Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-01-2025 01:47

General

  • Target

    a86128295c56770cca66fc90ae4b45ee074c7748f0a61e76cecb50975d0a5d48.exe

  • Size

    783KB

  • MD5

    3b3c2d80c5a454a147432307689450cd

  • SHA1

    6ae70ec700709b860d6c9a501f953e98b2b614e5

  • SHA256

    a86128295c56770cca66fc90ae4b45ee074c7748f0a61e76cecb50975d0a5d48

  • SHA512

    e1f626becf40260dc90559383e95eff8f8d4d2a447a41118b01a6a02002d98d0be2389f4c9030dbc3f4f8bab1d1ec4dc5daa31755b55c6d09d0c6f3f054443a0

  • SSDEEP

    12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 16 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a86128295c56770cca66fc90ae4b45ee074c7748f0a61e76cecb50975d0a5d48.exe
    "C:\Users\Admin\AppData\Local\Temp\a86128295c56770cca66fc90ae4b45ee074c7748f0a61e76cecb50975d0a5d48.exe"
    1⤵
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2012
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9tQXMSwgDC.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1700
        • C:\Program Files\Windows Media Player\es-ES\csrss.exe
          "C:\Program Files\Windows Media Player\es-ES\csrss.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:1144
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\PerfLogs\Admin\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1968
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\partmgr\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2804
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\C_737\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2748
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\DWWIN\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2724
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\es-ES\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2656
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\irda\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2676

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Windows Media Player\es-ES\csrss.exe

      Filesize

      783KB

      MD5

      3b3c2d80c5a454a147432307689450cd

      SHA1

      6ae70ec700709b860d6c9a501f953e98b2b614e5

      SHA256

      a86128295c56770cca66fc90ae4b45ee074c7748f0a61e76cecb50975d0a5d48

      SHA512

      e1f626becf40260dc90559383e95eff8f8d4d2a447a41118b01a6a02002d98d0be2389f4c9030dbc3f4f8bab1d1ec4dc5daa31755b55c6d09d0c6f3f054443a0

    • C:\Program Files\Windows Media Player\es-ES\csrss.exe

      Filesize

      783KB

      MD5

      61c49dd397ca043cec66d4a3321bacfa

      SHA1

      f36a1a01cbce1ab5a71b222c1a61bdde6511ab3e

      SHA256

      e43ae6e220cb612d8a47e6757e4eafcde9c8ff1f04052a242f83ea68b3128546

      SHA512

      bbad143ef7f294b99bee289e760ff4723823e5769fd21a5c0e329a8a02a8981bc415dd8b5e1355d21c95be43b478c30f654c207e2d02045ffcc1d0e07c35b839

    • C:\Users\Admin\AppData\Local\Temp\9tQXMSwgDC.bat

      Filesize

      217B

      MD5

      410f2d2f5cbd179893d68abf3c5b4ddd

      SHA1

      6e9a010a5865ce83c681f637886560fccc714016

      SHA256

      f34e2e361905b35c4a0e9304ad5d9177c0cde20912c4ca6ed6089b7e85ce422e

      SHA512

      d9ec33568b7cd1f203928f47c1071265968d6f5b1bf372b7de8f421ef2e1650dbc65909dc6d3dbcc445194ddb4c574c7c3c9cab7142636470e3c3b7a6ff02d52

    • memory/1144-87-0x0000000000DD0000-0x0000000000E9A000-memory.dmp

      Filesize

      808KB

    • memory/2012-14-0x0000000000A00000-0x0000000000A08000-memory.dmp

      Filesize

      32KB

    • memory/2012-17-0x0000000000A60000-0x0000000000A68000-memory.dmp

      Filesize

      32KB

    • memory/2012-6-0x00000000009B0000-0x00000000009B8000-memory.dmp

      Filesize

      32KB

    • memory/2012-7-0x00000000009D0000-0x00000000009DC000-memory.dmp

      Filesize

      48KB

    • memory/2012-8-0x00000000009C0000-0x00000000009CA000-memory.dmp

      Filesize

      40KB

    • memory/2012-9-0x00000000009F0000-0x00000000009FA000-memory.dmp

      Filesize

      40KB

    • memory/2012-10-0x0000000000A30000-0x0000000000A38000-memory.dmp

      Filesize

      32KB

    • memory/2012-11-0x00000000009E0000-0x00000000009E8000-memory.dmp

      Filesize

      32KB

    • memory/2012-12-0x0000000000A20000-0x0000000000A28000-memory.dmp

      Filesize

      32KB

    • memory/2012-13-0x000000001A820000-0x000000001A828000-memory.dmp

      Filesize

      32KB

    • memory/2012-0-0x000007FEF56B3000-0x000007FEF56B4000-memory.dmp

      Filesize

      4KB

    • memory/2012-15-0x0000000000A40000-0x0000000000A48000-memory.dmp

      Filesize

      32KB

    • memory/2012-16-0x0000000000A50000-0x0000000000A58000-memory.dmp

      Filesize

      32KB

    • memory/2012-5-0x0000000000570000-0x0000000000580000-memory.dmp

      Filesize

      64KB

    • memory/2012-18-0x0000000000A70000-0x0000000000A78000-memory.dmp

      Filesize

      32KB

    • memory/2012-19-0x0000000000B10000-0x0000000000B18000-memory.dmp

      Filesize

      32KB

    • memory/2012-20-0x0000000000B20000-0x0000000000B28000-memory.dmp

      Filesize

      32KB

    • memory/2012-21-0x0000000000A10000-0x0000000000A1C000-memory.dmp

      Filesize

      48KB

    • memory/2012-22-0x0000000000B00000-0x0000000000B08000-memory.dmp

      Filesize

      32KB

    • memory/2012-25-0x000007FEF56B0000-0x000007FEF609C000-memory.dmp

      Filesize

      9.9MB

    • memory/2012-4-0x0000000000560000-0x0000000000568000-memory.dmp

      Filesize

      32KB

    • memory/2012-3-0x0000000000550000-0x0000000000558000-memory.dmp

      Filesize

      32KB

    • memory/2012-84-0x000007FEF56B0000-0x000007FEF609C000-memory.dmp

      Filesize

      9.9MB

    • memory/2012-2-0x000007FEF56B0000-0x000007FEF609C000-memory.dmp

      Filesize

      9.9MB

    • memory/2012-1-0x0000000000CA0000-0x0000000000D6A000-memory.dmp

      Filesize

      808KB