Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 03:34
Behavioral task
behavioral1
Sample
4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe
Resource
win10v2004-20241007-en
General
-
Target
4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe
-
Size
826KB
-
MD5
d0cd2568bf153709f5ed4491bd8534ab
-
SHA1
070e2b33bd4e51417eb1ac74301f25afb35d7ec2
-
SHA256
4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798
-
SHA512
0ea13e0dff1c362eeb02f75ebef502a3605f5c381082f05548dfd0213cdc78aa90757876f9bae5348255794645a99eb83a0c72fb27e64d4b1c02d9d0cc1c6b98
-
SSDEEP
12288:82NE1Iv7VIWfLEcNif4F4aJHIi4ENQj0SeyZIZOJ59bsAzeA7:e1aV9fLofI4aVNYGZ059bNyI
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 24 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4104 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3252 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2368 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4460 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1816 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1752 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2832 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4192 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2092 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2664 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3604 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1804 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 748 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5100 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 948 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1224 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 532 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1824 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3000 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3188 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3388 4948 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 220 4948 schtasks.exe 82 -
resource yara_rule behavioral2/memory/2840-1-0x00000000009D0000-0x0000000000AA6000-memory.dmp dcrat behavioral2/files/0x0008000000023bc7-11.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 fontdrvhost.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Portable Devices\Registry.exe 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe File created C:\Program Files\WindowsPowerShell\sihost.exe 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\121e5b5079f7c0 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe File created C:\Program Files (x86)\Windows Portable Devices\Registry.exe 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe File created C:\Program Files (x86)\Windows Portable Devices\ee2ad38f3d4382 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\fontdrvhost.exe 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\5b884080fd4f94 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe File created C:\Program Files\WindowsPowerShell\66fc9ff0ee96c2 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\sysmon.exe 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\twain_32\System.exe 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe File created C:\Windows\twain_32\27d1bcfc3c54e0 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 24 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1804 schtasks.exe 948 schtasks.exe 3252 schtasks.exe 2368 schtasks.exe 4460 schtasks.exe 4192 schtasks.exe 5100 schtasks.exe 1224 schtasks.exe 1824 schtasks.exe 3000 schtasks.exe 2220 schtasks.exe 1816 schtasks.exe 2664 schtasks.exe 3604 schtasks.exe 3188 schtasks.exe 2904 schtasks.exe 748 schtasks.exe 220 schtasks.exe 532 schtasks.exe 3388 schtasks.exe 4104 schtasks.exe 1752 schtasks.exe 2832 schtasks.exe 2092 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2840 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe 2840 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe 2840 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe 2840 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe 2840 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe 2840 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe 2840 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe 3060 fontdrvhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2840 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe Token: SeDebugPrivilege 3060 fontdrvhost.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2840 wrote to memory of 3060 2840 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe 107 PID 2840 wrote to memory of 3060 2840 4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe"C:\Users\Admin\AppData\Local\Temp\4d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Windows NT\Accessories\en-US\fontdrvhost.exe"C:\Program Files (x86)\Windows NT\Accessories\en-US\fontdrvhost.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Portable Devices\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Portable Devices\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Windows\twain_32\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\twain_32\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Windows\twain_32\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Program Files\WindowsPowerShell\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 6 /tr "'C:\Program Files\WindowsPowerShell\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Documents\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\All Users\Documents\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Documents\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Common Files\Microsoft Shared\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Microsoft Shared\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Common Files\Microsoft Shared\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD5d0cd2568bf153709f5ed4491bd8534ab
SHA1070e2b33bd4e51417eb1ac74301f25afb35d7ec2
SHA2564d77c973871f6870b7adb2703dcfa7d1941d12aaf6ad761f0d7cdd94092db798
SHA5120ea13e0dff1c362eeb02f75ebef502a3605f5c381082f05548dfd0213cdc78aa90757876f9bae5348255794645a99eb83a0c72fb27e64d4b1c02d9d0cc1c6b98