Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
11-01-2021 07:36
Static task
static1
Behavioral task
behavioral1
Sample
4ced2056e4efe1c93b9f4adaaeaba20c.exe
Resource
win7v20201028
General
-
Target
4ced2056e4efe1c93b9f4adaaeaba20c.exe
-
Size
607KB
-
MD5
4ced2056e4efe1c93b9f4adaaeaba20c
-
SHA1
b975777c42d7d8fb04c34a2efc64dc5e4c574712
-
SHA256
f6a307d243c407c27489de37adac83e9205be531cbb4e2cb71545627faf813fd
-
SHA512
014df0ad54bf23335f964fa4e313a91b60b3ea2c62b73a306e973177830b573666aaebc1932cafa766042f34b8e32adcfabe3027aae2cc09341fd138a8963eaf
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
resource yara_rule behavioral1/files/0x0003000000013101-16.dat dcrat behavioral1/files/0x0003000000013101-18.dat dcrat behavioral1/files/0x0003000000013101-19.dat dcrat behavioral1/files/0x000300000001311a-30.dat dcrat behavioral1/files/0x000300000001311a-31.dat dcrat -
Disables Task Manager via registry modification
-
Executes dropped EXE 3 IoCs
pid Process 1252 HoykwG9pmLZ7sZbSP8eb.exe 1528 winrar-x84.exe 268 WmiPrvSE.exe -
Loads dropped DLL 2 IoCs
pid Process 1264 cmd.exe 1064 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ipinfo.io 7 ipinfo.io -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\WindowsPowerShell\Modules\csrss.exe winrar-x84.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\886983d96e3d3e31032c679b2d4ea91b6c05afef winrar-x84.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1396 schtasks.exe 1864 schtasks.exe 1388 schtasks.exe 1636 schtasks.exe 1856 schtasks.exe 1188 schtasks.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 544 reg.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1528 winrar-x84.exe 268 WmiPrvSE.exe 268 WmiPrvSE.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1528 winrar-x84.exe Token: SeDebugPrivilege 268 WmiPrvSE.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1184 wrote to memory of 1812 1184 4ced2056e4efe1c93b9f4adaaeaba20c.exe 27 PID 1184 wrote to memory of 1812 1184 4ced2056e4efe1c93b9f4adaaeaba20c.exe 27 PID 1184 wrote to memory of 1812 1184 4ced2056e4efe1c93b9f4adaaeaba20c.exe 27 PID 1184 wrote to memory of 1812 1184 4ced2056e4efe1c93b9f4adaaeaba20c.exe 27 PID 1812 wrote to memory of 1264 1812 WScript.exe 28 PID 1812 wrote to memory of 1264 1812 WScript.exe 28 PID 1812 wrote to memory of 1264 1812 WScript.exe 28 PID 1812 wrote to memory of 1264 1812 WScript.exe 28 PID 1264 wrote to memory of 1252 1264 cmd.exe 30 PID 1264 wrote to memory of 1252 1264 cmd.exe 30 PID 1264 wrote to memory of 1252 1264 cmd.exe 30 PID 1264 wrote to memory of 1252 1264 cmd.exe 30 PID 1252 wrote to memory of 1028 1252 HoykwG9pmLZ7sZbSP8eb.exe 33 PID 1252 wrote to memory of 1028 1252 HoykwG9pmLZ7sZbSP8eb.exe 33 PID 1252 wrote to memory of 1028 1252 HoykwG9pmLZ7sZbSP8eb.exe 33 PID 1252 wrote to memory of 1028 1252 HoykwG9pmLZ7sZbSP8eb.exe 33 PID 1028 wrote to memory of 1064 1028 WScript.exe 34 PID 1028 wrote to memory of 1064 1028 WScript.exe 34 PID 1028 wrote to memory of 1064 1028 WScript.exe 34 PID 1028 wrote to memory of 1064 1028 WScript.exe 34 PID 1064 wrote to memory of 1528 1064 cmd.exe 36 PID 1064 wrote to memory of 1528 1064 cmd.exe 36 PID 1064 wrote to memory of 1528 1064 cmd.exe 36 PID 1064 wrote to memory of 1528 1064 cmd.exe 36 PID 1528 wrote to memory of 1636 1528 winrar-x84.exe 38 PID 1528 wrote to memory of 1636 1528 winrar-x84.exe 38 PID 1528 wrote to memory of 1636 1528 winrar-x84.exe 38 PID 1528 wrote to memory of 1856 1528 winrar-x84.exe 40 PID 1528 wrote to memory of 1856 1528 winrar-x84.exe 40 PID 1528 wrote to memory of 1856 1528 winrar-x84.exe 40 PID 1528 wrote to memory of 1188 1528 winrar-x84.exe 42 PID 1528 wrote to memory of 1188 1528 winrar-x84.exe 42 PID 1528 wrote to memory of 1188 1528 winrar-x84.exe 42 PID 1528 wrote to memory of 1396 1528 winrar-x84.exe 44 PID 1528 wrote to memory of 1396 1528 winrar-x84.exe 44 PID 1528 wrote to memory of 1396 1528 winrar-x84.exe 44 PID 1528 wrote to memory of 1864 1528 winrar-x84.exe 46 PID 1528 wrote to memory of 1864 1528 winrar-x84.exe 46 PID 1528 wrote to memory of 1864 1528 winrar-x84.exe 46 PID 1528 wrote to memory of 1388 1528 winrar-x84.exe 48 PID 1528 wrote to memory of 1388 1528 winrar-x84.exe 48 PID 1528 wrote to memory of 1388 1528 winrar-x84.exe 48 PID 1528 wrote to memory of 268 1528 winrar-x84.exe 50 PID 1528 wrote to memory of 268 1528 winrar-x84.exe 50 PID 1528 wrote to memory of 268 1528 winrar-x84.exe 50 PID 1064 wrote to memory of 544 1064 cmd.exe 51 PID 1064 wrote to memory of 544 1064 cmd.exe 51 PID 1064 wrote to memory of 544 1064 cmd.exe 51 PID 1064 wrote to memory of 544 1064 cmd.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ced2056e4efe1c93b9f4adaaeaba20c.exe"C:\Users\Admin\AppData\Local\Temp\4ced2056e4efe1c93b9f4adaaeaba20c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\WinRAR\wSmIzsMZSTGIPjXygtTeiEZYkIjJjD.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\WinRAR\wAcLjfo4uMcnTa1rAjnz0eLcoo04D9.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Roaming\WinRAR\HoykwG9pmLZ7sZbSP8eb.exeHoykwG9pmLZ7sZbSP8eb.exe -p2e840a597483ac4423c7c5ec1a09b39042cbf75d4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\WinRAR\tPKG2uMJtmCS4Bv6TMepBvdoqxAPGa.vbe"5⤵
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\WinRAR\mQE440b4P9lIBPO3Qboqf8inqaQoJr.bat" "6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Roaming\WinRAR\winrar-x84.exe"C:\Users\Admin\AppData\Roaming\WinRAR\winrar-x84.exe"7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\a7611f42-198c-11eb-8a49-ee401b9e63cb\WmiPrvSE.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1636
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1856
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "wininit" /sc ONLOGON /tr "'C:\PerfLogs\Admin\wininit.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1188
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\csrss.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1396
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\a7611f42-198c-11eb-8a49-ee401b9e63cb\sppsvc.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1864
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\PerfLogs\Admin\WmiPrvSE.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1388
-
-
C:\PerfLogs\Admin\WmiPrvSE.exe"C:\PerfLogs\Admin\WmiPrvSE.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f7⤵
- Modifies registry key
PID:544
-
-
-
-
-
-