Analysis
-
max time kernel
95s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2025 03:52
Behavioral task
behavioral1
Sample
fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe
Resource
win10v2004-20241007-en
General
-
Target
fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe
-
Size
1.2MB
-
MD5
383cad8eb4744a1be8c2b17c74b97b0a
-
SHA1
23ccdd08ba293d56ac66b682b57585a85e1742a1
-
SHA256
fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b
-
SHA512
713896072fd43a6566c895ff96f47fb13442864004e1977a79632818537fdf42401fe0659b2ffe21cdf30a097c5d1576b8856046629822cede88f5f77c0a275d
-
SSDEEP
24576:MATnwO965z/roRbcJEV2oLI2gDMwifE+O3jV5kF9BrK:XuaKEEgTBr
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 12 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1480 4852 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4484 4852 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 4852 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1700 4852 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4068 4852 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1280 4852 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3648 4852 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1220 4852 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3948 4852 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3296 4852 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1800 4852 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2156 4852 schtasks.exe 82 -
resource yara_rule behavioral2/memory/2228-1-0x00000000008A0000-0x00000000009DE000-memory.dmp dcrat behavioral2/files/0x000a000000023b78-24.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe -
Executes dropped EXE 1 IoCs
pid Process 2104 dllhost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\es-ES\fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe File opened for modification C:\Windows\es-ES\fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe File created C:\Windows\es-ES\5aeef0fbe1d9cb fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe File created C:\Windows\Downloaded Program Files\Registry.exe fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe File created C:\Windows\Downloaded Program Files\ee2ad38f3d4382 fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2068 schtasks.exe 4068 schtasks.exe 3948 schtasks.exe 3296 schtasks.exe 1800 schtasks.exe 2156 schtasks.exe 1480 schtasks.exe 4484 schtasks.exe 1700 schtasks.exe 1280 schtasks.exe 3648 schtasks.exe 1220 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2228 fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe 2228 fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe 2228 fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe 2104 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2228 fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe Token: SeDebugPrivilege 2104 dllhost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2228 wrote to memory of 4992 2228 fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe 95 PID 2228 wrote to memory of 4992 2228 fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe 95 PID 4992 wrote to memory of 3544 4992 cmd.exe 97 PID 4992 wrote to memory of 3544 4992 cmd.exe 97 PID 4992 wrote to memory of 2104 4992 cmd.exe 98 PID 4992 wrote to memory of 2104 4992 cmd.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe"C:\Users\Admin\AppData\Local\Temp\fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7wq2rIMbk4.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3544
-
-
C:\Users\Admin\dllhost.exe"C:\Users\Admin\dllhost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254bf" /sc MINUTE /mo 7 /tr "'C:\Windows\es-ES\fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b" /sc ONLOGON /tr "'C:\Windows\es-ES\fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254bf" /sc MINUTE /mo 8 /tr "'C:\Windows\es-ES\fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 9 /tr "'C:\Windows\Downloaded Program Files\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Windows\Downloaded Program Files\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 5 /tr "'C:\Windows\Downloaded Program Files\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Admin\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191B
MD5680e67975d0bbbffef32b4d7fb5c4b82
SHA1d3e79b226e0944c94ca4d0cec02d635134cae970
SHA2561748449c87a73f613eb37a3c23dcd833ba6f0fdb374efafd8229954ee45fdfc9
SHA512c980eac0d1fed06429db1ebf5cc495174ca20432a2b727b3f879b86bf16ecf1d4994010ddf925c9041a6610cb405167ad904c09927f05ad167f7c83f9d05101a
-
Filesize
1.2MB
MD5383cad8eb4744a1be8c2b17c74b97b0a
SHA123ccdd08ba293d56ac66b682b57585a85e1742a1
SHA256fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b
SHA512713896072fd43a6566c895ff96f47fb13442864004e1977a79632818537fdf42401fe0659b2ffe21cdf30a097c5d1576b8856046629822cede88f5f77c0a275d