Analysis
-
max time kernel
95s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 23:26
Behavioral task
behavioral1
Sample
591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe
Resource
win10v2004-20250129-en
General
-
Target
591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe
-
Size
2.2MB
-
MD5
86f0b098d34e7964a9da4131d1d58fa9
-
SHA1
614cbbda0058cefe56cf2e9c0db2e06f95a195a5
-
SHA256
591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de
-
SHA512
ca8bb85f6c5cf9766806965d00d9ceaaa490fc93c88fa70de27542cd5520c428a48e9a91c912940858e4c3948f4bc362ce98c76a2e24099341c88f9e3a2289a3
-
SSDEEP
24576:tg/TM3unSV8JHYj0M14oMKhqN8+r/tse9WPJXelRWjq+jPx8FT2t6nTtHtO3g4Jc:mQenScjKkr/y+qXeliq+iT2t60g7Er3
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4600 3500 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3692 3500 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3240 3500 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4596 3500 schtasks.exe 85 -
UAC bypass 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" fontdrvhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" fontdrvhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fontdrvhost.exe -
resource yara_rule behavioral2/memory/4084-1-0x00000000000A0000-0x00000000002E2000-memory.dmp dcrat behavioral2/files/0x0010000000023ada-27.dat dcrat behavioral2/files/0x0014000000023ada-74.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\Control Panel\International\Geo\Nation 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe -
Executes dropped EXE 1 IoCs
pid Process 4020 fontdrvhost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Windows\\System32\\OkDone_80.contrast-black\\taskhostw.exe\"" 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\ProgramData\\regid.1991-06.com.microsoft\\fontdrvhost.exe\"" 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\ProgramData\\USOShared\\Logs\\User\\fontdrvhost.exe\"" 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Windows\\Containers\\serviced\\taskhostw.exe\"" 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe -
Checks whether UAC is enabled 1 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fontdrvhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fontdrvhost.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\System32\OkDone_80.contrast-black\taskhostw.exe 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe File created C:\Windows\System32\OkDone_80.contrast-black\ea9f0e6c9e2dcd4dfacdaf29ba21541fb815a988 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe File opened for modification C:\Windows\System32\OkDone_80.contrast-black\RCXB07C.tmp 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe File opened for modification C:\Windows\System32\OkDone_80.contrast-black\RCXB0FA.tmp 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe File opened for modification C:\Windows\System32\OkDone_80.contrast-black\taskhostw.exe 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Containers\serviced\taskhostw.exe 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe File created C:\Windows\Containers\serviced\ea9f0e6c9e2dcd4dfacdaf29ba21541fb815a988 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..onents-mdac-odbcbcp_31bf3856ad364e35_10.0.19041.1_none_66ec0176ed80c153\csrss.exe 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe File opened for modification C:\Windows\Containers\serviced\RCXADF9.tmp 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe File opened for modification C:\Windows\Containers\serviced\RCXADFA.tmp 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe File opened for modification C:\Windows\Containers\serviced\taskhostw.exe 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4600 schtasks.exe 3692 schtasks.exe 3240 schtasks.exe 4596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4084 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe 4084 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe 4084 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe 4084 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe 4084 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe 4084 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe 4084 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe 4084 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe 4084 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe 4084 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe 4084 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe 4084 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe 4084 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe 4020 fontdrvhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4084 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe Token: SeDebugPrivilege 4020 fontdrvhost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4084 wrote to memory of 4552 4084 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe 91 PID 4084 wrote to memory of 4552 4084 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe 91 PID 4552 wrote to memory of 5008 4552 cmd.exe 93 PID 4552 wrote to memory of 5008 4552 cmd.exe 93 PID 4552 wrote to memory of 4020 4552 cmd.exe 95 PID 4552 wrote to memory of 4020 4552 cmd.exe 95 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fontdrvhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" fontdrvhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" fontdrvhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe"C:\Users\Admin\AppData\Local\Temp\591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe"1⤵
- UAC bypass
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4084 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VO4xrFnuQ8.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:5008
-
-
C:\ProgramData\USOShared\Logs\User\fontdrvhost.exe"C:\ProgramData\USOShared\Logs\User\fontdrvhost.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4020
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\ProgramData\regid.1991-06.com.microsoft\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\ProgramData\USOShared\Logs\User\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\Containers\serviced\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\System32\OkDone_80.contrast-black\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4596
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD586f0b098d34e7964a9da4131d1d58fa9
SHA1614cbbda0058cefe56cf2e9c0db2e06f95a195a5
SHA256591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de
SHA512ca8bb85f6c5cf9766806965d00d9ceaaa490fc93c88fa70de27542cd5520c428a48e9a91c912940858e4c3948f4bc362ce98c76a2e24099341c88f9e3a2289a3
-
Filesize
214B
MD5b58e376a63a1de5fc0b3ec7048e91483
SHA19fbc6317fe47feae0e7a6267fd04b8fd91fce11d
SHA2566da93ab64b7fc554277f69b86dc9527ccdb26b720cb60874e8240a0055a75d61
SHA512bc209fc4f33daa5ff53baae2d705a014a64b6697057bc9f5bb6bf5a29dc271d3599d9e7d42618f9a1ec25fe841c996892ed2993a151fdfb2649f66f9b66f07d3
-
Filesize
2.2MB
MD5458b0a612c23dc2505cd6e3718b63351
SHA1e1c42485a3d095d2147fbd8a9191fdff6d2dc794
SHA25616c7c9d793ab13b0d793581a7d882a2cc8c3b77a811b0ffab997a57c73a14074
SHA51273f5b0eb08ef90c5adc02da1d16af2c8464f54d1123db76761a67caab3b4310103e62b5164bd50b61221845c0671be10f879f26e0947459f2dce9ab77d84a634