Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 03:56
Behavioral task
behavioral1
Sample
1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe
Resource
win10v2004-20241007-en
General
-
Target
1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe
-
Size
828KB
-
MD5
46ab1dde1bac98a34cb41166f659db27
-
SHA1
f12b50ad32d9290d977322c7fb9594ac54d7b64a
-
SHA256
1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19
-
SHA512
4890f12e5fbd6f928936ccc2e2cd67414e339d4f2058b84a5cee73ad7600bc2dc5bf0368581781c047620abfa4df9e3fddcb9185f88222d574d6503f67d897b9
-
SSDEEP
12288:gF+JPdVQB7gH+F44vYVYJ21H3z2oLtubNUPX08fab:gFcVU7gG44vYVH1H/obyCb
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2632 2768 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1108 2768 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2664 2768 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 2768 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2728 2768 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2320 2768 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2660 2768 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 588 2768 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 792 2768 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1000 2768 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1432 2768 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2596 2768 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2224 2768 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2160 2768 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2056 2768 schtasks.exe 30 -
resource yara_rule behavioral1/memory/2816-1-0x0000000000170000-0x0000000000246000-memory.dmp dcrat behavioral1/files/0x00050000000194bd-11.dat dcrat behavioral1/memory/1572-21-0x00000000011E0000-0x00000000012B6000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 1572 csrss.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\MSBuild\c5b4cb5e9653cc 1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe File created C:\Program Files\MSBuild\services.exe 1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2160 schtasks.exe 2628 schtasks.exe 2320 schtasks.exe 2596 schtasks.exe 2632 schtasks.exe 2056 schtasks.exe 588 schtasks.exe 1432 schtasks.exe 2224 schtasks.exe 2660 schtasks.exe 792 schtasks.exe 1000 schtasks.exe 1108 schtasks.exe 2664 schtasks.exe 2728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2816 1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe 1572 csrss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2816 1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe Token: SeDebugPrivilege 1572 csrss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2140 2816 1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe 46 PID 2816 wrote to memory of 2140 2816 1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe 46 PID 2816 wrote to memory of 2140 2816 1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe 46 PID 2140 wrote to memory of 1976 2140 cmd.exe 48 PID 2140 wrote to memory of 1976 2140 cmd.exe 48 PID 2140 wrote to memory of 1976 2140 cmd.exe 48 PID 2140 wrote to memory of 1572 2140 cmd.exe 49 PID 2140 wrote to memory of 1572 2140 cmd.exe 49 PID 2140 wrote to memory of 1572 2140 cmd.exe 49 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe"C:\Users\Admin\AppData\Local\Temp\1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Lvqyh5QgiF.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1976
-
-
C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe"C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Program Files\MSBuild\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\MSBuild\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\Program Files\MSBuild\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c191" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c191" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\MSOCache\All Users\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD546ab1dde1bac98a34cb41166f659db27
SHA1f12b50ad32d9290d977322c7fb9594ac54d7b64a
SHA2561c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19
SHA5124890f12e5fbd6f928936ccc2e2cd67414e339d4f2058b84a5cee73ad7600bc2dc5bf0368581781c047620abfa4df9e3fddcb9185f88222d574d6503f67d897b9
-
Filesize
223B
MD5eec589dab331105f5e1c96375d3535fb
SHA1bd613af1bca9e3f5cf1d45fef4c923a16eb03e2e
SHA256d267be656ae168c30b890e1c78afb3d16af218ab52f7e43ddd28d3d06c58f558
SHA51270835d09e38eb6355ed7685af4a8eca67ddf68d9349df0b5dcf95d04b79095b1ff1dfb0c62745a5a4eef28e2906b575a90ec312472d1e37e086b99a5552ba47b