Analysis

  • max time kernel
    91s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2025 12:43

General

  • Target

    c79981b0074ac288d065d459de654d9b7003f625d76526211805decdaa94f96eN.exe

  • Size

    952KB

  • MD5

    d34faac709c42364e40c0dce2e1d8e30

  • SHA1

    db6740044a2f829a5a0063e3eaf8e21902cf56b3

  • SHA256

    c79981b0074ac288d065d459de654d9b7003f625d76526211805decdaa94f96e

  • SHA512

    093f1046fccad9566a6a5453afaec3f228e59598db69adc9a75665bd94cd81462bc87f392dbb2a59452d78ee8a0f6a0f30088d708bb750005b4c923fcf03403c

  • SSDEEP

    24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 5 IoCs
  • Process spawned unexpected child process 5 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 15 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c79981b0074ac288d065d459de654d9b7003f625d76526211805decdaa94f96eN.exe
    "C:\Users\Admin\AppData\Local\Temp\c79981b0074ac288d065d459de654d9b7003f625d76526211805decdaa94f96eN.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2100
    • C:\PerfLogs\Admin\lsm.exe
      "C:\PerfLogs\Admin\lsm.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:776
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\PerfLogs\Admin\lsm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2836
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\srclient\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1312
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\wmipdskq\WmiPrvSE.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2728
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\ServiceProfiles\NetworkService\Videos\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2560
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\localsec\lsm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\localsec\lsm.exe

    Filesize

    952KB

    MD5

    d34faac709c42364e40c0dce2e1d8e30

    SHA1

    db6740044a2f829a5a0063e3eaf8e21902cf56b3

    SHA256

    c79981b0074ac288d065d459de654d9b7003f625d76526211805decdaa94f96e

    SHA512

    093f1046fccad9566a6a5453afaec3f228e59598db69adc9a75665bd94cd81462bc87f392dbb2a59452d78ee8a0f6a0f30088d708bb750005b4c923fcf03403c

  • C:\Windows\System32\wbem\wmipdskq\WmiPrvSE.exe

    Filesize

    952KB

    MD5

    6de11646e0e83c0675f9f49308aa3b7b

    SHA1

    9bd7f2ab343b647c45879aa990c05ca53de519b0

    SHA256

    6835bf8b6858c7688ff7c393e2de8f82d38a8ad540d10c4483cd3c2a10afa589

    SHA512

    05e9d2cf306c84d8aad15d9d3d407907c33bb2f0446c3aca125c05879ca28191600c5d658fc43e6762fed824dd858f031d0ffe8ee65cada430c3b0e1ca789397

  • memory/776-94-0x0000000000270000-0x0000000000364000-memory.dmp

    Filesize

    976KB

  • memory/2100-4-0x0000000000160000-0x0000000000170000-memory.dmp

    Filesize

    64KB

  • memory/2100-0-0x000007FEF6033000-0x000007FEF6034000-memory.dmp

    Filesize

    4KB

  • memory/2100-5-0x00000000001A0000-0x00000000001AA000-memory.dmp

    Filesize

    40KB

  • memory/2100-6-0x0000000000150000-0x000000000015C000-memory.dmp

    Filesize

    48KB

  • memory/2100-7-0x00000000003B0000-0x00000000003BA000-memory.dmp

    Filesize

    40KB

  • memory/2100-9-0x00000000003C0000-0x00000000003CA000-memory.dmp

    Filesize

    40KB

  • memory/2100-11-0x0000000000170000-0x000000000017C000-memory.dmp

    Filesize

    48KB

  • memory/2100-10-0x0000000000570000-0x000000000057C000-memory.dmp

    Filesize

    48KB

  • memory/2100-8-0x0000000000190000-0x0000000000198000-memory.dmp

    Filesize

    32KB

  • memory/2100-3-0x0000000000140000-0x0000000000150000-memory.dmp

    Filesize

    64KB

  • memory/2100-2-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2100-93-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2100-1-0x0000000000A50000-0x0000000000B44000-memory.dmp

    Filesize

    976KB