Analysis

  • max time kernel
    93s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2025 06:50

General

  • Target

    786ef385538288e14f110e576ccdbd9ca40b6305d7fb80760c99f8e1a0750216N.exe

  • Size

    2.0MB

  • MD5

    d0a2079bcfdad884762f8283dcc3eb50

  • SHA1

    2f7c0d9d5c8a185e2fff72ecec2ffd8ff33ca845

  • SHA256

    786ef385538288e14f110e576ccdbd9ca40b6305d7fb80760c99f8e1a0750216

  • SHA512

    0db54130b2b33374e3ad742b3f8eed7cd762a31521b4c39c19e12b2d606deb3a8113c347c54f0a41f90d544a1f01e666d6c64a3fbbeb60a42eb27e466e9382ea

  • SSDEEP

    24576:YIWvTgWtxIEUy/N3VfEj2kiGJrgnhU66dtZyXSt1Q65bNAJO4f6/NJmlEUDAS9gd:YIWTxhVG7ohU665Y0JbNm8mkjYLy

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\786ef385538288e14f110e576ccdbd9ca40b6305d7fb80760c99f8e1a0750216N.exe
    "C:\Users\Admin\AppData\Local\Temp\786ef385538288e14f110e576ccdbd9ca40b6305d7fb80760c99f8e1a0750216N.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\sBjW37MCxC.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5044
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2420
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          3⤵
            PID:1876
          • C:\Recovery\WindowsRE\upfc.exe
            "C:\Recovery\WindowsRE\upfc.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2836
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Application Data\fontdrvhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2076
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\Admin\Application Data\fontdrvhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1496
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Application Data\fontdrvhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1128
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3204
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1408
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1296
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4160
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1264
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3684
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Windows\SystemResources\Windows.UI.BlockedShutdown\pris\csrss.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2132
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\SystemResources\Windows.UI.BlockedShutdown\pris\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1488
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Windows\SystemResources\Windows.UI.BlockedShutdown\pris\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3224
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:548
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2712
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3228
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "786ef385538288e14f110e576ccdbd9ca40b6305d7fb80760c99f8e1a0750216N7" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\AppData\Local\Temp\786ef385538288e14f110e576ccdbd9ca40b6305d7fb80760c99f8e1a0750216N.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4444
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "786ef385538288e14f110e576ccdbd9ca40b6305d7fb80760c99f8e1a0750216N" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\786ef385538288e14f110e576ccdbd9ca40b6305d7fb80760c99f8e1a0750216N.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4640
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "786ef385538288e14f110e576ccdbd9ca40b6305d7fb80760c99f8e1a0750216N7" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\AppData\Local\Temp\786ef385538288e14f110e576ccdbd9ca40b6305d7fb80760c99f8e1a0750216N.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1560

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\sBjW37MCxC.bat

        Filesize

        206B

        MD5

        bbbcb67f982b223661a063f50facc069

        SHA1

        fa422178715ec0afbd32cf1f5b00cd972d5d46a4

        SHA256

        3ab2e3f9c25ed5cc6538f19c67969ca31522394db093c8794b7a2a3021e507d5

        SHA512

        bb027ddd31458b0b4b3966365e81e9ed0912de97c710ea1089ed28e6e8c91774565346dfdb527a0cba6498ee545da4d5f8b9ae6d424d4d6f40bc54ec0ae697f8

      • C:\Users\Admin\AppData\Roaming\fontdrvhost.exe

        Filesize

        2.0MB

        MD5

        d0a2079bcfdad884762f8283dcc3eb50

        SHA1

        2f7c0d9d5c8a185e2fff72ecec2ffd8ff33ca845

        SHA256

        786ef385538288e14f110e576ccdbd9ca40b6305d7fb80760c99f8e1a0750216

        SHA512

        0db54130b2b33374e3ad742b3f8eed7cd762a31521b4c39c19e12b2d606deb3a8113c347c54f0a41f90d544a1f01e666d6c64a3fbbeb60a42eb27e466e9382ea

      • memory/1732-11-0x000000001BCA0000-0x000000001BCF0000-memory.dmp

        Filesize

        320KB

      • memory/1732-19-0x000000001BB50000-0x000000001BB5C000-memory.dmp

        Filesize

        48KB

      • memory/1732-4-0x00007FFEFB170000-0x00007FFEFBC31000-memory.dmp

        Filesize

        10.8MB

      • memory/1732-6-0x0000000002FB0000-0x0000000002FBE000-memory.dmp

        Filesize

        56KB

      • memory/1732-7-0x00007FFEFB170000-0x00007FFEFBC31000-memory.dmp

        Filesize

        10.8MB

      • memory/1732-8-0x00007FFEFB170000-0x00007FFEFBC31000-memory.dmp

        Filesize

        10.8MB

      • memory/1732-10-0x000000001BB10000-0x000000001BB2C000-memory.dmp

        Filesize

        112KB

      • memory/1732-13-0x000000001BB30000-0x000000001BB48000-memory.dmp

        Filesize

        96KB

      • memory/1732-0-0x00007FFEFB173000-0x00007FFEFB175000-memory.dmp

        Filesize

        8KB

      • memory/1732-15-0x000000001BAF0000-0x000000001BAFE000-memory.dmp

        Filesize

        56KB

      • memory/1732-17-0x000000001BB00000-0x000000001BB0E000-memory.dmp

        Filesize

        56KB

      • memory/1732-3-0x00007FFEFB170000-0x00007FFEFBC31000-memory.dmp

        Filesize

        10.8MB

      • memory/1732-23-0x000000001BB70000-0x000000001BB7C000-memory.dmp

        Filesize

        48KB

      • memory/1732-21-0x000000001BB60000-0x000000001BB6C000-memory.dmp

        Filesize

        48KB

      • memory/1732-24-0x00007FFEFB170000-0x00007FFEFBC31000-memory.dmp

        Filesize

        10.8MB

      • memory/1732-25-0x00007FFEFB170000-0x00007FFEFBC31000-memory.dmp

        Filesize

        10.8MB

      • memory/1732-2-0x00007FFEFB170000-0x00007FFEFBC31000-memory.dmp

        Filesize

        10.8MB

      • memory/1732-40-0x00007FFEFB170000-0x00007FFEFBC31000-memory.dmp

        Filesize

        10.8MB

      • memory/1732-44-0x00007FFEFB170000-0x00007FFEFBC31000-memory.dmp

        Filesize

        10.8MB

      • memory/1732-43-0x00007FFEFB170000-0x00007FFEFBC31000-memory.dmp

        Filesize

        10.8MB

      • memory/1732-1-0x0000000000CE0000-0x0000000000EDE000-memory.dmp

        Filesize

        2.0MB