Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:10

General

  • Target

    4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8.exe

  • Size

    984KB

  • MD5

    bf8b1d73a37f97278df6d25ee245e3a9

  • SHA1

    7ad5a5b889a0cbbcf81e69185764596578d0e0b4

  • SHA256

    4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8

  • SHA512

    5d351633f0575ab64b4e47073a0e689780c88d4ce9469f67c539b7946684ef6d54b859a31a7ae486f0ed11fb1939045988bfcd53a089ef4757b78f83148474a5

  • SSDEEP

    12288:zzZvuvewk/0pPPXA5q/TQ9+n95vV25gnwHexSDwbwvDxlpaS98IUNldnd65EgF1s:zzZvuGD2PvA5YxwmbZB6Uv

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 11 IoCs
  • Drops file in System32 directory 11 IoCs
  • Drops file in Program Files directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8.exe
    "C:\Users\Admin\AppData\Local\Temp\4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\J9hm3NTxxH.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1720
        • C:\Users\Admin\AppData\Local\Temp\4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8.exe
          "C:\Users\Admin\AppData\Local\Temp\4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:628
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aLHJMxr28n.bat"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1112
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              5⤵
                PID:1796
              • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe
                "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:444
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPC\OSPPSVC.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2828
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\setupugc\lsm.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2908
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\4fdfbb239de16fb7275a4246ee21f87a0193a6f2fbc4692a347e7e9248d1c1ca\4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2824
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppobjs-spp-plugin-manifest-signed\OSPPSVC.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2188
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8" /sc ONLOGON /tr "'C:\Recovery\8490d022-e5e1-11ef-8fd8-4a893fa2fe1c\4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2732
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\WinSync\spoolsv.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2964
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f
        1⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2868
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Recovery\8490d022-e5e1-11ef-8fd8-4a893fa2fe1c\OSPPSVC.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1452
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2132
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\de-DE\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2168
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\dxtrans\smss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:332

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\taskhost.exe

        Filesize

        984KB

        MD5

        5fe5c9b5b8c38f254ebf7fb3c38b1f2e

        SHA1

        56c9d7bd6165384193b332a04b7f5b18c5625bd5

        SHA256

        fd0f225f9d5d0645094aa9c0bb6812dc453ef15f25b32b344b3ec9c3f0e4674f

        SHA512

        7b18e03b6f0351fbc426d7cc78129a5c14f144e9c506caa45f9e5d3a5e6f308359b25b1ee7a10818676ecb4edc88d75c49c5588b1861136e3b7416eefd4978a5

      • C:\Recovery\8490d022-e5e1-11ef-8fd8-4a893fa2fe1c\4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8.exe

        Filesize

        984KB

        MD5

        bf8b1d73a37f97278df6d25ee245e3a9

        SHA1

        7ad5a5b889a0cbbcf81e69185764596578d0e0b4

        SHA256

        4be84836f68985fd15cbf992a7b0e782d1bab4439960e27c6e252e76a89ce2c8

        SHA512

        5d351633f0575ab64b4e47073a0e689780c88d4ce9469f67c539b7946684ef6d54b859a31a7ae486f0ed11fb1939045988bfcd53a089ef4757b78f83148474a5

      • C:\Users\Admin\AppData\Local\Temp\J9hm3NTxxH.bat

        Filesize

        266B

        MD5

        f53511bd111ed26de8d12d1b403810f4

        SHA1

        91c10cc0b8ecd516abecff468dde91445e94f5ff

        SHA256

        66f0db63da0e7ff36fbb27bd553846fd8892aa66f7cdc4177b7aed924449a9ea

        SHA512

        8c33d6ca103f7a78d2e9ee06b0bac76491e87021dd0403f405aa6eb294945c63a849be4c01ba99cece424bdcfe8ed630d0ff23d9cc1418a43e62b10f3b35c7bb

      • C:\Users\Admin\AppData\Local\Temp\aLHJMxr28n.bat

        Filesize

        239B

        MD5

        9681312d8757db1b2eac7c3a21efb840

        SHA1

        a45e90e7a7de5311c666abc9b7dbe9d8ba4bf070

        SHA256

        b1442f569cabf73e27f31390f68ef84866e7838003302b953dc1fca3c24249d2

        SHA512

        555b87078db0ddc1ab12e8022886af08646dc5b8b2dc874bffa0ce636dea305e66fc4c3a035b0dc660c58ca2f5604830624bf0b9c63e416064df9359925e6969

      • memory/444-109-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

        Filesize

        72KB

      • memory/444-108-0x0000000000DA0000-0x0000000000E9C000-memory.dmp

        Filesize

        1008KB

      • memory/628-84-0x0000000000520000-0x0000000000532000-memory.dmp

        Filesize

        72KB

      • memory/628-83-0x0000000000340000-0x000000000043C000-memory.dmp

        Filesize

        1008KB

      • memory/2624-7-0x00000000005D0000-0x00000000005E0000-memory.dmp

        Filesize

        64KB

      • memory/2624-6-0x0000000000520000-0x0000000000528000-memory.dmp

        Filesize

        32KB

      • memory/2624-5-0x0000000000510000-0x0000000000520000-memory.dmp

        Filesize

        64KB

      • memory/2624-10-0x0000000000A80000-0x0000000000A8C000-memory.dmp

        Filesize

        48KB

      • memory/2624-8-0x0000000000530000-0x000000000053C000-memory.dmp

        Filesize

        48KB

      • memory/2624-81-0x000007FEF5670000-0x000007FEF605C000-memory.dmp

        Filesize

        9.9MB

      • memory/2624-9-0x0000000000540000-0x0000000000552000-memory.dmp

        Filesize

        72KB

      • memory/2624-0-0x000007FEF5673000-0x000007FEF5674000-memory.dmp

        Filesize

        4KB

      • memory/2624-4-0x00000000003D0000-0x00000000003E0000-memory.dmp

        Filesize

        64KB

      • memory/2624-3-0x00000000004F0000-0x000000000050C000-memory.dmp

        Filesize

        112KB

      • memory/2624-2-0x000007FEF5670000-0x000007FEF605C000-memory.dmp

        Filesize

        9.9MB

      • memory/2624-1-0x0000000000CF0000-0x0000000000DEC000-memory.dmp

        Filesize

        1008KB