Analysis

  • max time kernel
    119s
  • max time network
    112s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2025 23:57

General

  • Target

    26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe

  • Size

    2.2MB

  • MD5

    baad2dc104aaba3159da075a87cb606e

  • SHA1

    a3346f43df91c6df1cec3b048a14246d6e65bc46

  • SHA256

    26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0

  • SHA512

    4d629a023232b64db7489f2cba745466bf07dbf2813492c603f8594695fd187edff0002d9aad09ccae051a4e00c105c0094c4a37483220ce1509aa9e9d967475

  • SSDEEP

    49152:ssSHlG56vO0T3/Nh/ptuw/C3TqGaDxr1NcWTMUvifq:sLlK6d3/Nh/bV/Oq3Dxp2RUGq

Malware Config

Signatures

  • DcRat 14 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • Process spawned unexpected child process 12 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 9 IoCs
  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • System policy modification 1 TTPs 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe
    "C:\Users\Admin\AppData\Local\Temp\26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe"
    1⤵
    • DcRat
    • Modifies WinLogon for persistence
    • UAC bypass
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1384
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FUrPKKMybJ.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1192
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:3068
        • C:\Program Files\Google\dllhost.exe
          "C:\Program Files\Google\dllhost.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2348
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\918f30a6-fc5c-4631-8a33-fc6f14a70514.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1396
            • C:\Program Files\Google\dllhost.exe
              "C:\Program Files\Google\dllhost.exe"
              5⤵
              • UAC bypass
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:1748
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\59f813a8-00ca-4387-bd82-97a65a448a22.vbs"
                6⤵
                  PID:2580
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2c2c72e1-6f24-4ad9-90a5-92f4dfd3dfee.vbs"
                  6⤵
                    PID:2596
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b949619b-04cf-40ed-a328-f981336e4fe8.vbs"
                4⤵
                  PID:892
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files\Google\dllhost.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2636
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Google\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2868
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Program Files\Google\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2496
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\audiodg.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2776
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\audiodg.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2664
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\audiodg.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2512
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\OSPPSVC.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2768
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\OSPPSVC.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2508
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\OSPPSVC.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2608
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\PrintHood\System.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2208
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Admin\PrintHood\System.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2236
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\PrintHood\System.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:668

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\Google\dllhost.exe

            Filesize

            2.2MB

            MD5

            1ba711ced12ac8a5b988806f598678a2

            SHA1

            a62d98d5b06a80a96b6a1bb4248baa50fd8826a6

            SHA256

            53890951c1c1e5e2dabb36933c50fe802364be3d35e1069b3b282acebd15a1fd

            SHA512

            0c8f53ea178a8fe7c7db7a4aa6fdd7c89316361747574df9f90ddadb94c9a33d359848ed49ec4ba7e000e397707691e4b21514a8606159545b5013bc3b572506

          • C:\Users\Admin\AppData\Local\Temp\59f813a8-00ca-4387-bd82-97a65a448a22.vbs

            Filesize

            711B

            MD5

            fd305e3cea4b86708ef133ec5e6d7598

            SHA1

            9dd2c473bd0b28ff2f6e122d1aca5ae63a5f7495

            SHA256

            19463ab24a380f6715df8255e594fc74bbab8876e0147673d40ab9f169953f9c

            SHA512

            d880fa0c32a0a9dcc0de761a48c2980bf28f2ef42c4177635e7723047c0328ef3e33a1dc6877341e4386a3f5a47604297efeb1618df7e68eb6f8dc2a31edbd08

          • C:\Users\Admin\AppData\Local\Temp\918f30a6-fc5c-4631-8a33-fc6f14a70514.vbs

            Filesize

            711B

            MD5

            e89a6c0ade0a5ddf57271b45de2f226e

            SHA1

            e8854edc7bfd789e4f9f047861592d945b380edb

            SHA256

            bb1d0843501aa7f0d4426b39636a2a56cac374b0d389e8f1cbb4413679371f57

            SHA512

            2451ae54d7362838541b73535faa33ec01fccbcbc9a25eb205f684fa9970eccd29c7e169a3e659d0e47c82d60feba3a2df011e4f3ed8b44cba2b1c8e9d44cc9e

          • C:\Users\Admin\AppData\Local\Temp\FUrPKKMybJ.bat

            Filesize

            200B

            MD5

            d0b5a2eda29edbaf2c807a3192bfea7e

            SHA1

            ef17d4fca85a11686720e5fa14117812c1061f5a

            SHA256

            4c600c1a96f8353568f1c5a28144f2a5895bc4f6cce138fc5beaa550407c51ca

            SHA512

            c849a83e66bbc60acae47752ce1f8447649d91b7538f165c03df499817236c0236ef2b32a5b0cbc79793c138ae2fa5109997c5e8b5b7796ab2f408d014c14475

          • C:\Users\Admin\AppData\Local\Temp\RCXECC0.tmp

            Filesize

            2.2MB

            MD5

            734f6915b07742d30bc125ff73f87d80

            SHA1

            f5bbfbc8c5bd6ddb6329c3fca96261c787de0317

            SHA256

            b0997cf70abbd1e112010f380df1a977ab85f38d6c410147fb65a5674b2f6be2

            SHA512

            e9707ef0e75d94bea0c442cffde33aa74748b4c35471e45bab417dc5265f6ddb95e5d8edb55bf347a6a1d4881e50d85a75852f1acedf78a8892f44c708cee579

          • C:\Users\Admin\AppData\Local\Temp\b949619b-04cf-40ed-a328-f981336e4fe8.vbs

            Filesize

            487B

            MD5

            279d14e48626824e351e28fbc919c8c9

            SHA1

            f8f134c48a4a33827ec1f71d42695e36442231bb

            SHA256

            6b280e5598427bcac1e41699959ee9110e98f406552f996368e216047a7064ad

            SHA512

            c0cf6690a680db286d35b0a8e341dad1a9561779741b56939f3519c3b312dfd1e895c8825fbd7c2e2ade1e8f732436dd982a9b0589ffb78bd9668f49d400b127

          • memory/1384-19-0x00000000008C0000-0x00000000008CC000-memory.dmp

            Filesize

            48KB

          • memory/1384-22-0x00000000008F0000-0x00000000008FA000-memory.dmp

            Filesize

            40KB

          • memory/1384-8-0x0000000000570000-0x0000000000586000-memory.dmp

            Filesize

            88KB

          • memory/1384-9-0x0000000000590000-0x000000000059C000-memory.dmp

            Filesize

            48KB

          • memory/1384-10-0x00000000005A0000-0x00000000005A8000-memory.dmp

            Filesize

            32KB

          • memory/1384-11-0x0000000000850000-0x0000000000860000-memory.dmp

            Filesize

            64KB

          • memory/1384-12-0x00000000005B0000-0x00000000005BA000-memory.dmp

            Filesize

            40KB

          • memory/1384-13-0x0000000000640000-0x000000000064C000-memory.dmp

            Filesize

            48KB

          • memory/1384-14-0x0000000000860000-0x0000000000868000-memory.dmp

            Filesize

            32KB

          • memory/1384-15-0x0000000000870000-0x000000000087C000-memory.dmp

            Filesize

            48KB

          • memory/1384-16-0x0000000000880000-0x0000000000888000-memory.dmp

            Filesize

            32KB

          • memory/1384-18-0x0000000000890000-0x00000000008A2000-memory.dmp

            Filesize

            72KB

          • memory/1384-0-0x000007FEF6183000-0x000007FEF6184000-memory.dmp

            Filesize

            4KB

          • memory/1384-20-0x00000000008D0000-0x00000000008DC000-memory.dmp

            Filesize

            48KB

          • memory/1384-21-0x00000000008E0000-0x00000000008EC000-memory.dmp

            Filesize

            48KB

          • memory/1384-7-0x0000000000550000-0x0000000000560000-memory.dmp

            Filesize

            64KB

          • memory/1384-23-0x0000000000900000-0x000000000090E000-memory.dmp

            Filesize

            56KB

          • memory/1384-25-0x0000000002270000-0x000000000227E000-memory.dmp

            Filesize

            56KB

          • memory/1384-24-0x0000000000910000-0x0000000000918000-memory.dmp

            Filesize

            32KB

          • memory/1384-26-0x0000000002280000-0x000000000228C000-memory.dmp

            Filesize

            48KB

          • memory/1384-27-0x0000000002390000-0x0000000002398000-memory.dmp

            Filesize

            32KB

          • memory/1384-28-0x00000000023A0000-0x00000000023AC000-memory.dmp

            Filesize

            48KB

          • memory/1384-31-0x000007FEF6180000-0x000007FEF6B6C000-memory.dmp

            Filesize

            9.9MB

          • memory/1384-6-0x0000000000540000-0x0000000000548000-memory.dmp

            Filesize

            32KB

          • memory/1384-5-0x0000000000520000-0x000000000053C000-memory.dmp

            Filesize

            112KB

          • memory/1384-94-0x000007FEF6180000-0x000007FEF6B6C000-memory.dmp

            Filesize

            9.9MB

          • memory/1384-4-0x0000000000390000-0x000000000039E000-memory.dmp

            Filesize

            56KB

          • memory/1384-1-0x0000000000920000-0x0000000000B4E000-memory.dmp

            Filesize

            2.2MB

          • memory/1384-3-0x0000000000140000-0x000000000014E000-memory.dmp

            Filesize

            56KB

          • memory/1384-2-0x000007FEF6180000-0x000007FEF6B6C000-memory.dmp

            Filesize

            9.9MB

          • memory/2348-98-0x0000000001060000-0x000000000128E000-memory.dmp

            Filesize

            2.2MB