Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
11-01-2021 07:36
Static task
static1
Behavioral task
behavioral1
Sample
4ced2056e4efe1c93b9f4adaaeaba20c.exe
Resource
win7v20201028
General
-
Target
4ced2056e4efe1c93b9f4adaaeaba20c.exe
-
Size
607KB
-
MD5
4ced2056e4efe1c93b9f4adaaeaba20c
-
SHA1
b975777c42d7d8fb04c34a2efc64dc5e4c574712
-
SHA256
f6a307d243c407c27489de37adac83e9205be531cbb4e2cb71545627faf813fd
-
SHA512
014df0ad54bf23335f964fa4e313a91b60b3ea2c62b73a306e973177830b573666aaebc1932cafa766042f34b8e32adcfabe3027aae2cc09341fd138a8963eaf
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
resource yara_rule behavioral2/files/0x00020000000152e1-15.dat dcrat behavioral2/files/0x00020000000152e1-16.dat dcrat behavioral2/files/0x000100000001ab78-28.dat dcrat behavioral2/files/0x000100000001ab78-29.dat dcrat -
Disables Task Manager via registry modification
-
Executes dropped EXE 3 IoCs
pid Process 808 HoykwG9pmLZ7sZbSP8eb.exe 4364 winrar-x84.exe 2476 fontdrvhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 ipinfo.io 20 ipinfo.io 21 ipinfo.io -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\System\fontdrvhost.exe winrar-x84.exe File created C:\Windows\System\5b884080fd4f94e2695da25c503f9e33b9605b83 winrar-x84.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 996 schtasks.exe 1152 schtasks.exe 1404 schtasks.exe 1488 schtasks.exe 1688 schtasks.exe 1964 schtasks.exe 2224 schtasks.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings 4ced2056e4efe1c93b9f4adaaeaba20c.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings HoykwG9pmLZ7sZbSP8eb.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4508 reg.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4364 winrar-x84.exe 2476 fontdrvhost.exe 2476 fontdrvhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4364 winrar-x84.exe Token: SeDebugPrivilege 2476 fontdrvhost.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4648 wrote to memory of 1640 4648 4ced2056e4efe1c93b9f4adaaeaba20c.exe 74 PID 4648 wrote to memory of 1640 4648 4ced2056e4efe1c93b9f4adaaeaba20c.exe 74 PID 4648 wrote to memory of 1640 4648 4ced2056e4efe1c93b9f4adaaeaba20c.exe 74 PID 1640 wrote to memory of 4208 1640 WScript.exe 76 PID 1640 wrote to memory of 4208 1640 WScript.exe 76 PID 1640 wrote to memory of 4208 1640 WScript.exe 76 PID 4208 wrote to memory of 808 4208 cmd.exe 78 PID 4208 wrote to memory of 808 4208 cmd.exe 78 PID 4208 wrote to memory of 808 4208 cmd.exe 78 PID 808 wrote to memory of 3088 808 HoykwG9pmLZ7sZbSP8eb.exe 79 PID 808 wrote to memory of 3088 808 HoykwG9pmLZ7sZbSP8eb.exe 79 PID 808 wrote to memory of 3088 808 HoykwG9pmLZ7sZbSP8eb.exe 79 PID 3088 wrote to memory of 1868 3088 WScript.exe 82 PID 3088 wrote to memory of 1868 3088 WScript.exe 82 PID 3088 wrote to memory of 1868 3088 WScript.exe 82 PID 1868 wrote to memory of 4364 1868 cmd.exe 84 PID 1868 wrote to memory of 4364 1868 cmd.exe 84 PID 4364 wrote to memory of 996 4364 winrar-x84.exe 87 PID 4364 wrote to memory of 996 4364 winrar-x84.exe 87 PID 4364 wrote to memory of 1152 4364 winrar-x84.exe 89 PID 4364 wrote to memory of 1152 4364 winrar-x84.exe 89 PID 4364 wrote to memory of 1404 4364 winrar-x84.exe 91 PID 4364 wrote to memory of 1404 4364 winrar-x84.exe 91 PID 4364 wrote to memory of 1488 4364 winrar-x84.exe 93 PID 4364 wrote to memory of 1488 4364 winrar-x84.exe 93 PID 4364 wrote to memory of 1688 4364 winrar-x84.exe 95 PID 4364 wrote to memory of 1688 4364 winrar-x84.exe 95 PID 4364 wrote to memory of 1964 4364 winrar-x84.exe 97 PID 4364 wrote to memory of 1964 4364 winrar-x84.exe 97 PID 4364 wrote to memory of 2224 4364 winrar-x84.exe 99 PID 4364 wrote to memory of 2224 4364 winrar-x84.exe 99 PID 4364 wrote to memory of 2476 4364 winrar-x84.exe 101 PID 4364 wrote to memory of 2476 4364 winrar-x84.exe 101 PID 1868 wrote to memory of 4508 1868 cmd.exe 102 PID 1868 wrote to memory of 4508 1868 cmd.exe 102 PID 1868 wrote to memory of 4508 1868 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ced2056e4efe1c93b9f4adaaeaba20c.exe"C:\Users\Admin\AppData\Local\Temp\4ced2056e4efe1c93b9f4adaaeaba20c.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\WinRAR\wSmIzsMZSTGIPjXygtTeiEZYkIjJjD.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\WinRAR\wAcLjfo4uMcnTa1rAjnz0eLcoo04D9.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Roaming\WinRAR\HoykwG9pmLZ7sZbSP8eb.exeHoykwG9pmLZ7sZbSP8eb.exe -p2e840a597483ac4423c7c5ec1a09b39042cbf75d4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\WinRAR\tPKG2uMJtmCS4Bv6TMepBvdoqxAPGa.vbe"5⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\WinRAR\mQE440b4P9lIBPO3Qboqf8inqaQoJr.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Roaming\WinRAR\winrar-x84.exe"C:\Users\Admin\AppData\Roaming\WinRAR\winrar-x84.exe"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Idle" /sc ONLOGON /tr "'C:\ProgramData\Microsoft\Speech_OneCore\Idle.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:996
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "explorer" /sc ONLOGON /tr "'C:\odt\explorer.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1152
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "dllhost" /sc ONLOGON /tr "'C:\odt\dllhost.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1404
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Admin\Desktop\dwm.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1488
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1688
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\Desktop\sppsvc.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1964
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System\fontdrvhost.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:2224
-
-
C:\Windows\System\fontdrvhost.exe"C:\Windows\System\fontdrvhost.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f7⤵
- Modifies registry key
PID:4508
-
-
-
-
-
-