Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    04-02-2021 02:53

General

  • Target

    4yQyNsXLvwdE7h0o12Rg.exe

  • Size

    684KB

  • MD5

    5786034e260eabfd710772bcfa97bc95

  • SHA1

    a5699e485d73471ecc45da327976aa6d2d2ac2cc

  • SHA256

    1840872e8117b0efa252bc324ae2944d5c5b9242c928e3a568ccde06354eec35

  • SHA512

    a4ce8ffb2e3d4d3104900ba68184d92cfe94f0e7cf4ee8834eec7838769e7e0775b964c09010b9f047c70012adb1850cefcb385c7a7f7c7ad735e7fa82c0f070

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • DC Rat Payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4yQyNsXLvwdE7h0o12Rg.exe
    "C:\Users\Admin\AppData\Local\Temp\4yQyNsXLvwdE7h0o12Rg.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\dlldhcp\pb9Gu3tG7NmOc5Gajm8xMQsWHj1XvE.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\dlldhcp\Ovv4WrUEEOrKRGuaUIBYpelkPalQwD.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\dlldhcp\TvyV4sMJtQ2q43rckgWS.exe
          TvyV4sMJtQ2q43rckgWS.exe -p55ff48c21c9494a5d9e8edfacff40e98a5e08b85
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1720
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\dlldhcp\06OXEbc57sIIel2pT7VSFVSjXXmfRt.vbe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1764
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\dlldhcp\M2pBQ8CVzpBi7EtxSagzVS7Rsq03Qh.bat" "
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1928
              • C:\dlldhcp\reviewcommon.exe
                "C:\dlldhcp\reviewcommon.exe"
                7⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Drops file in Windows directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:992
                • C:\Windows\system32\schtasks.exe
                  "schtasks" /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\9f428062-1991-11eb-b2ba-ee401b9e63cb\spoolsv.exe'" /rl HIGHEST /f
                  8⤵
                  • Creates scheduled task(s)
                  PID:1160
                • C:\Windows\system32\schtasks.exe
                  "schtasks" /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\TAPI\lsm.exe'" /rl HIGHEST /f
                  8⤵
                  • Creates scheduled task(s)
                  PID:1428
                • C:\Windows\system32\schtasks.exe
                  "schtasks" /create /tn "lsm" /sc ONLOGON /tr "'C:\dlldhcp\lsm.exe'" /rl HIGHEST /f
                  8⤵
                  • Creates scheduled task(s)
                  PID:1580
                • C:\Windows\system32\schtasks.exe
                  "schtasks" /create /tn "services" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft Help\services.exe'" /rl HIGHEST /f
                  8⤵
                  • Creates scheduled task(s)
                  PID:1816
                • C:\Users\All Users\Microsoft Help\services.exe
                  "C:\Users\All Users\Microsoft Help\services.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/992-29-0x000000001B490000-0x000000001B492000-memory.dmp

    Filesize

    8KB

  • memory/992-26-0x000007FEF53C0000-0x000007FEF5DAC000-memory.dmp

    Filesize

    9.9MB

  • memory/992-27-0x00000000009C0000-0x00000000009C1000-memory.dmp

    Filesize

    4KB

  • memory/1520-8-0x0000000002750000-0x0000000002754000-memory.dmp

    Filesize

    16KB

  • memory/1720-14-0x00000000024A0000-0x00000000025A1000-memory.dmp

    Filesize

    1.0MB

  • memory/1736-37-0x000007FEF53C0000-0x000007FEF5DAC000-memory.dmp

    Filesize

    9.9MB

  • memory/1736-38-0x0000000000B90000-0x0000000000B91000-memory.dmp

    Filesize

    4KB

  • memory/1736-40-0x000000001B1C0000-0x000000001B1C2000-memory.dmp

    Filesize

    8KB

  • memory/1764-21-0x0000000002560000-0x0000000002564000-memory.dmp

    Filesize

    16KB

  • memory/1908-2-0x0000000076271000-0x0000000076273000-memory.dmp

    Filesize

    8KB