Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:12

General

  • Target

    7286d086dc442793539e770e59762d9c65e219c1f748ec7ce09684971954e16f.exe

  • Size

    3.3MB

  • MD5

    eb76f554fb6b7b172e6042096d7a42c4

  • SHA1

    54249e327afe53b67e76569f622100b532c3f794

  • SHA256

    7286d086dc442793539e770e59762d9c65e219c1f748ec7ce09684971954e16f

  • SHA512

    2a972d9b2237da9ac53140d5f32d18235a1a8e22a7c8c21f2b8472b5e9a00a2134f1db67231331f42b427925b760def2c9e54bf6d62bffaf06d509460154d063

  • SSDEEP

    49152:7s51kZEsvhP4KUYTMb5C1JyWdLQqFxLCobXK45p4aE:7s5eaKhgKUFCo2LP15s

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 9 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 12 IoCs
  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • System policy modification 1 TTPs 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7286d086dc442793539e770e59762d9c65e219c1f748ec7ce09684971954e16f.exe
    "C:\Users\Admin\AppData\Local\Temp\7286d086dc442793539e770e59762d9c65e219c1f748ec7ce09684971954e16f.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:5664
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\q7RH5Uwztf.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1084
        • C:\Users\All Users\Oracle\Java\.oracle_jre_usage\TextInputHost.exe
          "C:\Users\All Users\Oracle\Java\.oracle_jre_usage\TextInputHost.exe"
          3⤵
          • UAC bypass
          • Checks computer location settings
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:6048
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1d88829f-a6a5-4eab-92d7-7bb5ba0c2292.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:656
            • C:\Users\All Users\Oracle\Java\.oracle_jre_usage\TextInputHost.exe
              "C:\Users\All Users\Oracle\Java\.oracle_jre_usage\TextInputHost.exe"
              5⤵
              • UAC bypass
              • Checks computer location settings
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:804
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4c341c7b-d9f3-4b5c-84e0-5f9b4c868b12.vbs"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4456
                • C:\Users\All Users\Oracle\Java\.oracle_jre_usage\TextInputHost.exe
                  "C:\Users\All Users\Oracle\Java\.oracle_jre_usage\TextInputHost.exe"
                  7⤵
                  • UAC bypass
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  • System policy modification
                  PID:4800
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c3de2e02-ea74-476e-99f5-a7e1047b8261.vbs"
                    8⤵
                      PID:3780
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\add51a24-1771-4d4b-acbc-bc2789458c8f.vbs"
                      8⤵
                        PID:1520
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d1b150eb-4a84-4d6d-bea3-2881f16809a0.vbs"
                    6⤵
                      PID:5324
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\495ff9e9-3109-4952-afd1-7a6bee6e7a06.vbs"
                  4⤵
                    PID:5380
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Oracle\Java\.oracle_jre_usage\TextInputHost.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4732
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Users\All Users\Oracle\Java\.oracle_jre_usage\TextInputHost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2240
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Oracle\Java\.oracle_jre_usage\TextInputHost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3692
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Downloads\StartMenuExperienceHost.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2544
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\Admin\Downloads\StartMenuExperienceHost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3652
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Downloads\StartMenuExperienceHost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4180
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Start Menu\RuntimeBroker.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2180
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Admin\Start Menu\RuntimeBroker.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:884
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Start Menu\RuntimeBroker.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2304

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TextInputHost.exe.log

              Filesize

              1KB

              MD5

              49b64127208271d8f797256057d0b006

              SHA1

              b99bd7e2b4e9ed24de47fb3341ea67660b84cca1

              SHA256

              2a5d403a2e649d8eceef8f785eeb0f6d33888ec6bbf251b3c347e34cb32b1e77

              SHA512

              f7c728923c893dc9bc88ad2159e0abcda41e1b40ff7e7756e6252d135ed238a2248a2662b3392449836dd1b0b580f0c866cc33e409527484fe4602e3d3f10e3e

            • C:\Users\Admin\AppData\Local\Temp\1d88829f-a6a5-4eab-92d7-7bb5ba0c2292.vbs

              Filesize

              742B

              MD5

              ab65700691d097a44f8bc6cf11e23ac6

              SHA1

              43860a7c37e51e18b47a01d53fc89dfb3a96a092

              SHA256

              54ae9eed6f18368d2d72548b72ccd700a60f38e40cd069b063b34923c65a1fcf

              SHA512

              f94c079754cf47906c0083add797ded7508f2395c0a8cab9f483158175e04e4f80ed78a3530cc4639e5088c8efd03d19197130657ad345e2a0123dbfb75823b2

            • C:\Users\Admin\AppData\Local\Temp\495ff9e9-3109-4952-afd1-7a6bee6e7a06.vbs

              Filesize

              518B

              MD5

              656eb8bc27bb8ea1acf0d786379a84be

              SHA1

              2759a3735918c8b1b5f7e3c97e1426fc4289cfa6

              SHA256

              4a373cd551e18e2f95be9ff7b8ea6c8639a967530692f6260f4133b5f06607f9

              SHA512

              3e04fc85ff44f1175993e4b3c46761f597aea1e09b2102f198305ce5811ba4ba08a044046873064b64e0c9255471d7147387c85d70b2be10bcb17f4d64224136

            • C:\Users\Admin\AppData\Local\Temp\4c341c7b-d9f3-4b5c-84e0-5f9b4c868b12.vbs

              Filesize

              741B

              MD5

              6cd2e9d404f02ac08722eecc928ff432

              SHA1

              a74f068aeeaa367d0866f40cad1163b9e4ca53be

              SHA256

              a025f9bd34ed4d365a904d1566591e10c582a6b5f98e7f88390d85973792f50f

              SHA512

              f20ab01fdf251c63dbca15b1f51902aa8f7cac8833b34012469cc0122c1fe8eb48021cced14fcc1a612eecc963caaee6d0ce7b8b25912f24b6dbdd8c2efb79f3

            • C:\Users\Admin\AppData\Local\Temp\RCX782E.tmp

              Filesize

              3.3MB

              MD5

              eb76f554fb6b7b172e6042096d7a42c4

              SHA1

              54249e327afe53b67e76569f622100b532c3f794

              SHA256

              7286d086dc442793539e770e59762d9c65e219c1f748ec7ce09684971954e16f

              SHA512

              2a972d9b2237da9ac53140d5f32d18235a1a8e22a7c8c21f2b8472b5e9a00a2134f1db67231331f42b427925b760def2c9e54bf6d62bffaf06d509460154d063

            • C:\Users\Admin\AppData\Local\Temp\c3de2e02-ea74-476e-99f5-a7e1047b8261.vbs

              Filesize

              742B

              MD5

              87e15073f68255eae6b160298bc41465

              SHA1

              01c902670baf500ca3d72d580998a39ff1a526f2

              SHA256

              9953f4a589074eb504ec6cfd92ef6c83a5ccdebf13daba65f4b0c670ac68bbba

              SHA512

              8acf05e8501151137b717ba4a615f0c73d1973d42b6b178fe7b420c891e71626b78370e5504741813725358f946b38aa0072271401a325cc6edce7242d022c5f

            • C:\Users\Admin\AppData\Local\Temp\q7RH5Uwztf.bat

              Filesize

              231B

              MD5

              47a681321845dbff9d6b7186a129c620

              SHA1

              57f57594dad2da3d01a6ad528a5e03e9fa838fcd

              SHA256

              b69bea4a53b2b0b47378d891e28130fef9d21ec7632fb4e634ab12219dfb38da

              SHA512

              104429d45e3b12052e20ac20be65df52141d79d2623b6c2197f99f2b253f5176b9f5f4a522e487fa87849bbd9a46dcce8be87f28a0d30a6ba572e5b71f5f59c9

            • memory/5664-22-0x000000001BBA0000-0x000000001BBAC000-memory.dmp

              Filesize

              48KB

            • memory/5664-26-0x000000001BCE0000-0x000000001BCE8000-memory.dmp

              Filesize

              32KB

            • memory/5664-9-0x000000001B920000-0x000000001B936000-memory.dmp

              Filesize

              88KB

            • memory/5664-10-0x000000001B940000-0x000000001B948000-memory.dmp

              Filesize

              32KB

            • memory/5664-11-0x000000001BAC0000-0x000000001BAD2000-memory.dmp

              Filesize

              72KB

            • memory/5664-12-0x000000001BAD0000-0x000000001BAE0000-memory.dmp

              Filesize

              64KB

            • memory/5664-13-0x000000001B950000-0x000000001B95A000-memory.dmp

              Filesize

              40KB

            • memory/5664-14-0x000000001BAE0000-0x000000001BB36000-memory.dmp

              Filesize

              344KB

            • memory/5664-15-0x000000001BAB0000-0x000000001BABC000-memory.dmp

              Filesize

              48KB

            • memory/5664-16-0x000000001BB30000-0x000000001BB38000-memory.dmp

              Filesize

              32KB

            • memory/5664-17-0x000000001BB40000-0x000000001BB4C000-memory.dmp

              Filesize

              48KB

            • memory/5664-19-0x000000001BB60000-0x000000001BB72000-memory.dmp

              Filesize

              72KB

            • memory/5664-18-0x000000001BB50000-0x000000001BB58000-memory.dmp

              Filesize

              32KB

            • memory/5664-20-0x000000001C0C0000-0x000000001C5E8000-memory.dmp

              Filesize

              5.2MB

            • memory/5664-21-0x000000001BB90000-0x000000001BB9C000-memory.dmp

              Filesize

              48KB

            • memory/5664-0-0x00007FFBEE303000-0x00007FFBEE305000-memory.dmp

              Filesize

              8KB

            • memory/5664-24-0x000000001BBC0000-0x000000001BBCC000-memory.dmp

              Filesize

              48KB

            • memory/5664-23-0x000000001BBB0000-0x000000001BBB8000-memory.dmp

              Filesize

              32KB

            • memory/5664-25-0x000000001BBD0000-0x000000001BBDC000-memory.dmp

              Filesize

              48KB

            • memory/5664-8-0x000000001B910000-0x000000001B920000-memory.dmp

              Filesize

              64KB

            • memory/5664-27-0x000000001BEF0000-0x000000001BEFC000-memory.dmp

              Filesize

              48KB

            • memory/5664-31-0x000000001BE20000-0x000000001BE2E000-memory.dmp

              Filesize

              56KB

            • memory/5664-30-0x000000001BE10000-0x000000001BE18000-memory.dmp

              Filesize

              32KB

            • memory/5664-33-0x000000001BE40000-0x000000001BE4C000-memory.dmp

              Filesize

              48KB

            • memory/5664-32-0x000000001BE30000-0x000000001BE38000-memory.dmp

              Filesize

              32KB

            • memory/5664-35-0x000000001BE60000-0x000000001BE6A000-memory.dmp

              Filesize

              40KB

            • memory/5664-29-0x000000001BE00000-0x000000001BE0E000-memory.dmp

              Filesize

              56KB

            • memory/5664-28-0x000000001BDF0000-0x000000001BDFA000-memory.dmp

              Filesize

              40KB

            • memory/5664-34-0x000000001BE50000-0x000000001BE58000-memory.dmp

              Filesize

              32KB

            • memory/5664-36-0x000000001BE70000-0x000000001BE7C000-memory.dmp

              Filesize

              48KB

            • memory/5664-7-0x000000001B2F0000-0x000000001B2F8000-memory.dmp

              Filesize

              32KB

            • memory/5664-6-0x000000001B960000-0x000000001B9B0000-memory.dmp

              Filesize

              320KB

            • memory/5664-90-0x00007FFBEE300000-0x00007FFBEEDC1000-memory.dmp

              Filesize

              10.8MB

            • memory/5664-1-0x0000000000370000-0x00000000006BE000-memory.dmp

              Filesize

              3.3MB

            • memory/5664-2-0x00007FFBEE300000-0x00007FFBEEDC1000-memory.dmp

              Filesize

              10.8MB

            • memory/5664-5-0x000000001B2D0000-0x000000001B2EC000-memory.dmp

              Filesize

              112KB

            • memory/5664-4-0x000000001B1B0000-0x000000001B1B8000-memory.dmp

              Filesize

              32KB

            • memory/5664-3-0x000000001B1A0000-0x000000001B1AE000-memory.dmp

              Filesize

              56KB

            • memory/6048-95-0x000000001BE10000-0x000000001BE22000-memory.dmp

              Filesize

              72KB

            • memory/6048-94-0x000000001BC50000-0x000000001BC62000-memory.dmp

              Filesize

              72KB