Analysis
-
max time kernel
136s -
max time network
197s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
15-06-2021 18:27
Static task
static1
Behavioral task
behavioral1
Sample
8FF7B0B0C35C393F308F987171721BA0.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
8FF7B0B0C35C393F308F987171721BA0.exe
Resource
win10v20210410
General
-
Target
8FF7B0B0C35C393F308F987171721BA0.exe
-
Size
319KB
-
MD5
8ff7b0b0c35c393f308f987171721ba0
-
SHA1
b5cf15448f31f9406ae56863569518a203c3bd7c
-
SHA256
84ad4547b1b6eacb1fa94a456851380b0cdf04a30d5461cf9c7e5dcededd8a1a
-
SHA512
310afccd6994f9632b5f0387fd189b94f31f07e33cd1404527553130a3f65e81cbcc68c96926e9cf8c8679d278beb3bc96c98ad68a849195e1b51b7977c4fb37
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Processes:
resource yara_rule C:\Recovery\34107922-98a6-11eb-a15f-ea91f6580701\taskhost.exe dcrat C:\Recovery\34107922-98a6-11eb-a15f-ea91f6580701\taskhost.exe dcrat -
Executes dropped EXE 1 IoCs
Processes:
taskhost.exepid process 1880 taskhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 ipinfo.io 6 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 1516 schtasks.exe 624 schtasks.exe 1464 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
8FF7B0B0C35C393F308F987171721BA0.exetaskhost.exepid process 1656 8FF7B0B0C35C393F308F987171721BA0.exe 1880 taskhost.exe 1880 taskhost.exe 1880 taskhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskhost.exepid process 1880 taskhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
8FF7B0B0C35C393F308F987171721BA0.exetaskhost.exedescription pid process Token: SeDebugPrivilege 1656 8FF7B0B0C35C393F308F987171721BA0.exe Token: SeDebugPrivilege 1880 taskhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
taskhost.exepid process 1880 taskhost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
8FF7B0B0C35C393F308F987171721BA0.execmd.exedescription pid process target process PID 1656 wrote to memory of 1464 1656 8FF7B0B0C35C393F308F987171721BA0.exe schtasks.exe PID 1656 wrote to memory of 1464 1656 8FF7B0B0C35C393F308F987171721BA0.exe schtasks.exe PID 1656 wrote to memory of 1464 1656 8FF7B0B0C35C393F308F987171721BA0.exe schtasks.exe PID 1656 wrote to memory of 1516 1656 8FF7B0B0C35C393F308F987171721BA0.exe schtasks.exe PID 1656 wrote to memory of 1516 1656 8FF7B0B0C35C393F308F987171721BA0.exe schtasks.exe PID 1656 wrote to memory of 1516 1656 8FF7B0B0C35C393F308F987171721BA0.exe schtasks.exe PID 1656 wrote to memory of 624 1656 8FF7B0B0C35C393F308F987171721BA0.exe schtasks.exe PID 1656 wrote to memory of 624 1656 8FF7B0B0C35C393F308F987171721BA0.exe schtasks.exe PID 1656 wrote to memory of 624 1656 8FF7B0B0C35C393F308F987171721BA0.exe schtasks.exe PID 1656 wrote to memory of 752 1656 8FF7B0B0C35C393F308F987171721BA0.exe cmd.exe PID 1656 wrote to memory of 752 1656 8FF7B0B0C35C393F308F987171721BA0.exe cmd.exe PID 1656 wrote to memory of 752 1656 8FF7B0B0C35C393F308F987171721BA0.exe cmd.exe PID 752 wrote to memory of 484 752 cmd.exe chcp.com PID 752 wrote to memory of 484 752 cmd.exe chcp.com PID 752 wrote to memory of 484 752 cmd.exe chcp.com PID 752 wrote to memory of 1176 752 cmd.exe PING.EXE PID 752 wrote to memory of 1176 752 cmd.exe PING.EXE PID 752 wrote to memory of 1176 752 cmd.exe PING.EXE PID 752 wrote to memory of 1880 752 cmd.exe taskhost.exe PID 752 wrote to memory of 1880 752 cmd.exe taskhost.exe PID 752 wrote to memory of 1880 752 cmd.exe taskhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8FF7B0B0C35C393F308F987171721BA0.exe"C:\Users\Admin\AppData\Local\Temp\8FF7B0B0C35C393F308F987171721BA0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Documents and Settings\sppsvc.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:1464
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\All Users\Adobe\Updater6\winlogon.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:1516
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "taskhost" /sc ONLOGON /tr "'C:\Recovery\34107922-98a6-11eb-a15f-ea91f6580701\taskhost.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:624
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\I8R855YKf6.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:484
-
-
C:\Windows\system32\PING.EXEping -n 5 localhost3⤵
- Runs ping.exe
PID:1176
-
-
C:\Recovery\34107922-98a6-11eb-a15f-ea91f6580701\taskhost.exe"C:\Recovery\34107922-98a6-11eb-a15f-ea91f6580701\taskhost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1880
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8ff7b0b0c35c393f308f987171721ba0
SHA1b5cf15448f31f9406ae56863569518a203c3bd7c
SHA25684ad4547b1b6eacb1fa94a456851380b0cdf04a30d5461cf9c7e5dcededd8a1a
SHA512310afccd6994f9632b5f0387fd189b94f31f07e33cd1404527553130a3f65e81cbcc68c96926e9cf8c8679d278beb3bc96c98ad68a849195e1b51b7977c4fb37
-
MD5
8ff7b0b0c35c393f308f987171721ba0
SHA1b5cf15448f31f9406ae56863569518a203c3bd7c
SHA25684ad4547b1b6eacb1fa94a456851380b0cdf04a30d5461cf9c7e5dcededd8a1a
SHA512310afccd6994f9632b5f0387fd189b94f31f07e33cd1404527553130a3f65e81cbcc68c96926e9cf8c8679d278beb3bc96c98ad68a849195e1b51b7977c4fb37
-
MD5
47ae4d0bbbdc663221f56b5c403958ee
SHA12cc1895a9a33c9df1b4a471eeeb544cbc9ae430f
SHA256264790c28fb8440a938025cfe9c6ed8dce47d022ab621aef3c65b49026410709
SHA51277a8611471cd2f7a79d63c06d52f8a6db8805ce937d37e2a97f18f8aa9d40f10956ee369f52f719291f77460f08b549f4f80ea8275c3bd2ca5d0ce6b063f6667