Analysis
-
max time kernel
136s -
max time network
197s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
15-06-2021 18:27
Static task
static1
Behavioral task
behavioral1
Sample
8FF7B0B0C35C393F308F987171721BA0.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
8FF7B0B0C35C393F308F987171721BA0.exe
Resource
win10v20210410
General
-
Target
8FF7B0B0C35C393F308F987171721BA0.exe
-
Size
319KB
-
MD5
8ff7b0b0c35c393f308f987171721ba0
-
SHA1
b5cf15448f31f9406ae56863569518a203c3bd7c
-
SHA256
84ad4547b1b6eacb1fa94a456851380b0cdf04a30d5461cf9c7e5dcededd8a1a
-
SHA512
310afccd6994f9632b5f0387fd189b94f31f07e33cd1404527553130a3f65e81cbcc68c96926e9cf8c8679d278beb3bc96c98ad68a849195e1b51b7977c4fb37
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
resource yara_rule behavioral1/files/0x00030000000130c6-69.dat dcrat behavioral1/files/0x00030000000130c6-71.dat dcrat -
Executes dropped EXE 1 IoCs
pid Process 1880 taskhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ipinfo.io 6 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1516 schtasks.exe 624 schtasks.exe 1464 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1176 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1656 8FF7B0B0C35C393F308F987171721BA0.exe 1880 taskhost.exe 1880 taskhost.exe 1880 taskhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1880 taskhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1656 8FF7B0B0C35C393F308F987171721BA0.exe Token: SeDebugPrivilege 1880 taskhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1880 taskhost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1464 1656 8FF7B0B0C35C393F308F987171721BA0.exe 30 PID 1656 wrote to memory of 1464 1656 8FF7B0B0C35C393F308F987171721BA0.exe 30 PID 1656 wrote to memory of 1464 1656 8FF7B0B0C35C393F308F987171721BA0.exe 30 PID 1656 wrote to memory of 1516 1656 8FF7B0B0C35C393F308F987171721BA0.exe 32 PID 1656 wrote to memory of 1516 1656 8FF7B0B0C35C393F308F987171721BA0.exe 32 PID 1656 wrote to memory of 1516 1656 8FF7B0B0C35C393F308F987171721BA0.exe 32 PID 1656 wrote to memory of 624 1656 8FF7B0B0C35C393F308F987171721BA0.exe 34 PID 1656 wrote to memory of 624 1656 8FF7B0B0C35C393F308F987171721BA0.exe 34 PID 1656 wrote to memory of 624 1656 8FF7B0B0C35C393F308F987171721BA0.exe 34 PID 1656 wrote to memory of 752 1656 8FF7B0B0C35C393F308F987171721BA0.exe 36 PID 1656 wrote to memory of 752 1656 8FF7B0B0C35C393F308F987171721BA0.exe 36 PID 1656 wrote to memory of 752 1656 8FF7B0B0C35C393F308F987171721BA0.exe 36 PID 752 wrote to memory of 484 752 cmd.exe 38 PID 752 wrote to memory of 484 752 cmd.exe 38 PID 752 wrote to memory of 484 752 cmd.exe 38 PID 752 wrote to memory of 1176 752 cmd.exe 39 PID 752 wrote to memory of 1176 752 cmd.exe 39 PID 752 wrote to memory of 1176 752 cmd.exe 39 PID 752 wrote to memory of 1880 752 cmd.exe 40 PID 752 wrote to memory of 1880 752 cmd.exe 40 PID 752 wrote to memory of 1880 752 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\8FF7B0B0C35C393F308F987171721BA0.exe"C:\Users\Admin\AppData\Local\Temp\8FF7B0B0C35C393F308F987171721BA0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Documents and Settings\sppsvc.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:1464
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\All Users\Adobe\Updater6\winlogon.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:1516
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "taskhost" /sc ONLOGON /tr "'C:\Recovery\34107922-98a6-11eb-a15f-ea91f6580701\taskhost.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:624
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\I8R855YKf6.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:484
-
-
C:\Windows\system32\PING.EXEping -n 5 localhost3⤵
- Runs ping.exe
PID:1176
-
-
C:\Recovery\34107922-98a6-11eb-a15f-ea91f6580701\taskhost.exe"C:\Recovery\34107922-98a6-11eb-a15f-ea91f6580701\taskhost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1880
-
-