Analysis
-
max time kernel
129s -
max time network
158s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
15-06-2021 17:57
Static task
static1
Behavioral task
behavioral1
Sample
8282EA0066E14F2E7CAF51B7A7D50DC1.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
8282EA0066E14F2E7CAF51B7A7D50DC1.exe
Resource
win10v20210408
General
-
Target
8282EA0066E14F2E7CAF51B7A7D50DC1.exe
-
Size
1.0MB
-
MD5
8282ea0066e14f2e7caf51b7a7d50dc1
-
SHA1
83c03517bb11c4ef01ced0b8df76cb35acbf4fdd
-
SHA256
db57de1bf0b133303c2325117a527f1586e4bf6af56219391a17095efb09cc76
-
SHA512
b48e2b9c226f57c50b5e58d716a906e9753f254136697e3e32c5f6aba2c6cc0a3175b0b290630949ddb4229a8eda53e5b62d03c969f5ef187963302ecc9e6841
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
resource yara_rule behavioral2/files/0x000100000001ab50-121.dat dcrat behavioral2/files/0x000100000001ab50-122.dat dcrat behavioral2/files/0x000100000001ab61-137.dat dcrat behavioral2/files/0x000100000001ab61-136.dat dcrat -
Executes dropped EXE 2 IoCs
pid Process 2300 fontruntime.exe 184 ShellExperienceHost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ipinfo.io 15 ipinfo.io -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\System32\msrahc\dllhost.exe fontruntime.exe File opened for modification C:\Windows\System32\msrahc\dllhost.exe fontruntime.exe File created C:\Windows\System32\msrahc\5940a34987c99120d96dace90a3f93f329dcad63 fontruntime.exe File created C:\Windows\System32\chgport\SppExtComObj.exe fontruntime.exe File created C:\Windows\System32\chgport\e1ef82546f0b02b7e974f28047f3788b1128cce1 fontruntime.exe File created C:\Windows\System32\NgcProCsp\slui.exe fontruntime.exe File created C:\Windows\System32\NgcProCsp\a29f4157103644af5692ebfddf35f6dff4e237da fontruntime.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2264 schtasks.exe 3328 schtasks.exe 3868 schtasks.exe 2308 schtasks.exe 3160 schtasks.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings 8282EA0066E14F2E7CAF51B7A7D50DC1.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings fontruntime.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2948 PING.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2300 fontruntime.exe 2300 fontruntime.exe 2300 fontruntime.exe 184 ShellExperienceHost.exe 184 ShellExperienceHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 184 ShellExperienceHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2300 fontruntime.exe Token: SeDebugPrivilege 184 ShellExperienceHost.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 808 wrote to memory of 68 808 8282EA0066E14F2E7CAF51B7A7D50DC1.exe 75 PID 808 wrote to memory of 68 808 8282EA0066E14F2E7CAF51B7A7D50DC1.exe 75 PID 808 wrote to memory of 68 808 8282EA0066E14F2E7CAF51B7A7D50DC1.exe 75 PID 68 wrote to memory of 2580 68 WScript.exe 76 PID 68 wrote to memory of 2580 68 WScript.exe 76 PID 68 wrote to memory of 2580 68 WScript.exe 76 PID 2580 wrote to memory of 2300 2580 cmd.exe 78 PID 2580 wrote to memory of 2300 2580 cmd.exe 78 PID 2300 wrote to memory of 2264 2300 fontruntime.exe 81 PID 2300 wrote to memory of 2264 2300 fontruntime.exe 81 PID 2300 wrote to memory of 3328 2300 fontruntime.exe 83 PID 2300 wrote to memory of 3328 2300 fontruntime.exe 83 PID 2300 wrote to memory of 3868 2300 fontruntime.exe 85 PID 2300 wrote to memory of 3868 2300 fontruntime.exe 85 PID 2300 wrote to memory of 2308 2300 fontruntime.exe 87 PID 2300 wrote to memory of 2308 2300 fontruntime.exe 87 PID 2300 wrote to memory of 3160 2300 fontruntime.exe 89 PID 2300 wrote to memory of 3160 2300 fontruntime.exe 89 PID 2300 wrote to memory of 1008 2300 fontruntime.exe 91 PID 2300 wrote to memory of 1008 2300 fontruntime.exe 91 PID 1008 wrote to memory of 1288 1008 cmd.exe 93 PID 1008 wrote to memory of 1288 1008 cmd.exe 93 PID 1008 wrote to memory of 2948 1008 cmd.exe 94 PID 1008 wrote to memory of 2948 1008 cmd.exe 94 PID 1008 wrote to memory of 184 1008 cmd.exe 96 PID 1008 wrote to memory of 184 1008 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\8282EA0066E14F2E7CAF51B7A7D50DC1.exe"C:\Users\Admin\AppData\Local\Temp\8282EA0066E14F2E7CAF51B7A7D50DC1.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\fontruntime\W54cK365JLW2iwfNl.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:68 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\fontruntime\R8YG6c.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\fontruntime\fontruntime.exe"C:\fontruntime\fontruntime.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\msrahc\dllhost.exe'" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:2264
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\System32\chgport\SppExtComObj.exe'" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:3328
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "slui" /sc ONLOGON /tr "'C:\Windows\System32\NgcProCsp\slui.exe'" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:3868
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\fontruntime\fontdrvhost.exe'" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:2308
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ShellExperienceHost" /sc ONLOGON /tr "'C:\Boot\Fonts\ShellExperienceHost.exe'" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:3160
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\fontruntime\tcqWpE8T6a.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:1288
-
-
C:\Windows\system32\PING.EXEping -n 5 localhost6⤵
- Runs ping.exe
PID:2948
-
-
C:\Boot\Fonts\ShellExperienceHost.exe"C:\Boot\Fonts\ShellExperienceHost.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:184
-
-
-
-
-