Analysis

  • max time kernel
    24s
  • max time network
    81s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    04/04/2021, 11:52

General

  • Target

    file.exe

  • Size

    126KB

  • MD5

    fdefd1e361d1020577bf018a5a98040c

  • SHA1

    2d7c4cfa15f4cb29ce95e7a59c3089a081a772a2

  • SHA256

    01cb6ab274dc0ac90192b537a606965d98f03d99c95b3a0e24bc6cad724d42c7

  • SHA512

    adb42dc5cc31b95f6e3d463068d57480acb50c80ce49f4fabd0fa87700dda3d92afe543f2569f2e92077afd0d00869c5cdf24902968050132eccd9a230719378

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Taurus Stealer

    Taurus is an infostealer first seen in June 2020.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 4 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 60 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Roaming\4B9B.tmp.exe
      "C:\Users\Admin\AppData\Roaming\4B9B.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1016
      • C:\Windows\system32\msiexec.exe
        -P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 99999
        3⤵
          PID:556
        • C:\Windows\system32\msiexec.exe
          -o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 9999
          3⤵
          • Blocklisted process makes network request
          • Suspicious use of AdjustPrivilegeToken
          PID:2012
      • C:\Users\Admin\AppData\Roaming\4C95.tmp.exe
        "C:\Users\Admin\AppData\Roaming\4C95.tmp.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:316
        • C:\Windows\SysWOW64\cmd.exe
          /c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\4C95.tmp.exe
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1912
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 3
            4⤵
            • Delays execution with timeout.exe
            PID:1308
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\file.exe"
        2⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:1652
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1
          3⤵
          • Runs ping.exe
          PID:1056

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/316-27-0x0000000000400000-0x000000000587C000-memory.dmp

      Filesize

      84.5MB

    • memory/316-18-0x00000000073A0000-0x000000000C81C000-memory.dmp

      Filesize

      84.5MB

    • memory/556-23-0x0000000140000000-0x0000000140383000-memory.dmp

      Filesize

      3.5MB

    • memory/556-16-0x0000000140000000-0x0000000140383000-memory.dmp

      Filesize

      3.5MB

    • memory/904-4-0x000007FEF7D90000-0x000007FEF800A000-memory.dmp

      Filesize

      2.5MB

    • memory/1016-13-0x000007FEFC601000-0x000007FEFC603000-memory.dmp

      Filesize

      8KB

    • memory/1724-17-0x0000000002190000-0x00000000021D8000-memory.dmp

      Filesize

      288KB

    • memory/1724-2-0x0000000000020000-0x000000000002D000-memory.dmp

      Filesize

      52KB

    • memory/1724-3-0x00000000761E1000-0x00000000761E3000-memory.dmp

      Filesize

      8KB

    • memory/2012-26-0x0000000140000000-0x000000014070A000-memory.dmp

      Filesize

      7.0MB

    • memory/2012-31-0x00000000001F0000-0x0000000000210000-memory.dmp

      Filesize

      128KB

    • memory/2012-25-0x0000000140000000-0x000000014070A000-memory.dmp

      Filesize

      7.0MB

    • memory/2012-24-0x0000000000100000-0x0000000000114000-memory.dmp

      Filesize

      80KB

    • memory/2012-20-0x0000000140000000-0x000000014070A000-memory.dmp

      Filesize

      7.0MB