Analysis

  • max time kernel
    96s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2025 21:07

General

  • Target

    321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe

  • Size

    952KB

  • MD5

    67bc5be56b004a9b0b0e0f4cf3943591

  • SHA1

    ac567e17856fd4b06290d6383472b15b93175cc1

  • SHA256

    321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3

  • SHA512

    0c0699650cbd2d9ecbb8d607df7deef51078a7bd8fa31e28fe86a16dbfc3c72322ca16f8109b33f0c7d84878b37e6dcc49be9320a2281883cef8c43c361dec2a

  • SSDEEP

    24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe
    "C:\Users\Admin\AppData\Local\Temp\321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:384
    • C:\Windows\System32\KBDTH3\dllhost.exe
      "C:\Windows\System32\KBDTH3\dllhost.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:3964
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\KBDTH3\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1060
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:908
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\wininit.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Sidebar\Gadgets\dwm.exe

    Filesize

    952KB

    MD5

    fbf87e7e634086d0fc859184ca7cb5ce

    SHA1

    4dd931383b8432d5d67ef1db6b7477cdb99e6ee9

    SHA256

    e0c5605686f38a1494b7c18a45c62dc4eeed0a73e21167734af211c955746830

    SHA512

    daeb6b4373981aeb3f0830b3f059b36b8fd5b081106667911186874ab99ea90055fc4d9c9498dfcd74f1e0a0e2f6129a2ff5d44e3e1305507d589fcd27bec875

  • C:\Recovery\WindowsRE\wininit.exe

    Filesize

    952KB

    MD5

    378302c2ff824c69bc40b6790fb730e9

    SHA1

    151ba30690697771bf1abff6b008e9d484c743ad

    SHA256

    f0cba27790f6c4a1465f28a8af60104d1e4bbd9f6168c1a339859f5b54200d2d

    SHA512

    9b7e3e0f8d9a0e68a7f9308d35de573196b909d5ce6767d7d5c442c22b590db5abfd7e6b518e36e062b204df18781363d5282421b65c1a16fd829375f4a680aa

  • C:\Users\Admin\AppData\Local\Temp\RCX8B88.tmp

    Filesize

    952KB

    MD5

    67bc5be56b004a9b0b0e0f4cf3943591

    SHA1

    ac567e17856fd4b06290d6383472b15b93175cc1

    SHA256

    321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3

    SHA512

    0c0699650cbd2d9ecbb8d607df7deef51078a7bd8fa31e28fe86a16dbfc3c72322ca16f8109b33f0c7d84878b37e6dcc49be9320a2281883cef8c43c361dec2a

  • C:\Windows\System32\KBDTH3\dllhost.exe

    Filesize

    952KB

    MD5

    1d79d28703ec5f875407e503b39d3f55

    SHA1

    d384cbf4b64f174f1a2af57d2127fbb4b097b7af

    SHA256

    59f253dc27392feec98b568e808e30716098c95f1176a6b116c3e44609ed979b

    SHA512

    5a8c102cd657ed563fc71332e7c1d6d27b65dcc219e974fda58eb2ecb7cc4f6a1b5c051a643abf1344e29a35a37bfb487d3d378adf0b6ad4d948028f0bd2d826

  • memory/384-4-0x00000000011B0000-0x00000000011C0000-memory.dmp

    Filesize

    64KB

  • memory/384-11-0x0000000002C50000-0x0000000002C5C000-memory.dmp

    Filesize

    48KB

  • memory/384-5-0x00000000011E0000-0x00000000011EA000-memory.dmp

    Filesize

    40KB

  • memory/384-7-0x0000000001210000-0x000000000121A000-memory.dmp

    Filesize

    40KB

  • memory/384-8-0x0000000001220000-0x0000000001228000-memory.dmp

    Filesize

    32KB

  • memory/384-10-0x0000000001250000-0x000000000125C000-memory.dmp

    Filesize

    48KB

  • memory/384-9-0x0000000001240000-0x000000000124A000-memory.dmp

    Filesize

    40KB

  • memory/384-6-0x00000000011F0000-0x00000000011FC000-memory.dmp

    Filesize

    48KB

  • memory/384-0-0x00007FFA2F173000-0x00007FFA2F175000-memory.dmp

    Filesize

    8KB

  • memory/384-3-0x00000000011A0000-0x00000000011B0000-memory.dmp

    Filesize

    64KB

  • memory/384-2-0x00007FFA2F170000-0x00007FFA2FC31000-memory.dmp

    Filesize

    10.8MB

  • memory/384-1-0x0000000000910000-0x0000000000A04000-memory.dmp

    Filesize

    976KB

  • memory/384-69-0x00007FFA2F170000-0x00007FFA2FC31000-memory.dmp

    Filesize

    10.8MB

  • memory/3964-68-0x0000000000480000-0x0000000000574000-memory.dmp

    Filesize

    976KB