Analysis

  • max time kernel
    99s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2025 05:41

General

  • Target

    030fdca6a01f5aefa1a089d31c87a73e.exe

  • Size

    1.8MB

  • MD5

    030fdca6a01f5aefa1a089d31c87a73e

  • SHA1

    fdcbea38bc25badb5e158c83b86fa0eb59e2404d

  • SHA256

    a18ae160c885960f9d06df081a4e8b766010d4db40634a8171c4e142dd8a48e4

  • SHA512

    b6d1b32830a40a3780f6c46eeed30c0227e601b476764ac14bd54d5f719a782bb6966cffb59718401db83d91673bbf9d39fdb0dc0749b67610811eefa3394456

  • SSDEEP

    49152:cHH3s3SsnEPgb1ND8WbGc3fzL3I+nsNqdfjyxh:wH3s3SsEPgb1WpcPzL5dmxh

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\030fdca6a01f5aefa1a089d31c87a73e.exe
    "C:\Users\Admin\AppData\Local\Temp\030fdca6a01f5aefa1a089d31c87a73e.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4272
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\es0pdtga\es0pdtga.cmdline"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:224
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB69E.tmp" "c:\Windows\System32\CSCF846DE2B1E1C4E328F31672FC5694978.TMP"
        3⤵
          PID:1016
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\37G4bcSfnu.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2520
        • C:\Windows\system32\chcp.com
          chcp 65001
          3⤵
            PID:3668
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:3304
          • C:\Users\All Users\regid.1991-06.com.microsoft\fontdrvhost.exe
            "C:\Users\All Users\regid.1991-06.com.microsoft\fontdrvhost.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3824
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Photo Viewer\en-US\RuntimeBroker.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:464
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\en-US\RuntimeBroker.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3612
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Photo Viewer\en-US\RuntimeBroker.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3504
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\Registry.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3516
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Users\Default User\Registry.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4948
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\Registry.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:532
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2064
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1308
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1332
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4160
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2940
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:312
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\regid.1991-06.com.microsoft\fontdrvhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4516
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\All Users\regid.1991-06.com.microsoft\fontdrvhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1548
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\regid.1991-06.com.microsoft\fontdrvhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4064
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "030fdca6a01f5aefa1a089d31c87a73e0" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\AppData\Local\Temp\030fdca6a01f5aefa1a089d31c87a73e.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3316
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "030fdca6a01f5aefa1a089d31c87a73e" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\030fdca6a01f5aefa1a089d31c87a73e.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1524
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "030fdca6a01f5aefa1a089d31c87a73e0" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\AppData\Local\Temp\030fdca6a01f5aefa1a089d31c87a73e.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2476

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Windows Photo Viewer\en-US\RuntimeBroker.exe

        Filesize

        1.8MB

        MD5

        030fdca6a01f5aefa1a089d31c87a73e

        SHA1

        fdcbea38bc25badb5e158c83b86fa0eb59e2404d

        SHA256

        a18ae160c885960f9d06df081a4e8b766010d4db40634a8171c4e142dd8a48e4

        SHA512

        b6d1b32830a40a3780f6c46eeed30c0227e601b476764ac14bd54d5f719a782bb6966cffb59718401db83d91673bbf9d39fdb0dc0749b67610811eefa3394456

      • C:\Users\Admin\AppData\Local\Temp\37G4bcSfnu.bat

        Filesize

        190B

        MD5

        824ec322b8583844f73cf0fe6e3b937d

        SHA1

        e32c4a89ee04b23dfadb41c0eba78e24a0f27b6c

        SHA256

        a603924cedeac06d12a21817cdfe6a40c7dfd0da01112db6fae1c9e456ef94ff

        SHA512

        1ed29e897715d1603478a3c6325676bc8ab590962253919146d21342a33cf1f3300319125112dab18f79f747db771061c1f23c12b0835b44042f18ee13aa11ed

      • C:\Users\Admin\AppData\Local\Temp\RESB69E.tmp

        Filesize

        1KB

        MD5

        1869a470f1e042f6083ad0db642aaf7e

        SHA1

        f1f0ac26845c5c6427384d3f3201523eb4c79ba7

        SHA256

        131cb53346f6cd24e73ac739ce8c2a13d7023a09030bd5d7c6c94622c79143b3

        SHA512

        2e7202a532897a0fefbb0f060cb5813bc8599b469da730e5897476f3d75aefb31445688c76980bd3ff841d3c41fad4c33daf7145e262c3d1637ac8636c16d568

      • \??\c:\Users\Admin\AppData\Local\Temp\es0pdtga\es0pdtga.0.cs

        Filesize

        393B

        MD5

        cd977751b7a3ca6cb60f205d799e66bb

        SHA1

        3a3c91874a190a0fad7a6f1ac489d52b1077f0d0

        SHA256

        c7273119a6bf5f7dd7f8dbfa2e704bfbd2fc85bd7c8155d85cbc1e99ea3bab4e

        SHA512

        e75eee0aa8547c95329490eef0f9a7426a4581a843559617e7b7cd1e250365eb194ef2ac2765c21abb8aee76e7bd3e813289d87e76373c94caaf4b1a21af09f6

      • \??\c:\Users\Admin\AppData\Local\Temp\es0pdtga\es0pdtga.cmdline

        Filesize

        235B

        MD5

        66dc39b8796a2afa6ca291fc2c02172d

        SHA1

        1bacadaa4a6bd650524301ace70cba2417afe605

        SHA256

        28f2e4ae40b7fa53a32e3647bbcfe78e3d6725181382ed2da26381d1a2fab1ca

        SHA512

        e86ad39b4ebb5262a20c09656f3d8e329a9f77ae8732217bec631bb539bb4a23b7e0fffce6b0864de55c95a6d4ee517a1ebcd3529bc8c2d86774c288bfc59644

      • \??\c:\Windows\System32\CSCF846DE2B1E1C4E328F31672FC5694978.TMP

        Filesize

        1KB

        MD5

        2fd2b90e7053b01e6af25701a467eb1f

        SHA1

        68801a13cebba82c24f67a9d7c886fcefcf01a51

        SHA256

        12b900db56a20f01f0f1d65f46933971415d5b5675e59e8b02b3dae12aaa1527

        SHA512

        081d3a621e3664709867f3fdd82808364978f896fb007c0c8e6c8dfe25f2f2b8d37c9e0b2e4fb51c90bc6f691507b569e5d841ef3ca3bd38bd6adda2d30f32af

      • memory/4272-7-0x00007FFEAEFA0000-0x00007FFEAFA61000-memory.dmp

        Filesize

        10.8MB

      • memory/4272-0-0x00007FFEAEFA3000-0x00007FFEAEFA5000-memory.dmp

        Filesize

        8KB

      • memory/4272-13-0x000000001BE30000-0x000000001BE48000-memory.dmp

        Filesize

        96KB

      • memory/4272-11-0x00007FFEAEFA0000-0x00007FFEAFA61000-memory.dmp

        Filesize

        10.8MB

      • memory/4272-15-0x000000001BCD0000-0x000000001BCDC000-memory.dmp

        Filesize

        48KB

      • memory/4272-18-0x00007FFEAEFA0000-0x00007FFEAFA61000-memory.dmp

        Filesize

        10.8MB

      • memory/4272-16-0x00007FFEAEFA0000-0x00007FFEAFA61000-memory.dmp

        Filesize

        10.8MB

      • memory/4272-10-0x000000001C0A0000-0x000000001C0F0000-memory.dmp

        Filesize

        320KB

      • memory/4272-23-0x00007FFEAEFA0000-0x00007FFEAFA61000-memory.dmp

        Filesize

        10.8MB

      • memory/4272-9-0x000000001BE10000-0x000000001BE2C000-memory.dmp

        Filesize

        112KB

      • memory/4272-30-0x00007FFEAEFA0000-0x00007FFEAFA61000-memory.dmp

        Filesize

        10.8MB

      • memory/4272-31-0x00007FFEAEFA0000-0x00007FFEAFA61000-memory.dmp

        Filesize

        10.8MB

      • memory/4272-6-0x00000000032D0000-0x00000000032DE000-memory.dmp

        Filesize

        56KB

      • memory/4272-4-0x00007FFEAEFA0000-0x00007FFEAFA61000-memory.dmp

        Filesize

        10.8MB

      • memory/4272-3-0x00007FFEAEFA0000-0x00007FFEAFA61000-memory.dmp

        Filesize

        10.8MB

      • memory/4272-2-0x00007FFEAEFA0000-0x00007FFEAFA61000-memory.dmp

        Filesize

        10.8MB

      • memory/4272-49-0x00007FFEAEFA0000-0x00007FFEAFA61000-memory.dmp

        Filesize

        10.8MB

      • memory/4272-1-0x0000000000EF0000-0x00000000010CA000-memory.dmp

        Filesize

        1.9MB