Analysis

  • max time kernel
    94s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 03:58

General

  • Target

    9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe

  • Size

    952KB

  • MD5

    fa2fda3605fcdbaf69212aa3edb9f0f4

  • SHA1

    f44fde95e3d9915f65fab24f48dcd4eb505a26da

  • SHA256

    9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325

  • SHA512

    019536005222cf19bdcc3c018993e3be36b1149f3b7a27938f65194b59aed6eba256e5949a119c7b90c7fe441b2201b7093e19066821875d81051e1869fccfdd

  • SSDEEP

    24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 8 IoCs
  • Process spawned unexpected child process 8 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 16 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 20 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe
    "C:\Users\Admin\AppData\Local\Temp\9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:916
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LUotzgml9v.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:628
        • C:\Program Files (x86)\Mozilla Maintenance Service\logs\RuntimeBroker.exe
          "C:\Program Files (x86)\Mozilla Maintenance Service\logs\RuntimeBroker.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:1056
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.CppWinrt\SearchApp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3860
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3744
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\tier2punctuations\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:684
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\ApplicationFrame\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3596
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System32\AppVStreamingUX\fontdrvhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2364
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\System32\tcblaunch\SppExtComObj.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4504
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:620
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.ProxyStub\SearchApp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1936

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\LUotzgml9v.bat

      Filesize

      237B

      MD5

      e526d21df15bc2f18c056eb634f4e8c5

      SHA1

      86fa6e9ca67d3a412fffc1f23346d96507141dd7

      SHA256

      9c511923567b250c735d7bfef8d946f966ae01d32d9bdedb80bab78fddd2af89

      SHA512

      6d3f53c3b9534bccfe69feb5b4e159f9bcd83f8783a7b9520669b12785413d7505d04d0b3c47fd648a4b5f04b56811615077e92ddf9b4a5e633f1d37d7c5441c

    • C:\Windows\System32\AppVStreamingUX\fontdrvhost.exe

      Filesize

      952KB

      MD5

      fa2fda3605fcdbaf69212aa3edb9f0f4

      SHA1

      f44fde95e3d9915f65fab24f48dcd4eb505a26da

      SHA256

      9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325

      SHA512

      019536005222cf19bdcc3c018993e3be36b1149f3b7a27938f65194b59aed6eba256e5949a119c7b90c7fe441b2201b7093e19066821875d81051e1869fccfdd

    • C:\Windows\System32\ApplicationFrame\RuntimeBroker.exe

      Filesize

      952KB

      MD5

      c265bfbb4436331de93784a0b581df66

      SHA1

      1f27a85caeedbca30209ae8b090455187c081754

      SHA256

      4d7f244f0d91322d4f8c756f5e18108c966b61cb2748ddcf35f6c3fd1f9d970b

      SHA512

      f29df96486395b9cdc66563ef5a06d1350e67f05391fbf5cffe64b57dd2192ffca6514b15262f13be758b98acff29dd22f6e485d81e290e7fead1cab71c50a32

    • C:\Windows\System32\tier2punctuations\RuntimeBroker.exe

      Filesize

      952KB

      MD5

      5be0542c822d74bad05e8132f1878025

      SHA1

      707d350ed7dcb4caf50c25e93b46c423b5584879

      SHA256

      a4a0af776f0276e10478b1a64f5212b8b01e369193456f5167336a039359dfbe

      SHA512

      67a0a19760bbd4e0ab2460f0b45c2a3e465bca1dcff7d31b35e44faa6f7f8efad64f248bfadcfa19adf0fa81e7db7bd23cb495adbd8d4ca4976908c56410ffc4

    • memory/916-4-0x0000000002900000-0x0000000002910000-memory.dmp

      Filesize

      64KB

    • memory/916-6-0x0000000002920000-0x000000000292C000-memory.dmp

      Filesize

      48KB

    • memory/916-5-0x00000000027B0000-0x00000000027BA000-memory.dmp

      Filesize

      40KB

    • memory/916-7-0x0000000002930000-0x000000000293A000-memory.dmp

      Filesize

      40KB

    • memory/916-8-0x00000000028F0000-0x00000000028F8000-memory.dmp

      Filesize

      32KB

    • memory/916-9-0x0000000002940000-0x000000000294A000-memory.dmp

      Filesize

      40KB

    • memory/916-10-0x0000000002950000-0x000000000295C000-memory.dmp

      Filesize

      48KB

    • memory/916-11-0x000000001B240000-0x000000001B24C000-memory.dmp

      Filesize

      48KB

    • memory/916-0-0x00007FFB0A653000-0x00007FFB0A655000-memory.dmp

      Filesize

      8KB

    • memory/916-3-0x00000000027A0000-0x00000000027B0000-memory.dmp

      Filesize

      64KB

    • memory/916-2-0x00007FFB0A650000-0x00007FFB0B111000-memory.dmp

      Filesize

      10.8MB

    • memory/916-1-0x0000000000650000-0x0000000000744000-memory.dmp

      Filesize

      976KB

    • memory/916-133-0x00007FFB0A650000-0x00007FFB0B111000-memory.dmp

      Filesize

      10.8MB