Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 07:39

General

  • Target

    4d68ce61047c125e3537ec992fd0a6a156bf64f21aa1c55c909aedf5871fe2cd.exe

  • Size

    952KB

  • MD5

    0ebb2d19c8a22a1a31f2088164233d7c

  • SHA1

    ba880d1df17a566198ed16f91ae16126c9103a40

  • SHA256

    4d68ce61047c125e3537ec992fd0a6a156bf64f21aa1c55c909aedf5871fe2cd

  • SHA512

    373f71389e03747a73ef5d02ba998cea4f60eb718af44bce83def2395c1fbcaf99bacf78b9fc79eea9c24018a81864a17cfb81bbe8462d8eb9e6b4874b56fdb5

  • SSDEEP

    24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXXu:R8/KfRTKM

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 7 IoCs
  • Process spawned unexpected child process 7 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 14 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d68ce61047c125e3537ec992fd0a6a156bf64f21aa1c55c909aedf5871fe2cd.exe
    "C:\Users\Admin\AppData\Local\Temp\4d68ce61047c125e3537ec992fd0a6a156bf64f21aa1c55c909aedf5871fe2cd.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4540
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ilOB9Tu5Go.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3400
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:716
        • C:\Program Files (x86)\Windows Defender\de-DE\sysmon.exe
          "C:\Program Files (x86)\Windows Defender\de-DE\sysmon.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:2800
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\rasctrnm\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2180
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "4d68ce61047c125e3537ec992fd0a6a156bf64f21aa1c55c909aedf5871fe2cd" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\4d68ce61047c125e3537ec992fd0a6a156bf64f21aa1c55c909aedf5871fe2cd\4d68ce61047c125e3537ec992fd0a6a156bf64f21aa1c55c909aedf5871fe2cd.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2072
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Windows\Help\StartMenuExperienceHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4680
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1420
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\KBDHE319\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1384
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\de-DE\sysmon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:860
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\LayoutData\TextInputHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2016

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\WindowsRE\sihost.exe

      Filesize

      952KB

      MD5

      4256fda7bed26605c60f28335a714096

      SHA1

      4f4c26749baf00d1d8fde547cfa4100e484fe7dd

      SHA256

      205bc7fc7496b9e0f70d947667f4a5bf5914f49b1fb4965bf346dc444654fd77

      SHA512

      938e16a26d058126fd823e83ce754544184cd41fdc0efd28b6b42d6e5e838cc4f26e4d753e92b7eb38811bc5c75cf0b79ed8530e73c21afc40a61e28ccd217b8

    • C:\Users\Admin\AppData\Local\Temp\ilOB9Tu5Go.bat

      Filesize

      220B

      MD5

      8b580aff4d5be2142e8b5fb177c53f71

      SHA1

      9dc140ad24d791e038444e914ca386728307372d

      SHA256

      571bddadb32ba8a58c51c86e8f9f57cba7e18ca8c9f44f368e13ca5e70a43b3e

      SHA512

      2a1c343c7588004e5f108d0078abaebaa8d4ddd0cfc51b3f4eab2bbdb552cc3bfef11a6ae6c35e05aabdfa9e98370c9ecc7dbbacd809be7e1564935877663f77

    • C:\Windows\Help\StartMenuExperienceHost.exe

      Filesize

      952KB

      MD5

      4df3330c11e876ef5a05f31f5ec36546

      SHA1

      2795194026ed2a95194110bc321a0ba7501664df

      SHA256

      9509dfb6da2ec42ee77d42bcc44d139894ff04fbefcac7929c1e67e9ff356979

      SHA512

      d2bdfed427f7c4be4d0a1c393ff67f535952d54232eb94e4d1dae176d6beb8916942f033132a8084833a3c8c8d8bf27a8626d5e21c9afd565ce673598172a776

    • C:\Windows\System32\KBDHE319\RuntimeBroker.exe

      Filesize

      952KB

      MD5

      0ebb2d19c8a22a1a31f2088164233d7c

      SHA1

      ba880d1df17a566198ed16f91ae16126c9103a40

      SHA256

      4d68ce61047c125e3537ec992fd0a6a156bf64f21aa1c55c909aedf5871fe2cd

      SHA512

      373f71389e03747a73ef5d02ba998cea4f60eb718af44bce83def2395c1fbcaf99bacf78b9fc79eea9c24018a81864a17cfb81bbe8462d8eb9e6b4874b56fdb5

    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\LayoutData\TextInputHost.exe

      Filesize

      952KB

      MD5

      9bd7823204e9cd5a095770ac82690ec7

      SHA1

      7440942692e8dba08e3da3347b219d6e64e8c0c2

      SHA256

      a1ba0cb8ea52d24d5a26310579b71fb850cc9107a1dac3d83d557a00d7b180cf

      SHA512

      b6886ede4a1a677847ac76e93f7a2b9e26239b66ba9eb5f93b7ebd818ec66def9c49c406baf1b7dbdd414d12e7152828a21a31a7f7ddbb89f3496eafd8fd6393

    • memory/4540-4-0x0000000002800000-0x0000000002810000-memory.dmp

      Filesize

      64KB

    • memory/4540-7-0x0000000002810000-0x000000000281A000-memory.dmp

      Filesize

      40KB

    • memory/4540-5-0x00000000027E0000-0x00000000027EA000-memory.dmp

      Filesize

      40KB

    • memory/4540-10-0x0000000002970000-0x000000000297C000-memory.dmp

      Filesize

      48KB

    • memory/4540-9-0x0000000002960000-0x000000000296A000-memory.dmp

      Filesize

      40KB

    • memory/4540-11-0x00000000029E0000-0x00000000029EC000-memory.dmp

      Filesize

      48KB

    • memory/4540-8-0x0000000002950000-0x0000000002958000-memory.dmp

      Filesize

      32KB

    • memory/4540-6-0x00000000029C0000-0x00000000029CC000-memory.dmp

      Filesize

      48KB

    • memory/4540-0-0x00007FFCA1993000-0x00007FFCA1995000-memory.dmp

      Filesize

      8KB

    • memory/4540-3-0x00000000027D0000-0x00000000027E0000-memory.dmp

      Filesize

      64KB

    • memory/4540-2-0x00007FFCA1990000-0x00007FFCA2451000-memory.dmp

      Filesize

      10.8MB

    • memory/4540-117-0x00007FFCA1990000-0x00007FFCA2451000-memory.dmp

      Filesize

      10.8MB

    • memory/4540-1-0x0000000000580000-0x0000000000674000-memory.dmp

      Filesize

      976KB