Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-02-2021 02:53
Static task
static1
Behavioral task
behavioral1
Sample
4yQyNsXLvwdE7h0o12Rg.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
4yQyNsXLvwdE7h0o12Rg.exe
Resource
win10v20201028
General
-
Target
4yQyNsXLvwdE7h0o12Rg.exe
-
Size
684KB
-
MD5
5786034e260eabfd710772bcfa97bc95
-
SHA1
a5699e485d73471ecc45da327976aa6d2d2ac2cc
-
SHA256
1840872e8117b0efa252bc324ae2944d5c5b9242c928e3a568ccde06354eec35
-
SHA512
a4ce8ffb2e3d4d3104900ba68184d92cfe94f0e7cf4ee8834eec7838769e7e0775b964c09010b9f047c70012adb1850cefcb385c7a7f7c7ad735e7fa82c0f070
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
resource yara_rule behavioral1/files/0x00030000000130d6-22.dat dcrat behavioral1/files/0x00030000000130d6-24.dat dcrat behavioral1/files/0x00030000000130d6-25.dat dcrat behavioral1/files/0x00030000000130e2-35.dat dcrat behavioral1/files/0x00030000000130e2-36.dat dcrat -
Executes dropped EXE 3 IoCs
pid Process 1720 TvyV4sMJtQ2q43rckgWS.exe 992 reviewcommon.exe 1736 services.exe -
Loads dropped DLL 2 IoCs
pid Process 1960 cmd.exe 1928 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\TAPI\\lsm.exe\"" reviewcommon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\dlldhcp\\lsm.exe\"" reviewcommon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Users\\All Users\\Microsoft Help\\services.exe\"" reviewcommon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Recovery\\9f428062-1991-11eb-b2ba-ee401b9e63cb\\spoolsv.exe\"" reviewcommon.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ipinfo.io 6 ipinfo.io 7 ipinfo.io -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\TAPI\lsm.exe reviewcommon.exe File created C:\Windows\TAPI\101b941d020240259ca4912829b53995ad543df6 reviewcommon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1160 schtasks.exe 1428 schtasks.exe 1580 schtasks.exe 1816 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 992 reviewcommon.exe 1736 services.exe 1736 services.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1736 services.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 992 reviewcommon.exe Token: SeDebugPrivilege 1736 services.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1520 1908 4yQyNsXLvwdE7h0o12Rg.exe 26 PID 1908 wrote to memory of 1520 1908 4yQyNsXLvwdE7h0o12Rg.exe 26 PID 1908 wrote to memory of 1520 1908 4yQyNsXLvwdE7h0o12Rg.exe 26 PID 1908 wrote to memory of 1520 1908 4yQyNsXLvwdE7h0o12Rg.exe 26 PID 1520 wrote to memory of 1960 1520 WScript.exe 27 PID 1520 wrote to memory of 1960 1520 WScript.exe 27 PID 1520 wrote to memory of 1960 1520 WScript.exe 27 PID 1520 wrote to memory of 1960 1520 WScript.exe 27 PID 1960 wrote to memory of 1720 1960 cmd.exe 29 PID 1960 wrote to memory of 1720 1960 cmd.exe 29 PID 1960 wrote to memory of 1720 1960 cmd.exe 29 PID 1960 wrote to memory of 1720 1960 cmd.exe 29 PID 1720 wrote to memory of 1764 1720 TvyV4sMJtQ2q43rckgWS.exe 30 PID 1720 wrote to memory of 1764 1720 TvyV4sMJtQ2q43rckgWS.exe 30 PID 1720 wrote to memory of 1764 1720 TvyV4sMJtQ2q43rckgWS.exe 30 PID 1720 wrote to memory of 1764 1720 TvyV4sMJtQ2q43rckgWS.exe 30 PID 1764 wrote to memory of 1928 1764 WScript.exe 34 PID 1764 wrote to memory of 1928 1764 WScript.exe 34 PID 1764 wrote to memory of 1928 1764 WScript.exe 34 PID 1764 wrote to memory of 1928 1764 WScript.exe 34 PID 1928 wrote to memory of 992 1928 cmd.exe 36 PID 1928 wrote to memory of 992 1928 cmd.exe 36 PID 1928 wrote to memory of 992 1928 cmd.exe 36 PID 1928 wrote to memory of 992 1928 cmd.exe 36 PID 992 wrote to memory of 1160 992 reviewcommon.exe 38 PID 992 wrote to memory of 1160 992 reviewcommon.exe 38 PID 992 wrote to memory of 1160 992 reviewcommon.exe 38 PID 992 wrote to memory of 1428 992 reviewcommon.exe 40 PID 992 wrote to memory of 1428 992 reviewcommon.exe 40 PID 992 wrote to memory of 1428 992 reviewcommon.exe 40 PID 992 wrote to memory of 1580 992 reviewcommon.exe 42 PID 992 wrote to memory of 1580 992 reviewcommon.exe 42 PID 992 wrote to memory of 1580 992 reviewcommon.exe 42 PID 992 wrote to memory of 1816 992 reviewcommon.exe 44 PID 992 wrote to memory of 1816 992 reviewcommon.exe 44 PID 992 wrote to memory of 1816 992 reviewcommon.exe 44 PID 992 wrote to memory of 1736 992 reviewcommon.exe 46 PID 992 wrote to memory of 1736 992 reviewcommon.exe 46 PID 992 wrote to memory of 1736 992 reviewcommon.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\4yQyNsXLvwdE7h0o12Rg.exe"C:\Users\Admin\AppData\Local\Temp\4yQyNsXLvwdE7h0o12Rg.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\dlldhcp\pb9Gu3tG7NmOc5Gajm8xMQsWHj1XvE.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\dlldhcp\Ovv4WrUEEOrKRGuaUIBYpelkPalQwD.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\dlldhcp\TvyV4sMJtQ2q43rckgWS.exeTvyV4sMJtQ2q43rckgWS.exe -p55ff48c21c9494a5d9e8edfacff40e98a5e08b854⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\dlldhcp\06OXEbc57sIIel2pT7VSFVSjXXmfRt.vbe"5⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\dlldhcp\M2pBQ8CVzpBi7EtxSagzVS7Rsq03Qh.bat" "6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\dlldhcp\reviewcommon.exe"C:\dlldhcp\reviewcommon.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\9f428062-1991-11eb-b2ba-ee401b9e63cb\spoolsv.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1160
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\TAPI\lsm.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1428
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "lsm" /sc ONLOGON /tr "'C:\dlldhcp\lsm.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1580
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "services" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft Help\services.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1816
-
-
C:\Users\All Users\Microsoft Help\services.exe"C:\Users\All Users\Microsoft Help\services.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
-
-
-
-
-