CD2568BF153709F5ED4491BD8534AB.exe File created C:\Program Files\Internet Explorer\ja-JP\WmiPrvSE.exe D0CD2568BF153709F5ED4491BD8534AB.exe File created C:\Program Files\Internet Explorer\ja-JP\24dbde2999530e D0CD2568BF153709F5ED4491BD8534AB.exe File created C:\Program Files\7-Zip\Lang\smss.exe D0CD2568BF153709F5ED4491BD8534AB.exe File created C:\Program Files\7-Zip\Lang\69ddcba757bf72 D0CD2568BF153709F5ED4491BD8534AB.exe File created C:\Program Files\Windows Sidebar\ja-JP\csrss.exe D0CD2568BF153709F5ED4491BD8534AB.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Downloaded Program Files\audiodg.exe D0CD2568BF153709F5ED4491BD8534AB.exe File created C:\Windows\Downloaded Program Files\42af1c969fbb7b D0CD2568BF153709F5ED4491BD8534AB.exe File created C:\Windows\it-IT\dllhost.exe D0CD2568BF153709F5ED4491BD8534AB.exe File created C:\Windows\it-IT\5940a34987c991 D0CD2568BF153709F5ED4491BD8534AB.exe File created C:\Windows\LiveKernelReports\spoolsv.exe D0CD2568BF153709F5ED4491BD8534AB.exe File created C:\Windows\LiveKernelReports\f3b6ecef712a24 D0CD2568BF153709F5ED4491BD8534AB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 30 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2880 schtasks.exe 2364 schtasks.exe 348 schtasks.exe 1600 schtasks.exe 1248 schtasks.exe 2988 schtasks.exe 1176 schtasks.exe 2376 schtasks.exe 2900 schtasks.exe 2780 schtasks.exe 2792 schtasks.exe 2136 schtasks.exe 2576 schtasks.exe 2064 schtasks.exe 1208 schtasks.exe 880 schtasks.exe 1696 schtasks.exe 2996 schtasks.exe 1608 schtasks.exe 1256 schtasks.exe 2608 schtasks.exe 672 schtasks.exe 300 schtasks.exe 2240 schtasks.exe 2936 schtasks.exe 2924 schtasks.exe 2640 schtasks.exe 1952 schtasks.exe 1748 schtasks.exe 2872 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2820 D0CD2568BF153709F5ED4491BD8534AB.exe 2820 D0CD2568BF153709F5ED4491BD8534AB.exe 2820 D0CD2568BF153709F5ED4491BD8534AB.exe 2820 D0CD2568BF153709F5ED4491BD8534AB.exe 2820 D0CD2568BF153709F5ED4491BD8534AB.exe 2820 D0CD2568BF153709F5ED4491BD8534AB.exe 2820 D0CD2568BF153709F5ED4491BD8534AB.exe 2820 D0CD2568BF153709F5ED4491BD8534AB.exe 2820 D0CD2568BF153709F5ED4491BD8534AB.exe 2820 D0CD2568BF153709F5ED4491BD8534AB.exe 2820 D0CD2568BF153709F5ED4491BD8534AB.exe 1288 audiodg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2820 D0CD2568BF153709F5ED4491BD8534AB.exe Token: SeDebugPrivilege 1288 audiodg.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2820 wrote to memory of 448 2820 D0CD2568BF153709F5ED4491BD8534AB.exe 61 PID 2820 wrote to memory of 448 2820 D0CD2568BF153709F5ED4491BD8534AB.exe 61 PID 2820 wrote to memory of 448 2820 D0CD2568BF153709F5ED4491BD8534AB.exe 61 PID 448 wrote to memory of 1348 448 cmd.exe 63 PID 448 wrote to memory of 1348 448 cmd.exe 63 PID 448 wrote to memory of 1348 448 cmd.exe 63 PID 448 wrote to memory of 1288 448 cmd.exe 64 PID 448 wrote to memory of 1288 448 cmd.exe 64 PID 448 wrote to memory of 1288 448 cmd.exe 64 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\D0CD2568BF153709F5ED4491BD8534AB.exe"C:\Users\Admin\AppData\Local\Temp\D0CD2568BF153709F5ED4491BD8534AB.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nCS3PLly1U.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1348
-
-
C:\Windows\Downloaded Program Files\audiodg.exe"C:\Windows\Downloaded Program Files\audiodg.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "D0CD2568BF153709F5ED4491BD8534ABD" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\D0CD2568BF153709F5ED4491BD8534AB.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "D0CD2568BF153709F5ED4491BD8534AB" /sc ONLOGON /tr "'C:\MSOCache\All Users\D0CD2568BF153709F5ED4491BD8534AB.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "D0CD2568BF153709F5ED4491BD8534ABD" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\D0CD2568BF153709F5ED4491BD8534AB.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Windows\Downloaded Program Files\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\Downloaded Program Files\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Windows\Downloaded Program Files\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Program Files\Internet Explorer\ja-JP\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\ja-JP\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Program Files\Internet Explorer\ja-JP\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Program Files\7-Zip\Lang\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Program Files\7-Zip\Lang\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Downloads\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Admin\Downloads\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Downloads\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Sidebar\ja-JP\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\ja-JP\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Sidebar\ja-JP\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\it-IT\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\it-IT\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1256
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Windows\it-IT\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Windows\LiveKernelReports\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\LiveKernelReports\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Windows\LiveKernelReports\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\Program Files\Internet Explorer\ja-JP\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\ja-JP\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Program Files\Internet Explorer\ja-JP\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD52afd85cfc5bafebd09c8bce6d9e42c56
SHA1af6e137839cef719b9e82acda74370ca26dace2a
SHA256acb2454973064bd30270bf118aeb9d809e493f40a454ac026c2068a3575bb5c0
SHA5122011c4e9dfe5a8eae99d87eb1e78a125b68d3224b82c59118a96d548f7ae63120359c276cbc2600b515ca95dbc417abef671342590abedabf25095b9147d5bfa
-
Filesize
826KB
MD5d0cd2568bf153709f5ed4491bd8534ab
SHA1070e2b33bd4e51417eb1ac74301f25afb35d7ec2
SHA2564d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798
SHA5120ea13e0dff1c362eeb02f75ebef502a3605f5c381082f05548dfd0213cdc78aa90757876f9bae5348255794645a99eb83a0c72fb27e64d4b1c02d9d0cc1c6b98