Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 17:45

General

  • Target

    063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe

  • Size

    952KB

  • MD5

    7146d0c354a5ffc4f39db58415c14022

  • SHA1

    2aa91a6ae46fd1fb956e6c8efda7251025b6a90e

  • SHA256

    063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f

  • SHA512

    b1b799f42e04443097b7f94ee4273377fcad228cfde8e1a0ffbc2e28427a8ebd4e804be0bdafc3e40122dee2a19ac2f4baccd054dbe90b5609b1c945f2719fcf

  • SSDEEP

    24576:u+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXXL:p8/KfRTKZ

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 10 IoCs
  • Process spawned unexpected child process 10 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 9 IoCs
  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 20 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops file in System32 directory 21 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe
    "C:\Users\Admin\AppData\Local\Temp\063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3204
    • C:\Users\Admin\AppData\Local\Temp\063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe
      "C:\Users\Admin\AppData\Local\Temp\063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1768
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qjl4IATUsv.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:688
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          4⤵
            PID:1280
          • C:\Windows\System32\Windows.Media.Renewal\RuntimeBroker.exe
            "C:\Windows\System32\Windows.Media.Renewal\RuntimeBroker.exe"
            4⤵
            • UAC bypass
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of AdjustPrivilegeToken
            • System policy modification
            PID:3688
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\PickerPlatform\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4420
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Windows\System32\wbem\cimwin32\unsecapp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2144
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\kbdnecat\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1892
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Users\Default User\backgroundTaskHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:5056
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\Windows.Media.Renewal\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:116
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\unsecapp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1868
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\bootstat\sysmon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:392
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3256
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System32\PeerDistWSDDiscoProv\fontdrvhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2848
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Documents and Settings\unsecapp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4088

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe.log

      Filesize

      1KB

      MD5

      7f3c0ae41f0d9ae10a8985a2c327b8fb

      SHA1

      d58622bf6b5071beacf3b35bb505bde2000983e3

      SHA256

      519fceae4d0dd4d09edd1b81bcdfa8aeab4b59eee77a4cd4b6295ce8e591a900

      SHA512

      8a8fd17eef071f86e672cba0d8fc2cfed6118aff816100b9d7c06eb96443c04c04bc5692259c8d7ecb1563e877921939c61726605af4f969e3f586f0913ed125

    • C:\Users\Admin\AppData\Local\Temp\063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe

      Filesize

      952KB

      MD5

      7146d0c354a5ffc4f39db58415c14022

      SHA1

      2aa91a6ae46fd1fb956e6c8efda7251025b6a90e

      SHA256

      063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f

      SHA512

      b1b799f42e04443097b7f94ee4273377fcad228cfde8e1a0ffbc2e28427a8ebd4e804be0bdafc3e40122dee2a19ac2f4baccd054dbe90b5609b1c945f2719fcf

    • C:\Users\Admin\AppData\Local\Temp\RCX8202.tmp

      Filesize

      952KB

      MD5

      2441dd3f0b62cd42f120a14c333cb3f0

      SHA1

      77cf4605fddd9e854039648c028810a04c43427b

      SHA256

      fe78f6e2b4e88176dab282d4b56de4d8038f497a11f2ffcc49c3d33149309707

      SHA512

      4ab200a53e2b58b2ee95ba9808f720683ec55d8b9449f21a044bd804925653dde29019c91f64178f91b9caec5ef5bbf0ebf8a35ab2a937780da7e6af2d9a4b48

    • C:\Users\Admin\AppData\Local\Temp\qjl4IATUsv.bat

      Filesize

      223B

      MD5

      b49c08acfd0a4102ce7e8859a194415e

      SHA1

      473c6f190dbfb00ab6f95f11727f09672a032d7a

      SHA256

      9ba9a6da69de6300d47f054bd9dd6704328e3232da19a24277f76a725f44fe34

      SHA512

      13f9a3f9010d230e9cdcda976259a609013ec6975529037e1193696d1a75976f895a2c58631dbe776020414a6b0b2bd5b1b0aadf2bab09c5375ca229bc21cece

    • C:\Users\Default\backgroundTaskHost.exe

      Filesize

      952KB

      MD5

      f648013ad7d098be7d0408d410ea65d3

      SHA1

      959479781df1a743156d38c73769a5c90900cc13

      SHA256

      5f3a86c125193c87ff835ad16432a591bed76280ff6d6805f584c263e4c13997

      SHA512

      2b46bbe17e9576f3b5bdcb40a0957e5ae296dc9043262ad57b12500de5d3ad778bfefdfd6d5ad4b7e56694fea24142a56e511137adccadaa62df26e17e26eb86

    • C:\Windows\System32\kbdnecat\winlogon.exe

      Filesize

      952KB

      MD5

      ba34a1933f3aaa8631e63a6ae1b8172b

      SHA1

      e8f03f6900cb6495407b4091f8bc0d296de5e3bc

      SHA256

      f764028deeb198a16fdf37b29bf90f564a7a8b720e3b568801ceab048d639606

      SHA512

      07e271e8da857d1e0c8a99f1d83269b8d84ec483131bd826a8e8ea3b8c6f9e5fcbec4e1dbedbb43482777c5c068482cdb0e67fe7ee4de9d4e926cfd516d4df4e

    • C:\Windows\System32\wbem\cimwin32\unsecapp.exe

      Filesize

      952KB

      MD5

      af11667ce20efe37bfcf1c9c495ddcff

      SHA1

      f2c1248eb9382f495061b4ef83fb9cf4c7eed534

      SHA256

      0209928938dcc3ce877ad67707ff250f6aa06e1f0a6e172e528794a7d238022e

      SHA512

      bf2542440260307fef499abbe3ffec7b1f0fdd721c40370eeb5df101e6f2462d82368138b849a2fd75dfe889c6d604f3b65439fda1e1138ff6a54c4420068058

    • memory/3204-5-0x0000000000CF0000-0x0000000000CFA000-memory.dmp

      Filesize

      40KB

    • memory/3204-9-0x0000000002800000-0x000000000280A000-memory.dmp

      Filesize

      40KB

    • memory/3204-10-0x0000000002810000-0x000000000281C000-memory.dmp

      Filesize

      48KB

    • memory/3204-11-0x0000000002820000-0x000000000282C000-memory.dmp

      Filesize

      48KB

    • memory/3204-8-0x0000000000D20000-0x0000000000D28000-memory.dmp

      Filesize

      32KB

    • memory/3204-7-0x0000000000CE0000-0x0000000000CEA000-memory.dmp

      Filesize

      40KB

    • memory/3204-6-0x0000000000CC0000-0x0000000000CCC000-memory.dmp

      Filesize

      48KB

    • memory/3204-0-0x00007FFD6F323000-0x00007FFD6F325000-memory.dmp

      Filesize

      8KB

    • memory/3204-4-0x0000000000CD0000-0x0000000000CE0000-memory.dmp

      Filesize

      64KB

    • memory/3204-3-0x00007FFD6F320000-0x00007FFD6FDE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3204-73-0x00007FFD6F320000-0x00007FFD6FDE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3204-2-0x0000000000CB0000-0x0000000000CC0000-memory.dmp

      Filesize

      64KB

    • memory/3204-1-0x0000000000400000-0x00000000004F4000-memory.dmp

      Filesize

      976KB