Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2025 03:58

General

  • Target

    9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe

  • Size

    952KB

  • MD5

    fa2fda3605fcdbaf69212aa3edb9f0f4

  • SHA1

    f44fde95e3d9915f65fab24f48dcd4eb505a26da

  • SHA256

    9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325

  • SHA512

    019536005222cf19bdcc3c018993e3be36b1149f3b7a27938f65194b59aed6eba256e5949a119c7b90c7fe441b2201b7093e19066821875d81051e1869fccfdd

  • SSDEEP

    24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 8 IoCs
  • Process spawned unexpected child process 8 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 16 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 20 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe
    "C:\Users\Admin\AppData\Local\Temp\9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1600
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HD4QXvbaDY.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1856
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2024
        • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\spoolsv.exe
          "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\spoolsv.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:2952
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\opengl32\lsass.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2816
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2820
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2848
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2456
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\PerfLogs\Admin\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1900
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\slc\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2612
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\vmictimeprovider\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2692
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\w32time\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2232

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\spoolsv.exe

      Filesize

      952KB

      MD5

      407010d9dc0a256d4a4e2f41dae1b195

      SHA1

      cfb447e45d1a2ace502a1ee9b97c5fffdf429a29

      SHA256

      22dc170c714c028466eb9b3296d01098a40404d9c23965c3c34b73ad4eea651b

      SHA512

      d8af702641e57802acbd147b63264a4fb88b423de06648737f15d2c44d946507b362f7d01f89703bf0a683a051b9330281d66a615d5ae015d5d02a9a3f37dbf1

    • C:\PerfLogs\Admin\services.exe

      Filesize

      952KB

      MD5

      fa2fda3605fcdbaf69212aa3edb9f0f4

      SHA1

      f44fde95e3d9915f65fab24f48dcd4eb505a26da

      SHA256

      9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325

      SHA512

      019536005222cf19bdcc3c018993e3be36b1149f3b7a27938f65194b59aed6eba256e5949a119c7b90c7fe441b2201b7093e19066821875d81051e1869fccfdd

    • C:\Users\Admin\AppData\Local\Temp\HD4QXvbaDY.bat

      Filesize

      238B

      MD5

      e6649f3bb960d7a4f60cb827307e8b8a

      SHA1

      9d322d29e740c9ed9e54b8cbbefb393804d87df1

      SHA256

      317247f5a243537526346d4b853d529924134981bf65c9d20efe48cdfdca0b7e

      SHA512

      570b23eec89d11ab7701fc66acf6ddfb3263fd16512acfb424c4f27c4c613b200aa54b2ab2f5cdee45749d6328e1027add70e5e5bd2304cdbe62662c24eb2d71

    • C:\Windows\System32\opengl32\lsass.exe

      Filesize

      952KB

      MD5

      f2c8947ff5715607e60600e8b0c2d7ad

      SHA1

      c09a5e93321967b24db485fe4a87b6441590729a

      SHA256

      90175fbd33e1f3eef46242bb2aa4f171ceb7983b871db09cfbe0cddac578ad2b

      SHA512

      3a63e50ac9107861b1a4c6977b73fc45be104fa41a2bf1f4e2ae2c92ec3076bc45b494abd023da20c20b70b83dc889bba051ffe1fa8a5b49b426c7928462ebe7

    • C:\Windows\System32\slc\lsm.exe

      Filesize

      952KB

      MD5

      b053902810ab42b3631cc5cb29d08d6d

      SHA1

      b593b5aeb34a5ccd509c5bdf98efe504cadb8cf8

      SHA256

      65c07063323f35d608f92aa46c26871155f64bd930836741c6d8c022a8deee1d

      SHA512

      c531b2eea5e6446d25e7d1f755c5eac82ebfd21444a81e59a37a0b1f89ceec8e2960b0164b7ce957b9f7acdfbf6b1a213b07670b57c88dd8bb62f749bcbf1f31

    • memory/1600-4-0x00000000002F0000-0x0000000000300000-memory.dmp

      Filesize

      64KB

    • memory/1600-6-0x0000000000550000-0x000000000055C000-memory.dmp

      Filesize

      48KB

    • memory/1600-7-0x0000000000570000-0x000000000057A000-memory.dmp

      Filesize

      40KB

    • memory/1600-8-0x0000000000330000-0x0000000000338000-memory.dmp

      Filesize

      32KB

    • memory/1600-9-0x00000000002E0000-0x00000000002EA000-memory.dmp

      Filesize

      40KB

    • memory/1600-10-0x0000000000310000-0x000000000031C000-memory.dmp

      Filesize

      48KB

    • memory/1600-11-0x0000000000B80000-0x0000000000B8C000-memory.dmp

      Filesize

      48KB

    • memory/1600-5-0x0000000000320000-0x000000000032A000-memory.dmp

      Filesize

      40KB

    • memory/1600-0-0x000007FEF5F83000-0x000007FEF5F84000-memory.dmp

      Filesize

      4KB

    • memory/1600-3-0x00000000002D0000-0x00000000002E0000-memory.dmp

      Filesize

      64KB

    • memory/1600-2-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

      Filesize

      9.9MB

    • memory/1600-128-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

      Filesize

      9.9MB

    • memory/1600-1-0x00000000012C0000-0x00000000013B4000-memory.dmp

      Filesize

      976KB

    • memory/2952-132-0x0000000000020000-0x0000000000114000-memory.dmp

      Filesize

      976KB