Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 21:07
Behavioral task
behavioral1
Sample
321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe
Resource
win10v2004-20241007-en
General
-
Target
321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe
-
Size
952KB
-
MD5
67bc5be56b004a9b0b0e0f4cf3943591
-
SHA1
ac567e17856fd4b06290d6383472b15b93175cc1
-
SHA256
321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3
-
SHA512
0c0699650cbd2d9ecbb8d607df7deef51078a7bd8fa31e28fe86a16dbfc3c72322ca16f8109b33f0c7d84878b37e6dcc49be9320a2281883cef8c43c361dec2a
-
SSDEEP
24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\sysprepMCE\\lsm.exe\", \"C:\\Windows\\System32\\powrprof\\spoolsv.exe\", \"C:\\Documents and Settings\\csrss.exe\", \"C:\\Windows\\System32\\accessibilitycpl\\smss.exe\", \"C:\\Windows\\System32\\QUTIL\\csrss.exe\"" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\sysprepMCE\\lsm.exe\"" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\sysprepMCE\\lsm.exe\", \"C:\\Windows\\System32\\powrprof\\spoolsv.exe\"" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\sysprepMCE\\lsm.exe\", \"C:\\Windows\\System32\\powrprof\\spoolsv.exe\", \"C:\\Documents and Settings\\csrss.exe\"" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\sysprepMCE\\lsm.exe\", \"C:\\Windows\\System32\\powrprof\\spoolsv.exe\", \"C:\\Documents and Settings\\csrss.exe\", \"C:\\Windows\\System32\\accessibilitycpl\\smss.exe\"" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe -
Process spawned unexpected child process 5 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2756 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2908 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2808 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 2844 schtasks.exe 30 -
UAC bypass 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" spoolsv.exe -
resource yara_rule behavioral1/memory/1680-1-0x0000000000880000-0x0000000000974000-memory.dmp dcrat behavioral1/files/0x0005000000019441-20.dat dcrat behavioral1/files/0x000d0000000173fb-59.dat dcrat behavioral1/memory/1332-94-0x0000000000DF0000-0x0000000000EE4000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 1332 spoolsv.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\System32\\powrprof\\spoolsv.exe\"" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\System32\\powrprof\\spoolsv.exe\"" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Documents and Settings\\csrss.exe\"" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\System32\\accessibilitycpl\\smss.exe\"" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\QUTIL\\csrss.exe\"" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\System32\\sysprepMCE\\lsm.exe\"" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\System32\\sysprepMCE\\lsm.exe\"" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\QUTIL\\csrss.exe\"" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Documents and Settings\\csrss.exe\"" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\System32\\accessibilitycpl\\smss.exe\"" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe -
Checks whether UAC is enabled 1 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" spoolsv.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File opened for modification C:\Windows\System32\sysprepMCE\lsm.exe 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File created C:\Windows\System32\sysprepMCE\101b941d020240259ca4912829b53995ad543df6 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File created C:\Windows\System32\accessibilitycpl\69ddcba757bf72f7d36c464c71f42baab150b2b9 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File created C:\Windows\System32\QUTIL\csrss.exe 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File created C:\Windows\System32\QUTIL\886983d96e3d3e31032c679b2d4ea91b6c05afef 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File opened for modification C:\Windows\System32\QUTIL\RCXA1D6.tmp 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File opened for modification C:\Windows\System32\sysprepMCE\RCX98E8.tmp 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File opened for modification C:\Windows\System32\powrprof\RCX9AED.tmp 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File opened for modification C:\Windows\System32\accessibilitycpl\RCX9F63.tmp 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File opened for modification C:\Windows\System32\QUTIL\csrss.exe 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File created C:\Windows\System32\sysprepMCE\lsm.exe 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File created C:\Windows\System32\accessibilitycpl\smss.exe 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File opened for modification C:\Windows\System32\sysprepMCE\RCX98E7.tmp 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File opened for modification C:\Windows\System32\accessibilitycpl\RCX9F64.tmp 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File created C:\Windows\System32\powrprof\spoolsv.exe 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File created C:\Windows\System32\powrprof\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File opened for modification C:\Windows\System32\powrprof\RCX9AEC.tmp 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File opened for modification C:\Windows\System32\powrprof\spoolsv.exe 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File opened for modification C:\Windows\System32\accessibilitycpl\smss.exe 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe File opened for modification C:\Windows\System32\QUTIL\RCXA1D5.tmp 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2616 schtasks.exe 2756 schtasks.exe 2908 schtasks.exe 2808 schtasks.exe 2776 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1680 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1680 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Token: SeDebugPrivilege 1332 spoolsv.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2368 1680 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe 36 PID 1680 wrote to memory of 2368 1680 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe 36 PID 1680 wrote to memory of 2368 1680 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe 36 PID 2368 wrote to memory of 1716 2368 cmd.exe 38 PID 2368 wrote to memory of 1716 2368 cmd.exe 38 PID 2368 wrote to memory of 1716 2368 cmd.exe 38 PID 2368 wrote to memory of 1332 2368 cmd.exe 39 PID 2368 wrote to memory of 1332 2368 cmd.exe 39 PID 2368 wrote to memory of 1332 2368 cmd.exe 39 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" spoolsv.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe"C:\Users\Admin\AppData\Local\Temp\321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1680 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6DzDemiKWR.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1716
-
-
C:\Windows\System32\powrprof\spoolsv.exe"C:\Windows\System32\powrprof\spoolsv.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1332
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\sysprepMCE\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\powrprof\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Documents and Settings\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\accessibilitycpl\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\QUTIL\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2616
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204B
MD55ef9b610e57ea5bdafa5e4744a1b9246
SHA15c62005943ca49f82cacb1dec8e8c497c162f7b8
SHA2563b3f5fa5dc6fdfbc442349b8b8766237800ca90c1eaecf5b091ff0389229152c
SHA512453272da5afcce73648c47eed41a837553790d9440239bfdcb5a3c64dcd2fffdccb8a03bf5fb29b3f70ae5965f4ced0a5630178b74718fb25c9ce3791fc17dd5
-
Filesize
952KB
MD5171105a656f3c01e34d1aaae0609b2a3
SHA1904d6f4830cfe873f8125a272628f839e3502bb3
SHA256f0f0c4eb3522194eb8bed0e1bdedfc658ea2802697377d5595428a03c0487180
SHA512f324d490dd7a35d0d4df286852c151fea8d5eaf25981b29ab5bc7f8040d9ba7c53b4401ade8a905cec777cfc7c95962e56c2bf996aac3804f07b35a39c6feaab
-
Filesize
952KB
MD567bc5be56b004a9b0b0e0f4cf3943591
SHA1ac567e17856fd4b06290d6383472b15b93175cc1
SHA256321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3
SHA5120c0699650cbd2d9ecbb8d607df7deef51078a7bd8fa31e28fe86a16dbfc3c72322ca16f8109b33f0c7d84878b37e6dcc49be9320a2281883cef8c43c361dec2a