Analysis

  • max time kernel
    93s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2025 03:27

General

  • Target

    7b3cb0689a20b3d447c436253a2f44995562052e7f46094c93c12a375ebea0cb.exe

  • Size

    2.7MB

  • MD5

    9bfdb51d9bf8b65fb81ea7083f147695

  • SHA1

    c0eeb27e17afd5c9c2c2887aefadb171657f79bb

  • SHA256

    7b3cb0689a20b3d447c436253a2f44995562052e7f46094c93c12a375ebea0cb

  • SHA512

    12820d32910da209fcd21b0d78a821d9e5778800224d9405cc6c55bfa9ea6fc2435f2ab83c130beb07e6c5d393ede8114d9aaa4d82665cbf64fc5b45479ebb0f

  • SSDEEP

    49152:twqc9JR8znSZnLiIvYqxT4icZ1TQjI6bEfmI4xvykALzt:thEtjvFxT5cZ1EjI6bkp+yt

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 21 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 21 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b3cb0689a20b3d447c436253a2f44995562052e7f46094c93c12a375ebea0cb.exe
    "C:\Users\Admin\AppData\Local\Temp\7b3cb0689a20b3d447c436253a2f44995562052e7f46094c93c12a375ebea0cb.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3308
    • C:\Program Files\Internet Explorer\en-US\SearchApp.exe
      "C:\Program Files\Internet Explorer\en-US\SearchApp.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:5028
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "7b3cb0689a20b3d447c436253a2f44995562052e7f46094c93c12a375ebea0cb7" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\7b3cb0689a20b3d447c436253a2f44995562052e7f46094c93c12a375ebea0cb.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1692
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "7b3cb0689a20b3d447c436253a2f44995562052e7f46094c93c12a375ebea0cb" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\7b3cb0689a20b3d447c436253a2f44995562052e7f46094c93c12a375ebea0cb.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2548
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "7b3cb0689a20b3d447c436253a2f44995562052e7f46094c93c12a375ebea0cb7" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\7b3cb0689a20b3d447c436253a2f44995562052e7f46094c93c12a375ebea0cb.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4344
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:448
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:224
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4336
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 13 /tr "'C:\Program Files\Internet Explorer\en-US\SearchApp.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:100
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\en-US\SearchApp.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4744
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 11 /tr "'C:\Program Files\Internet Explorer\en-US\SearchApp.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:804
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Defender\backgroundTaskHost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4984
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\backgroundTaskHost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3704
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Defender\backgroundTaskHost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1924
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\unsecapp.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1868
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\unsecapp.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2244
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\unsecapp.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1092
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files\Crashpad\reports\dllhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2176
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Crashpad\reports\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4272
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files\Crashpad\reports\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2788
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Google\Temp\upfc.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3460
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Temp\upfc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4340
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Google\Temp\upfc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Defender\backgroundTaskHost.exe

    Filesize

    2.7MB

    MD5

    4aae3d6f0b87f3f9e5ff6ccbe2c4b079

    SHA1

    f3280ec084dca3986b4712cd8f41af84295cf184

    SHA256

    e2a45240c9345c30b2bb77eec718205e17e94c6069a5feb6a847939cc72b0cce

    SHA512

    04a7385f4a3d0d663960d80251ecdf8f1984eb3746fe928a3155fcb3c4f4a135bac2c3a05d2b0f6fd61b3ef39594a470ac382b0ebe14c95a4a25a9b24c6efa4c

  • C:\Program Files\Crashpad\reports\dllhost.exe

    Filesize

    2.7MB

    MD5

    bf647c8098e6eecdef5e2d8da3087062

    SHA1

    259e92ce76f6c61b7bb3ffe816f97031b436bfdd

    SHA256

    b25e236c02a91fcdaa31480525f2bd40e50ddd731eabd34f9be5f0db828265c1

    SHA512

    f77b9efb5a78363a0b9432844a14027ccd2edd30d7533a1cbf44f71addd1305de1c6d5db875fb52d083fa46096dd67ba5e5b3edd9c1eda121d10d41d98aff176

  • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\unsecapp.exe

    Filesize

    2.7MB

    MD5

    9bfdb51d9bf8b65fb81ea7083f147695

    SHA1

    c0eeb27e17afd5c9c2c2887aefadb171657f79bb

    SHA256

    7b3cb0689a20b3d447c436253a2f44995562052e7f46094c93c12a375ebea0cb

    SHA512

    12820d32910da209fcd21b0d78a821d9e5778800224d9405cc6c55bfa9ea6fc2435f2ab83c130beb07e6c5d393ede8114d9aaa4d82665cbf64fc5b45479ebb0f

  • C:\Recovery\WindowsRE\7b3cb0689a20b3d447c436253a2f44995562052e7f46094c93c12a375ebea0cb.exe

    Filesize

    2.7MB

    MD5

    125b64825299741fa64481ae7483f8c9

    SHA1

    460d96c697ecda0674bdefbc18d5f8b55b0bc344

    SHA256

    8340835c62086ea2e134e1e75db3e1581d9d0e099f5ea6e68b4ea890e519b51b

    SHA512

    7e191329f2c3857a348b96eee0e50d39f705eae97bd2bfcb495aa1f6df319dc0b6dbbc79bdcd0008deb1bf916503a5e2bc4c3a2397c2dfe347091bc03e77b97c

  • memory/3308-12-0x000000001B630000-0x000000001B638000-memory.dmp

    Filesize

    32KB

  • memory/3308-15-0x000000001B680000-0x000000001B688000-memory.dmp

    Filesize

    32KB

  • memory/3308-4-0x000000001B4C0000-0x000000001B4DC000-memory.dmp

    Filesize

    112KB

  • memory/3308-7-0x000000001B4E0000-0x000000001B4F0000-memory.dmp

    Filesize

    64KB

  • memory/3308-8-0x000000001B4F0000-0x000000001B506000-memory.dmp

    Filesize

    88KB

  • memory/3308-10-0x000000001B640000-0x000000001B64A000-memory.dmp

    Filesize

    40KB

  • memory/3308-9-0x000000001B510000-0x000000001B518000-memory.dmp

    Filesize

    32KB

  • memory/3308-11-0x000000001BBF0000-0x000000001BC46000-memory.dmp

    Filesize

    344KB

  • memory/3308-0-0x00007FF973523000-0x00007FF973525000-memory.dmp

    Filesize

    8KB

  • memory/3308-13-0x000000001B650000-0x000000001B662000-memory.dmp

    Filesize

    72KB

  • memory/3308-14-0x000000001C170000-0x000000001C698000-memory.dmp

    Filesize

    5.2MB

  • memory/3308-5-0x000000001BBA0000-0x000000001BBF0000-memory.dmp

    Filesize

    320KB

  • memory/3308-17-0x000000001BC50000-0x000000001BC5C000-memory.dmp

    Filesize

    48KB

  • memory/3308-16-0x000000001BC40000-0x000000001BC48000-memory.dmp

    Filesize

    32KB

  • memory/3308-19-0x000000001BC70000-0x000000001BC7C000-memory.dmp

    Filesize

    48KB

  • memory/3308-18-0x000000001BC60000-0x000000001BC6E000-memory.dmp

    Filesize

    56KB

  • memory/3308-20-0x000000001BC80000-0x000000001BC8A000-memory.dmp

    Filesize

    40KB

  • memory/3308-21-0x000000001BC90000-0x000000001BC9C000-memory.dmp

    Filesize

    48KB

  • memory/3308-6-0x00000000029C0000-0x00000000029C8000-memory.dmp

    Filesize

    32KB

  • memory/3308-3-0x00000000029B0000-0x00000000029BE000-memory.dmp

    Filesize

    56KB

  • memory/3308-2-0x00007FF973520000-0x00007FF973FE1000-memory.dmp

    Filesize

    10.8MB

  • memory/3308-1-0x00000000005F0000-0x00000000008A4000-memory.dmp

    Filesize

    2.7MB

  • memory/3308-180-0x00007FF973520000-0x00007FF973FE1000-memory.dmp

    Filesize

    10.8MB