Analysis

  • max time kernel
    131s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2025 01:07

General

  • Target

    7f5d83a4f3158f5bbb7b556ba3db62dce18162187a54d33ed2355af2060a9f55.exe

  • Size

    1.8MB

  • MD5

    6bbb637f1077277a20b3507dc97bc7de

  • SHA1

    68fcbdf3a03ed5d3b20be5ccb5ba722287e132c0

  • SHA256

    7f5d83a4f3158f5bbb7b556ba3db62dce18162187a54d33ed2355af2060a9f55

  • SHA512

    fcf70736e50c933cb1fde526648483c34a8037ec381bf1dadb8645040b0ed45739b20b3085f468c496f278ecfc19b634e5ed09fb06728f8487655965c6e08ef3

  • SSDEEP

    24576:9nKomQbHAScRsd289QkfU9aEENG3xnt7w0sprTOx/vIwtU7nGYpm1CIV:xusQaD89KGhnt0FprTuGn

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f5d83a4f3158f5bbb7b556ba3db62dce18162187a54d33ed2355af2060a9f55.exe
    "C:\Users\Admin\AppData\Local\Temp\7f5d83a4f3158f5bbb7b556ba3db62dce18162187a54d33ed2355af2060a9f55.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rfcqkn2s\rfcqkn2s.cmdline"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB362.tmp" "c:\Windows\System32\CSCC52DF364B4A04213A29D4E34321A5629.TMP"
        3⤵
          PID:3136
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\We6PXsq9A6.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2040
        • C:\Windows\system32\chcp.com
          chcp 65001
          3⤵
            PID:2956
          • C:\Windows\system32\w32tm.exe
            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
            3⤵
              PID:228
            • C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe
              "C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:4324
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Media Player\Skins\wininit.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3216
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\Skins\wininit.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2636
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Media Player\Skins\wininit.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:5048
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1312
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2300
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4136
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2400
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1244
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1416
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1948
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4476
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1796
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Windows\twain_32\smss.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2452
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\twain_32\smss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4248
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Windows\twain_32\smss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3124
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "7f5d83a4f3158f5bbb7b556ba3db62dce18162187a54d33ed2355af2060a9f557" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\AppData\Local\Temp\7f5d83a4f3158f5bbb7b556ba3db62dce18162187a54d33ed2355af2060a9f55.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3752
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "7f5d83a4f3158f5bbb7b556ba3db62dce18162187a54d33ed2355af2060a9f55" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\7f5d83a4f3158f5bbb7b556ba3db62dce18162187a54d33ed2355af2060a9f55.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3140
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "7f5d83a4f3158f5bbb7b556ba3db62dce18162187a54d33ed2355af2060a9f557" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\AppData\Local\Temp\7f5d83a4f3158f5bbb7b556ba3db62dce18162187a54d33ed2355af2060a9f55.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2944

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Windows Media Player\Skins\wininit.exe

          Filesize

          1.8MB

          MD5

          6bbb637f1077277a20b3507dc97bc7de

          SHA1

          68fcbdf3a03ed5d3b20be5ccb5ba722287e132c0

          SHA256

          7f5d83a4f3158f5bbb7b556ba3db62dce18162187a54d33ed2355af2060a9f55

          SHA512

          fcf70736e50c933cb1fde526648483c34a8037ec381bf1dadb8645040b0ed45739b20b3085f468c496f278ecfc19b634e5ed09fb06728f8487655965c6e08ef3

        • C:\Users\Admin\AppData\Local\Temp\RESB362.tmp

          Filesize

          1KB

          MD5

          e908f574ddda5d2acad1e714cb510adb

          SHA1

          eaaa4d6d070fb0e3520c9840861d623298ab3e96

          SHA256

          ddd104b417847e45ece85659bd70fc1743fdf7914f2e0ddd77fe3e65d14f317c

          SHA512

          e59f2ab9568ef207dfb2d3e26e316d2d410831e08e10f42e63c549aad498af71327afedcbfa389b4079fc7f1537f110b6c4be35b189af149b4376d1be5be6689

        • C:\Users\Admin\AppData\Local\Temp\We6PXsq9A6.bat

          Filesize

          240B

          MD5

          176539556c2a27f22666b1da828e04c8

          SHA1

          5bff9d3323ae03bb415b8971e3a1c0f10e351171

          SHA256

          a6cf5e2485023f79c6fbbf5d8eb671aaf80b9f97ac6e28e96c2591abe2c0d5bd

          SHA512

          1d6ad94563f4d1069f147eed916e0810bbe99b9f92dd47f739569353ba4a7816d3fda0726372ea7b404886331a8cf9f23e0ef9191d0d43d506aed7a31260b467

        • \??\c:\Users\Admin\AppData\Local\Temp\rfcqkn2s\rfcqkn2s.0.cs

          Filesize

          393B

          MD5

          51a307ed1353aedac2cdd6bb60edd8b8

          SHA1

          450559106d658d12aba38a5885d0ecc2d683533d

          SHA256

          11e07fdfd7e101789ac72efd9137c9311aaa75d6f3f055103545b8c043cd4edb

          SHA512

          093d2c7f2539b1fe3abe0cdf804babe6fb3b80544a5250d0fd1d4df85c49714c94d8354a5220b9dad21180d99eab6f39617ececb203d3919cca7a316bf325426

        • \??\c:\Users\Admin\AppData\Local\Temp\rfcqkn2s\rfcqkn2s.cmdline

          Filesize

          235B

          MD5

          473cfe2e0f3a0f81bc920fffbd989588

          SHA1

          f62abc797f61734917867405107fe0160ec56566

          SHA256

          acfc6e43e152083d236a73516c94b1cfe22b9a743c6feb7b26862aa6fe3e9b9a

          SHA512

          ecb3d75b7f2f4c9dc6f5c99e4698955405356ca59b2f42f836aff6d3ba68516b6a8da38871514d5b04efa7fc9fcc3aa5312dfa30b1d6869c7ea5b2e25bee2b8b

        • \??\c:\Windows\System32\CSCC52DF364B4A04213A29D4E34321A5629.TMP

          Filesize

          1KB

          MD5

          2c62680283ce681e7f309fc0d845a1fa

          SHA1

          53d4d4b14160c74c9469d1203ede758bde5e9b51

          SHA256

          5bda5d5cc4de0e1a04df5c8f0b80fe0a61ea33ed27e6d114fd54a40b78fcad85

          SHA512

          717e54f6dde71d74c74d01001eb05c1b090cc2208da6d12a1c864d095bf46c58960a7db5fae9daa50a54efb634e273c66bc2240c7ec8673819475e1386112cd0

        • memory/1256-7-0x00007FFD62F50000-0x00007FFD63A11000-memory.dmp

          Filesize

          10.8MB

        • memory/1256-0-0x00007FFD62F53000-0x00007FFD62F55000-memory.dmp

          Filesize

          8KB

        • memory/1256-10-0x000000001AEE0000-0x000000001AEFC000-memory.dmp

          Filesize

          112KB

        • memory/1256-11-0x000000001B060000-0x000000001B0B0000-memory.dmp

          Filesize

          320KB

        • memory/1256-13-0x000000001AF00000-0x000000001AF18000-memory.dmp

          Filesize

          96KB

        • memory/1256-15-0x00000000025A0000-0x00000000025A8000-memory.dmp

          Filesize

          32KB

        • memory/1256-17-0x00000000025B0000-0x00000000025BC000-memory.dmp

          Filesize

          48KB

        • memory/1256-18-0x00007FFD62F50000-0x00007FFD63A11000-memory.dmp

          Filesize

          10.8MB

        • memory/1256-29-0x00007FFD62F50000-0x00007FFD63A11000-memory.dmp

          Filesize

          10.8MB

        • memory/1256-8-0x00007FFD62F50000-0x00007FFD63A11000-memory.dmp

          Filesize

          10.8MB

        • memory/1256-31-0x00007FFD62F50000-0x00007FFD63A11000-memory.dmp

          Filesize

          10.8MB

        • memory/1256-6-0x0000000002480000-0x000000000248E000-memory.dmp

          Filesize

          56KB

        • memory/1256-4-0x00007FFD62F50000-0x00007FFD63A11000-memory.dmp

          Filesize

          10.8MB

        • memory/1256-39-0x00007FFD62F50000-0x00007FFD63A11000-memory.dmp

          Filesize

          10.8MB

        • memory/1256-3-0x00007FFD62F50000-0x00007FFD63A11000-memory.dmp

          Filesize

          10.8MB

        • memory/1256-2-0x00007FFD62F50000-0x00007FFD63A11000-memory.dmp

          Filesize

          10.8MB

        • memory/1256-44-0x00007FFD62F50000-0x00007FFD63A11000-memory.dmp

          Filesize

          10.8MB

        • memory/1256-51-0x00007FFD62F50000-0x00007FFD63A11000-memory.dmp

          Filesize

          10.8MB

        • memory/1256-1-0x00000000001F0000-0x00000000003CE000-memory.dmp

          Filesize

          1.9MB