Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
03-02-2025 03:19
Behavioral task
behavioral1
Sample
52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe
Resource
win10v2004-20250129-en
General
-
Target
52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe
-
Size
1.2MB
-
MD5
fed24fca9235528a9e0a686ff60b723d
-
SHA1
e497808ca573e7dfd2e4d99d2c085ab9724707e0
-
SHA256
52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288
-
SHA512
2c1699f394a6c8708cd13f53e7df631b7548d72bb46b035963044c1f6c73b84ebba1e1adc02fe5f22d2aae31470bc9e61cce623cbdee3682c54b387befb7b999
-
SSDEEP
12288:90b329aw7HMGuBrwRCRa+XplQBuK7hEefjf05gRyC7Z3M6xqPhbqOEJv005vnhJb:98yaw7HMHXRa+y7htfxRr2EgKt0O8C3
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 12 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2496 2244 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2796 2244 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 2244 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2772 2244 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2804 2244 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2636 2244 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2712 2244 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2684 2244 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2444 2244 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1768 2244 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3032 2244 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2292 2244 schtasks.exe 30 -
resource yara_rule behavioral1/memory/308-1-0x0000000000950000-0x0000000000A8C000-memory.dmp dcrat behavioral1/files/0x0008000000016cd7-16.dat dcrat behavioral1/memory/2288-23-0x0000000000DE0000-0x0000000000F1C000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2288 explorer.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Windows Media Player\1a78d1ea47a7f9 52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\lsm.exe 52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\101b941d020240 52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe File created C:\Program Files\Windows Media Player\52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe 52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe File opened for modification C:\Program Files\Windows Media Player\52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe 52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2444 schtasks.exe 2292 schtasks.exe 2796 schtasks.exe 2772 schtasks.exe 2712 schtasks.exe 2636 schtasks.exe 2684 schtasks.exe 1768 schtasks.exe 3032 schtasks.exe 2496 schtasks.exe 2996 schtasks.exe 2804 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 308 52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe 308 52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe 308 52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe 2288 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 308 52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe Token: SeDebugPrivilege 2288 explorer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 308 wrote to memory of 2288 308 52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe 43 PID 308 wrote to memory of 2288 308 52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe 43 PID 308 wrote to memory of 2288 308 52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe"C:\Users\Admin\AppData\Local\Temp\52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:308 -
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\explorer.exe"C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\explorer.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d2885" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Media Player\52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d2885" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Media Player\52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5fed24fca9235528a9e0a686ff60b723d
SHA1e497808ca573e7dfd2e4d99d2c085ab9724707e0
SHA25652fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288
SHA5122c1699f394a6c8708cd13f53e7df631b7548d72bb46b035963044c1f6c73b84ebba1e1adc02fe5f22d2aae31470bc9e61cce623cbdee3682c54b387befb7b999