Analysis

  • max time kernel
    136s
  • max time network
    196s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    15-06-2021 21:27

General

  • Target

    048AC151CE97E95A980399E849DAAE95.exe

  • Size

    428KB

  • MD5

    048ac151ce97e95a980399e849daae95

  • SHA1

    3a89733c03e49f7504f6731ee9f626dad52fb369

  • SHA256

    f896c6618235d320b62e6662673830cbd21d7be057b356eef83aac8f21684b6f

  • SHA512

    2532c573dc938ff3401c15bd916312228a09a33a09b92723dcc979c499dbe9078812cc3a73428cc3dc9dd98edf8a0f61a15e3a399acd516a2fda02d4a95dd394

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • DCRat Payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\048AC151CE97E95A980399E849DAAE95.exe
    "C:\Users\Admin\AppData\Local\Temp\048AC151CE97E95A980399E849DAAE95.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\infocardcpl\csrss.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1676
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\sr\WmiPrvSE.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:752
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\rasctrnm\lsm.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:976
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\scersop\WmiPrvSE.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:820
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\pnpts\lsass.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:864
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\KBDPL1\lsm.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:924
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "services" /sc ONLOGON /tr "'C:\Windows\System32\dskquota\services.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1320
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1544
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\cryptsvc\wininit.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1476
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rWR0SxyiNy.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:1728
        • C:\Windows\system32\PING.EXE
          ping -n 5 localhost
          3⤵
          • Runs ping.exe
          PID:1856
        • C:\Windows\System32\infocardcpl\csrss.exe
          "C:\Windows\System32\infocardcpl\csrss.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:1520

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1048-62-0x000000001AD60000-0x000000001AD62000-memory.dmp

      Filesize

      8KB

    • memory/1048-60-0x0000000000010000-0x0000000000011000-memory.dmp

      Filesize

      4KB

    • memory/1520-79-0x0000000000860000-0x0000000000861000-memory.dmp

      Filesize

      4KB

    • memory/1520-81-0x000000001B050000-0x000000001B052000-memory.dmp

      Filesize

      8KB

    • memory/1520-82-0x00000000001E0000-0x00000000001E7000-memory.dmp

      Filesize

      28KB

    • memory/1520-83-0x00000000007B0000-0x00000000007B5000-memory.dmp

      Filesize

      20KB

    • memory/1520-84-0x0000000000320000-0x0000000000322000-memory.dmp

      Filesize

      8KB

    • memory/1520-85-0x0000000000330000-0x0000000000332000-memory.dmp

      Filesize

      8KB