Analysis

  • max time kernel
    117s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-02-2025 05:48

General

  • Target

    e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272.exe

  • Size

    769KB

  • MD5

    cf40b5e2332d76b97a1a1a18f89b68ef

  • SHA1

    2c352c7e4521570c3cd7c99a35b715feed866f03

  • SHA256

    e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272

  • SHA512

    27ac673faa2306c572a5600195c08c875c47892df513547cfba91674e37fdd0876c2344662c81ecf00a0b3bbe515e07696b248f64e1221bec4398b3b1cff7f9a

  • SSDEEP

    12288:CvTnXW/cYwVIB/6f/iJJMA+opW3Ari4VVyZC0+1ctHNt8KF4AXDYZ6:CvTn2whf/MJMA+o3iE0n3a6

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • DCRat payload 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272.exe
    "C:\Users\Admin\AppData\Local\Temp\e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kwox43q1\kwox43q1.cmdline"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFDB0.tmp" "c:\Windows\System32\CSC244CAE52654446DA77C518DC5D73A0.TMP"
        3⤵
          PID:1492
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZLEXxwgzZJ.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2604
        • C:\Windows\system32\chcp.com
          chcp 65001
          3⤵
            PID:3036
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:3000
          • C:\Users\Admin\AppData\Local\Temp\e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272.exe
            "C:\Users\Admin\AppData\Local\Temp\e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272.exe"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1192
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Windows\Panther\actionqueue\winlogon.exe'" /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1728
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\Panther\actionqueue\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2684
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Windows\Panther\actionqueue\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2428
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\WmiPrvSE.exe'" /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1336
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:864
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2304
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Windows\PCHEALTH\ERRORREP\QHEADLES\sppsvc.exe'" /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1632
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\PCHEALTH\ERRORREP\QHEADLES\sppsvc.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2176
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Windows\PCHEALTH\ERRORREP\QHEADLES\sppsvc.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2340
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\dwm.exe'" /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2344
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\dwm.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2164
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\dwm.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2180
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\services.exe'" /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2720
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:960
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:316
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272e" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\AppData\Local\Temp\e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272.exe'" /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1820
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3024
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272e" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\AppData\Local\Temp\e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2800

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RESFDB0.tmp

        Filesize

        1KB

        MD5

        d045f4862a2530fc39ca53a8ed78d28d

        SHA1

        f0194fb5d96d8ac22df2e8d838bb397c11058436

        SHA256

        840bfdd608f8c3fcb52042ca9b9d4c5ac5f1313497aa7777dec89b22d3068606

        SHA512

        00e2d252c5e91380e4989d84b938bdb18618d1d8cf44680147a2a00639e5f4ec08e63e0c9e60f9ca69792e7a0393d7afe04744fb7145688901c79f8639669934

      • C:\Users\Admin\AppData\Local\Temp\ZLEXxwgzZJ.bat

        Filesize

        230B

        MD5

        cec2a9179006119b04274ecdf8d64412

        SHA1

        f172131eb8e1196ffd6471750bdf2f5f782ce244

        SHA256

        e02ecab5a3d0676feb1babb785088ec13646dc8fb1f038f74fabf372d2c15945

        SHA512

        834cfefb0ed86394831e62e5980e526534c7fdd59da96cc4af434578ae30867a0f7f04305a834a48b1041b724b4eff9d4260370bda4e317a547b8badc4df8166

      • C:\Windows\Panther\actionqueue\winlogon.exe

        Filesize

        769KB

        MD5

        cf40b5e2332d76b97a1a1a18f89b68ef

        SHA1

        2c352c7e4521570c3cd7c99a35b715feed866f03

        SHA256

        e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272

        SHA512

        27ac673faa2306c572a5600195c08c875c47892df513547cfba91674e37fdd0876c2344662c81ecf00a0b3bbe515e07696b248f64e1221bec4398b3b1cff7f9a

      • \??\c:\Users\Admin\AppData\Local\Temp\kwox43q1\kwox43q1.0.cs

        Filesize

        375B

        MD5

        44cfc5e435b7fd4d2bbccbf84b984a2e

        SHA1

        b164504b0d09366646eb10c157d4f0c413215a1f

        SHA256

        4fe826aa114e7871524a45845fa1790cdeff288fb2f999f952285f9cd47b412c

        SHA512

        81496e5a6f617a8bfc091b9f1ade4cf2f5dc3de1e708c68e7ca34366cc9fa844806930d2596301ab51896de1f96ff81ce92c109c2cb37cc7ccff95b765edc286

      • \??\c:\Users\Admin\AppData\Local\Temp\kwox43q1\kwox43q1.cmdline

        Filesize

        235B

        MD5

        1f2500d652d60c0a45e6086cd3d5d8e9

        SHA1

        3a5be9181557372d66bc493b57ddec32d30005d5

        SHA256

        c6c93ea703bf059ae8ee9ff36b9e4d51ca2bdb5463048012077eb42bcdb555a1

        SHA512

        7edce23f4b0daed49b7b43b3fb85db72b1a2cedbf0ee788d82847dd7a78f1e0a484d1c4c6fbf5c9ba621228c9dcd3a6909a9a41db6161c082edd202123732b27

      • \??\c:\Windows\System32\CSC244CAE52654446DA77C518DC5D73A0.TMP

        Filesize

        1KB

        MD5

        078586b266e519b5c113064d7a0bf45c

        SHA1

        a9395c0ef35add5c75591ebb94c85c1f33f408bf

        SHA256

        ccf292ff9f142b204ad4f4481a044ba8f9ab274305dcb604bf0b8ae91819ab1e

        SHA512

        5b8eb6aad62657309088c4668d633c2aa6324d4824ec32c3c5e133df0a5493a4342c980e077ba565f3aab29c58f95c8db7195415a1e554384405c1457730f959

      • memory/1192-44-0x0000000000060000-0x0000000000126000-memory.dmp

        Filesize

        792KB

      • memory/2812-11-0x0000000000480000-0x000000000048C000-memory.dmp

        Filesize

        48KB

      • memory/2812-24-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp

        Filesize

        9.9MB

      • memory/2812-13-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp

        Filesize

        9.9MB

      • memory/2812-43-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp

        Filesize

        9.9MB

      • memory/2812-9-0x00000000004D0000-0x00000000004E8000-memory.dmp

        Filesize

        96KB

      • memory/2812-7-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp

        Filesize

        9.9MB

      • memory/2812-6-0x00000000004A0000-0x00000000004BC000-memory.dmp

        Filesize

        112KB

      • memory/2812-4-0x0000000000470000-0x000000000047E000-memory.dmp

        Filesize

        56KB

      • memory/2812-2-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp

        Filesize

        9.9MB

      • memory/2812-1-0x0000000000F50000-0x0000000001016000-memory.dmp

        Filesize

        792KB

      • memory/2812-0-0x000007FEF5D53000-0x000007FEF5D54000-memory.dmp

        Filesize

        4KB

      • memory/2812-25-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp

        Filesize

        9.9MB