Analysis

  • max time kernel
    104s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-02-2025 02:00

General

  • Target

    9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8.exe

  • Size

    783KB

  • MD5

    3b1535c8901387dfb2f75e34dfec94c7

  • SHA1

    abb6f0f4aa913f150113cf9bc6740645b3464141

  • SHA256

    9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8

  • SHA512

    7fe2e9bc98bca0e76c3c68ae77b6300870ff6509a0ae5b1732e253aae9e529ff72778cbcdc92826453797bf7b5d0c4c0a74dc5f2e7e82bcd005ffd8aa5ff54c1

  • SSDEEP

    12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqKh:m+OQbpbgsFdAyQvzSqaq8qI

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 16 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 12 IoCs
  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Downloads MZ/PE file 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 16 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Drops file in System32 directory 19 IoCs
  • Drops file in Program Files directory 11 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • System policy modification 1 TTPs 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8.exe
    "C:\Users\Admin\AppData\Local\Temp\9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4144
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mXbBixG6GR.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1056
        • C:\Users\Admin\AppData\Local\Temp\9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8.exe
          "C:\Users\Admin\AppData\Local\Temp\9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8.exe"
          3⤵
          • UAC bypass
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3048
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Rn2dHdwKGU.bat"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:980
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              5⤵
                PID:3604
              • C:\Users\Admin\AppData\Local\Temp\9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8.exe
                "C:\Users\Admin\AppData\Local\Temp\9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8.exe"
                5⤵
                • UAC bypass
                • Checks computer location settings
                • Executes dropped EXE
                • Adds Run key to start application
                • Checks whether UAC is enabled
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:5032
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9qTbodlg7f.bat"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4108
                  • C:\Windows\system32\w32tm.exe
                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                    7⤵
                      PID:3756
                    • C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8.exe
                      "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8.exe"
                      7⤵
                      • UAC bypass
                      • Executes dropped EXE
                      • Checks whether UAC is enabled
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • System policy modification
                      PID:1952
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\PerfLogs\MusNotification.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:776
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\SysWOW64\slmgr\0407\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2900
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClient\OfficeClickToRun.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1996
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-timezone-l1-1-0\OfficeClickToRun.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4856
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Default\Music\explorer.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:5052
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8" /sc ONLOGON /tr "'C:\ProgramData\Application Data\9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:428
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\wdmaud\dwm.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1648
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\splwow64\sysmon.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:468
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Documents and Settings\dwm.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3560
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\ocsetapi\lsass.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4380
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\SyncHost\dwm.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4364
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4352
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\PerfLogs\csrss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4620
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\icfupgd\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4552
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\WinHvPlatform\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4132
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\PerfLogs\winlogon.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4992
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY0MzMiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODc1OTU2NTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTc4ODA5NTQyIi8-PC9hcHA-PC9yZXF1ZXN0Pg
          1⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          PID:3040

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8.exe.log

          Filesize

          1KB

          MD5

          b7c0c43fc7804baaa7dc87152cdc9554

          SHA1

          1bab62bd56af745678d4e967d91e1ccfdeed4038

          SHA256

          46386a61f3aaf1b1c2e6efc9fc7e9e9ff16cd13ae58b8d856835771fedb6d457

          SHA512

          9fda3dd00a3406137e0113f13f78e77b20a76512b35820d38df696842cbbf2e2ebabfb99a3846c9637ecb54af858ec1551521187e379872973006426a253f769

        • C:\Users\Admin\AppData\Local\Temp\9qTbodlg7f.bat

          Filesize

          300B

          MD5

          2e6571857a55f27e03b112c472081b85

          SHA1

          739cbf83f54739823fd94273fad9a104c312619b

          SHA256

          036437a87eda854e38353d3bdcb48ea9bca3a0b586a8bb36bf910b0567acefcb

          SHA512

          7a2ac28aae0e018e58e7759a14893ec2c87dd17bb84ea4c93f8a30d9e8323c9be660119dbb82ef9211b55573e297b345712ff9e6b149d79ed722490cba80a4d3

        • C:\Users\Admin\AppData\Local\Temp\Rn2dHdwKGU.bat

          Filesize

          266B

          MD5

          397f274bfec7b372d6b499f1625a130c

          SHA1

          8453b3f7edb41965ee2531f0b482599bfc84360f

          SHA256

          b1d2f216c8c4f4a4ed2b614a862c7a857aabb2be5dc33d216e736874d0228942

          SHA512

          fc01c55fc2c9788a5c640c9961c0ed735c2a50b4adeb716320be4db04d92f47e0808aeff41f0def324c58a6bfd27d115c8faf2c6e80127b2191e236d17f6dd9b

        • C:\Users\Admin\AppData\Local\Temp\mXbBixG6GR.bat

          Filesize

          266B

          MD5

          841669e2c7e5f3603a5d04aee067b783

          SHA1

          85cfd3e3382e489d9e2f385cc75fd6908622f56e

          SHA256

          a88d3d03e78a4b71ccb67bb56444c8029a7fd4c57f98f9d00043db1a9a4d88ed

          SHA512

          f5713b846d3e3b56194f0555492e65854e161957a3d789fc67b8fb1c727c2d91b4b8fd91bc6f181630a72f24ad22d64bd3d99dce67a5b328fd1c052fdacd501c

        • C:\Users\Default\Music\explorer.exe

          Filesize

          783KB

          MD5

          3b1535c8901387dfb2f75e34dfec94c7

          SHA1

          abb6f0f4aa913f150113cf9bc6740645b3464141

          SHA256

          9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8

          SHA512

          7fe2e9bc98bca0e76c3c68ae77b6300870ff6509a0ae5b1732e253aae9e529ff72778cbcdc92826453797bf7b5d0c4c0a74dc5f2e7e82bcd005ffd8aa5ff54c1

        • memory/1952-145-0x000000001BD80000-0x000000001BE82000-memory.dmp

          Filesize

          1.0MB

        • memory/4144-19-0x000000001BB20000-0x000000001BB28000-memory.dmp

          Filesize

          32KB

        • memory/4144-8-0x000000001BAD0000-0x000000001BADA000-memory.dmp

          Filesize

          40KB

        • memory/4144-13-0x000000001BB30000-0x000000001BB38000-memory.dmp

          Filesize

          32KB

        • memory/4144-14-0x000000001BB00000-0x000000001BB08000-memory.dmp

          Filesize

          32KB

        • memory/4144-17-0x000000001BCC0000-0x000000001BCC8000-memory.dmp

          Filesize

          32KB

        • memory/4144-16-0x000000001BAB0000-0x000000001BAB8000-memory.dmp

          Filesize

          32KB

        • memory/4144-18-0x000000001BC80000-0x000000001BC88000-memory.dmp

          Filesize

          32KB

        • memory/4144-20-0x000000001BC70000-0x000000001BC78000-memory.dmp

          Filesize

          32KB

        • memory/4144-21-0x000000001BC90000-0x000000001BC9C000-memory.dmp

          Filesize

          48KB

        • memory/4144-22-0x000000001BCA0000-0x000000001BCA8000-memory.dmp

          Filesize

          32KB

        • memory/4144-0-0x00007FFE95373000-0x00007FFE95375000-memory.dmp

          Filesize

          8KB

        • memory/4144-15-0x000000001BB50000-0x000000001BB58000-memory.dmp

          Filesize

          32KB

        • memory/4144-11-0x000000001BB10000-0x000000001BB18000-memory.dmp

          Filesize

          32KB

        • memory/4144-12-0x000000001BB40000-0x000000001BB48000-memory.dmp

          Filesize

          32KB

        • memory/4144-5-0x00000000031A0000-0x00000000031B0000-memory.dmp

          Filesize

          64KB

        • memory/4144-4-0x0000000003190000-0x0000000003198000-memory.dmp

          Filesize

          32KB

        • memory/4144-3-0x0000000003180000-0x0000000003188000-memory.dmp

          Filesize

          32KB

        • memory/4144-25-0x00007FFE95370000-0x00007FFE95E31000-memory.dmp

          Filesize

          10.8MB

        • memory/4144-26-0x00007FFE95370000-0x00007FFE95E31000-memory.dmp

          Filesize

          10.8MB

        • memory/4144-10-0x000000001BAA0000-0x000000001BAA8000-memory.dmp

          Filesize

          32KB

        • memory/4144-40-0x00007FFE95370000-0x00007FFE95E31000-memory.dmp

          Filesize

          10.8MB

        • memory/4144-9-0x000000001BAF0000-0x000000001BAFA000-memory.dmp

          Filesize

          40KB

        • memory/4144-87-0x00007FFE95370000-0x00007FFE95E31000-memory.dmp

          Filesize

          10.8MB

        • memory/4144-7-0x00000000031B0000-0x00000000031BC000-memory.dmp

          Filesize

          48KB

        • memory/4144-6-0x000000001BAC0000-0x000000001BAC8000-memory.dmp

          Filesize

          32KB

        • memory/4144-2-0x00007FFE95370000-0x00007FFE95E31000-memory.dmp

          Filesize

          10.8MB

        • memory/4144-1-0x0000000000F60000-0x000000000102A000-memory.dmp

          Filesize

          808KB