Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:12 UTC

General

  • Target

    7286d086dc442793539e770e59762d9c65e219c1f748ec7ce09684971954e16f.exe

  • Size

    3.3MB

  • MD5

    eb76f554fb6b7b172e6042096d7a42c4

  • SHA1

    54249e327afe53b67e76569f622100b532c3f794

  • SHA256

    7286d086dc442793539e770e59762d9c65e219c1f748ec7ce09684971954e16f

  • SHA512

    2a972d9b2237da9ac53140d5f32d18235a1a8e22a7c8c21f2b8472b5e9a00a2134f1db67231331f42b427925b760def2c9e54bf6d62bffaf06d509460154d063

  • SSDEEP

    49152:7s51kZEsvhP4KUYTMb5C1JyWdLQqFxLCobXK45p4aE:7s5eaKhgKUFCo2LP15s

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • UAC bypass 3 TTPs 12 IoCs
  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • System policy modification 1 TTPs 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7286d086dc442793539e770e59762d9c65e219c1f748ec7ce09684971954e16f.exe
    "C:\Users\Admin\AppData\Local\Temp\7286d086dc442793539e770e59762d9c65e219c1f748ec7ce09684971954e16f.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2392
    • C:\Users\Default User\sppsvc.exe
      "C:\Users\Default User\sppsvc.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2520
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8290322d-ad52-4d71-964f-313a68d7dbf8.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1660
        • C:\Users\Default User\sppsvc.exe
          "C:\Users\Default User\sppsvc.exe"
          4⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2640
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\145cfce1-a923-4f27-9106-4123b2ee375f.vbs"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2304
            • C:\Users\Default User\sppsvc.exe
              "C:\Users\Default User\sppsvc.exe"
              6⤵
              • UAC bypass
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:1336
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\48580543-2b20-4dc6-8cd2-45f859885ef8.vbs"
                7⤵
                  PID:1612
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\86d713f4-844a-438e-b88d-0343eb0c2106.vbs"
                  7⤵
                    PID:2392
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e1c6b469-0ffd-445b-b11b-7e8f77aad3f8.vbs"
                5⤵
                  PID:2764
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\aa1b7e1c-b7cb-404e-938f-eff329d4b609.vbs"
              3⤵
                PID:2228
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Google\Temp\winlogon.exe'" /f
            1⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2924
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Temp\winlogon.exe'" /rl HIGHEST /f
            1⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2892
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Google\Temp\winlogon.exe'" /rl HIGHEST /f
            1⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2716
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows NT\winlogon.exe'" /f
            1⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2972
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Windows NT\winlogon.exe'" /rl HIGHEST /f
            1⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2692
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows NT\winlogon.exe'" /rl HIGHEST /f
            1⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2744
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\sppsvc.exe'" /f
            1⤵
            • Scheduled Task/Job: Scheduled Task
            PID:840
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default User\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2288
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • Scheduled Task/Job: Scheduled Task
            PID:624
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Recovery\8490d022-e5e1-11ef-8fd8-4a893fa2fe1c\csrss.exe'" /f
            1⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1248
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\8490d022-e5e1-11ef-8fd8-4a893fa2fe1c\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Scheduled Task/Job: Scheduled Task
            PID:3040
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Recovery\8490d022-e5e1-11ef-8fd8-4a893fa2fe1c\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Scheduled Task/Job: Scheduled Task
            PID:3012
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Recovery\8490d022-e5e1-11ef-8fd8-4a893fa2fe1c\csrss.exe'" /f
            1⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2592
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\8490d022-e5e1-11ef-8fd8-4a893fa2fe1c\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Scheduled Task/Job: Scheduled Task
            PID:796
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Recovery\8490d022-e5e1-11ef-8fd8-4a893fa2fe1c\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2908

          Network

          • flag-us
            DNS
            a1087172.xsph.ru
            sppsvc.exe
            Remote address:
            8.8.8.8:53
            Request
            a1087172.xsph.ru
            IN A
            Response
            a1087172.xsph.ru
            IN A
            141.8.197.42
          • 141.8.197.42:80
            a1087172.xsph.ru
            sppsvc.exe
            152 B
            3
          • 141.8.197.42:80
            a1087172.xsph.ru
            sppsvc.exe
            152 B
            3
          • 141.8.197.42:80
            a1087172.xsph.ru
            sppsvc.exe
            152 B
            3
          • 141.8.197.42:80
            a1087172.xsph.ru
            sppsvc.exe
            152 B
            3
          • 141.8.197.42:80
            a1087172.xsph.ru
            sppsvc.exe
            152 B
            3
          • 141.8.197.42:80
            a1087172.xsph.ru
            sppsvc.exe
            104 B
            2
          • 8.8.8.8:53
            a1087172.xsph.ru
            dns
            sppsvc.exe
            62 B
            78 B
            1
            1

            DNS Request

            a1087172.xsph.ru

            DNS Response

            141.8.197.42

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Google\Temp\winlogon.exe

            Filesize

            3.3MB

            MD5

            c401cdee7921fecf11c7e5d830a7ee5b

            SHA1

            0ee402c74a73863627d82306e126d3474c6b1214

            SHA256

            fb65fe1a80d7f9c89595c39dbcf69097fe777729b331daaa39dd669cd414125d

            SHA512

            1678e0fb230ebcca08e94fb39b70ad274b89dfc4a08fc2a2f786dfdffa432421e7fbfb48224d1de747bc41ef7200eb570e77cf2129c594ad230b83ead6bd9532

          • C:\Program Files\Windows NT\winlogon.exe

            Filesize

            3.3MB

            MD5

            4fe7d8433f567d7f884734e2aaef7fd0

            SHA1

            80f77ae1f514871bd8f7ec8f95105ef06cf8d90a

            SHA256

            da5c414cc182b010f11c837001915c1c1b583895ec26eb85b888147d09d83332

            SHA512

            9992c49172848c7c45c67f2cd32bf8bafc1b3eae55d2e3532e726716ed2c268dc9e4fba1e4de254bc6ff9f82f2dbcae59ce32b083dfe6e6e891f000a5cc87074

          • C:\Recovery\8490d022-e5e1-11ef-8fd8-4a893fa2fe1c\csrss.exe

            Filesize

            3.3MB

            MD5

            eb76f554fb6b7b172e6042096d7a42c4

            SHA1

            54249e327afe53b67e76569f622100b532c3f794

            SHA256

            7286d086dc442793539e770e59762d9c65e219c1f748ec7ce09684971954e16f

            SHA512

            2a972d9b2237da9ac53140d5f32d18235a1a8e22a7c8c21f2b8472b5e9a00a2134f1db67231331f42b427925b760def2c9e54bf6d62bffaf06d509460154d063

          • C:\Users\Admin\AppData\Local\Temp\145cfce1-a923-4f27-9106-4123b2ee375f.vbs

            Filesize

            708B

            MD5

            df60611e709901b0b727d6e2e90fefe5

            SHA1

            28e856b110a0d0bca5427bd89786d60f265526b2

            SHA256

            fcbddf8ec28a50a6c3e06eb819c85b53fc8fb10eb2d798654f2692e3447d5ba1

            SHA512

            b9eafba5874330522b40f97e2accbe8677c50c011bf72cf43e7831d8240ec7b4927ead5a0c33d64bae4f4613015328e1313caf0b1419b74be6eaa25990517314

          • C:\Users\Admin\AppData\Local\Temp\48580543-2b20-4dc6-8cd2-45f859885ef8.vbs

            Filesize

            708B

            MD5

            c14f6753e6a1049ccdba523c68bc8d26

            SHA1

            c90155779527e83d1818a4c139d18d265e675af4

            SHA256

            bbe8d03ad6028f8e4c6af85d2c36ce38bc08bab4da9d606119f1c116f44a1d04

            SHA512

            2b9112b18d670576812a10ef24c5e265faad9d40aa8394a1354de617447c060d89ca5325dbb457bb178764c0572f2e3d8137dd0edfabbb7f4fc42dff7577160b

          • C:\Users\Admin\AppData\Local\Temp\8290322d-ad52-4d71-964f-313a68d7dbf8.vbs

            Filesize

            708B

            MD5

            df7d2e91b825e2d82f57beb4f07218d0

            SHA1

            cab57be1f552ce413c3cd55ff9e7562c248f733b

            SHA256

            5d3b75600bb160b023c4369e3d61c4efcd51afeda0fd12640905396badbae1df

            SHA512

            fbfd3202b3d7402c02552899f769069141136d5d091c8f44f1ff6fbe4f49d2c563216f643248be8db3d089bff33ce0706c5f20bc3e518dedacd0f6178e6906df

          • C:\Users\Admin\AppData\Local\Temp\aa1b7e1c-b7cb-404e-938f-eff329d4b609.vbs

            Filesize

            484B

            MD5

            a3d676e2e179f9b869df799392f4c264

            SHA1

            6d857a007958c66b4a9bfb6aad3b533b0c996e49

            SHA256

            15bef1083be8cd175f3b1d81315336328a1b363928a5505a6b2ed82b78645270

            SHA512

            dbcb6554fd6ed583b1c4d94d148faa2c737588f82c31df52bd54bdf9007563754d5e9736865afd5d959b4337725aee1e593e3ba2c92f727e98ce9f4df876f471

          • memory/1336-133-0x0000000002220000-0x0000000002232000-memory.dmp

            Filesize

            72KB

          • memory/1336-132-0x0000000000900000-0x0000000000956000-memory.dmp

            Filesize

            344KB

          • memory/2392-12-0x0000000000820000-0x000000000082A000-memory.dmp

            Filesize

            40KB

          • memory/2392-26-0x0000000002540000-0x000000000254A000-memory.dmp

            Filesize

            40KB

          • memory/2392-11-0x0000000000850000-0x0000000000860000-memory.dmp

            Filesize

            64KB

          • memory/2392-0-0x000007FEF5EB3000-0x000007FEF5EB4000-memory.dmp

            Filesize

            4KB

          • memory/2392-13-0x00000000024D0000-0x0000000002526000-memory.dmp

            Filesize

            344KB

          • memory/2392-14-0x0000000000840000-0x000000000084C000-memory.dmp

            Filesize

            48KB

          • memory/2392-15-0x0000000000860000-0x0000000000868000-memory.dmp

            Filesize

            32KB

          • memory/2392-16-0x0000000000880000-0x000000000088C000-memory.dmp

            Filesize

            48KB

          • memory/2392-18-0x00000000008A0000-0x00000000008B2000-memory.dmp

            Filesize

            72KB

          • memory/2392-17-0x0000000000890000-0x0000000000898000-memory.dmp

            Filesize

            32KB

          • memory/2392-19-0x00000000008B0000-0x00000000008BC000-memory.dmp

            Filesize

            48KB

          • memory/2392-21-0x0000000002420000-0x0000000002428000-memory.dmp

            Filesize

            32KB

          • memory/2392-22-0x0000000002430000-0x000000000243C000-memory.dmp

            Filesize

            48KB

          • memory/2392-20-0x0000000000960000-0x000000000096C000-memory.dmp

            Filesize

            48KB

          • memory/2392-23-0x0000000002440000-0x000000000244C000-memory.dmp

            Filesize

            48KB

          • memory/2392-25-0x0000000002530000-0x000000000253C000-memory.dmp

            Filesize

            48KB

          • memory/2392-29-0x0000000002570000-0x000000000257E000-memory.dmp

            Filesize

            56KB

          • memory/2392-28-0x0000000002560000-0x0000000002568000-memory.dmp

            Filesize

            32KB

          • memory/2392-27-0x0000000002550000-0x000000000255E000-memory.dmp

            Filesize

            56KB

          • memory/2392-8-0x00000000007F0000-0x0000000000806000-memory.dmp

            Filesize

            88KB

          • memory/2392-34-0x000000001AE50000-0x000000001AE5C000-memory.dmp

            Filesize

            48KB

          • memory/2392-33-0x000000001AE40000-0x000000001AE4A000-memory.dmp

            Filesize

            40KB

          • memory/2392-32-0x000000001AE30000-0x000000001AE38000-memory.dmp

            Filesize

            32KB

          • memory/2392-9-0x0000000000810000-0x0000000000818000-memory.dmp

            Filesize

            32KB

          • memory/2392-31-0x000000001AA10000-0x000000001AA1C000-memory.dmp

            Filesize

            48KB

          • memory/2392-30-0x000000001AA00000-0x000000001AA08000-memory.dmp

            Filesize

            32KB

          • memory/2392-24-0x0000000002520000-0x0000000002528000-memory.dmp

            Filesize

            32KB

          • memory/2392-10-0x0000000000830000-0x0000000000842000-memory.dmp

            Filesize

            72KB

          • memory/2392-4-0x00000000002D0000-0x00000000002D8000-memory.dmp

            Filesize

            32KB

          • memory/2392-107-0x000007FEF5EB0000-0x000007FEF689C000-memory.dmp

            Filesize

            9.9MB

          • memory/2392-1-0x0000000000300000-0x000000000064E000-memory.dmp

            Filesize

            3.3MB

          • memory/2392-2-0x000007FEF5EB0000-0x000007FEF689C000-memory.dmp

            Filesize

            9.9MB

          • memory/2392-3-0x00000000002C0000-0x00000000002CE000-memory.dmp

            Filesize

            56KB

          • memory/2392-6-0x00000000007D0000-0x00000000007D8000-memory.dmp

            Filesize

            32KB

          • memory/2392-7-0x00000000007E0000-0x00000000007F0000-memory.dmp

            Filesize

            64KB

          • memory/2392-5-0x00000000002E0000-0x00000000002FC000-memory.dmp

            Filesize

            112KB

          • memory/2520-109-0x0000000002300000-0x0000000002356000-memory.dmp

            Filesize

            344KB

          • memory/2520-108-0x00000000022F0000-0x0000000002302000-memory.dmp

            Filesize

            72KB

          • memory/2520-106-0x0000000000A90000-0x0000000000DDE000-memory.dmp

            Filesize

            3.3MB

          • memory/2640-120-0x00000000001A0000-0x00000000004EE000-memory.dmp

            Filesize

            3.3MB

          We care about your privacy.

          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.