Analysis

  • max time kernel
    136s
  • max time network
    197s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    15-06-2021 18:27

General

  • Target

    8FF7B0B0C35C393F308F987171721BA0.exe

  • Size

    319KB

  • MD5

    8ff7b0b0c35c393f308f987171721ba0

  • SHA1

    b5cf15448f31f9406ae56863569518a203c3bd7c

  • SHA256

    84ad4547b1b6eacb1fa94a456851380b0cdf04a30d5461cf9c7e5dcededd8a1a

  • SHA512

    310afccd6994f9632b5f0387fd189b94f31f07e33cd1404527553130a3f65e81cbcc68c96926e9cf8c8679d278beb3bc96c98ad68a849195e1b51b7977c4fb37

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • DCRat Payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8FF7B0B0C35C393F308F987171721BA0.exe
    "C:\Users\Admin\AppData\Local\Temp\8FF7B0B0C35C393F308F987171721BA0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Documents and Settings\sppsvc.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1464
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\All Users\Adobe\Updater6\winlogon.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1516
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "taskhost" /sc ONLOGON /tr "'C:\Recovery\34107922-98a6-11eb-a15f-ea91f6580701\taskhost.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:624
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\I8R855YKf6.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:752
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:484
        • C:\Windows\system32\PING.EXE
          ping -n 5 localhost
          3⤵
          • Runs ping.exe
          PID:1176
        • C:\Recovery\34107922-98a6-11eb-a15f-ea91f6580701\taskhost.exe
          "C:\Recovery\34107922-98a6-11eb-a15f-ea91f6580701\taskhost.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1880

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\34107922-98a6-11eb-a15f-ea91f6580701\taskhost.exe

      MD5

      8ff7b0b0c35c393f308f987171721ba0

      SHA1

      b5cf15448f31f9406ae56863569518a203c3bd7c

      SHA256

      84ad4547b1b6eacb1fa94a456851380b0cdf04a30d5461cf9c7e5dcededd8a1a

      SHA512

      310afccd6994f9632b5f0387fd189b94f31f07e33cd1404527553130a3f65e81cbcc68c96926e9cf8c8679d278beb3bc96c98ad68a849195e1b51b7977c4fb37

    • C:\Recovery\34107922-98a6-11eb-a15f-ea91f6580701\taskhost.exe

      MD5

      8ff7b0b0c35c393f308f987171721ba0

      SHA1

      b5cf15448f31f9406ae56863569518a203c3bd7c

      SHA256

      84ad4547b1b6eacb1fa94a456851380b0cdf04a30d5461cf9c7e5dcededd8a1a

      SHA512

      310afccd6994f9632b5f0387fd189b94f31f07e33cd1404527553130a3f65e81cbcc68c96926e9cf8c8679d278beb3bc96c98ad68a849195e1b51b7977c4fb37

    • C:\Users\Admin\AppData\Local\Temp\I8R855YKf6.bat

      MD5

      47ae4d0bbbdc663221f56b5c403958ee

      SHA1

      2cc1895a9a33c9df1b4a471eeeb544cbc9ae430f

      SHA256

      264790c28fb8440a938025cfe9c6ed8dce47d022ab621aef3c65b49026410709

      SHA512

      77a8611471cd2f7a79d63c06d52f8a6db8805ce937d37e2a97f18f8aa9d40f10956ee369f52f719291f77460f08b549f4f80ea8275c3bd2ca5d0ce6b063f6667

    • memory/484-67-0x0000000000000000-mapping.dmp

    • memory/624-64-0x0000000000000000-mapping.dmp

    • memory/752-65-0x0000000000000000-mapping.dmp

    • memory/1176-68-0x0000000000000000-mapping.dmp

    • memory/1464-62-0x0000000000000000-mapping.dmp

    • memory/1516-63-0x0000000000000000-mapping.dmp

    • memory/1656-59-0x0000000000930000-0x0000000000931000-memory.dmp

      Filesize

      4KB

    • memory/1656-61-0x000000001AEB0000-0x000000001AEB2000-memory.dmp

      Filesize

      8KB

    • memory/1880-70-0x0000000000000000-mapping.dmp

    • memory/1880-72-0x00000000000A0000-0x00000000000A1000-memory.dmp

      Filesize

      4KB

    • memory/1880-74-0x000000001AAE0000-0x000000001AAE2000-memory.dmp

      Filesize

      8KB