Analysis
-
max time kernel
171s -
max time network
125s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09-02-2022 03:26
Static task
static1
Behavioral task
behavioral1
Sample
ab7fbb991d61dcb9affcb581c459e9d3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ab7fbb991d61dcb9affcb581c459e9d3.exe
Resource
win10v2004-en-20220113
General
-
Target
ab7fbb991d61dcb9affcb581c459e9d3.exe
-
Size
2.3MB
-
MD5
ab7fbb991d61dcb9affcb581c459e9d3
-
SHA1
abe33bd69ac60e2a0b06ed8201d41fb430ff518c
-
SHA256
493a2547e41f5c448e3638a63a91a3b07950202fb912d187688223eb4081483f
-
SHA512
edca9ae34af65a69c7b157adfcc17579e6cd2bfe80aef9c05cb7c1534d49992e234ba43ba76987d6d22d020cf47e34e32c2c600b09df1ff49f1055a0d7e0b5cb
Malware Config
Signatures
-
DcRat 10 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 972 schtasks.exe 1924 schtasks.exe 360 schtasks.exe 1612 schtasks.exe 1048 schtasks.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Recovery\\0d211b22-5878-11ec-a979-5e852a8e65ec\\smss.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe 1736 schtasks.exe 1732 schtasks.exe 1792 schtasks.exe -
Process spawned unexpected child process 8 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 972 1432 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1924 1432 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 360 1432 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 1432 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1732 1432 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1792 1432 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1612 1432 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1048 1432 schtasks.exe 29 -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Documents and Settings\\taskhost.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\ProgramData\\Mozilla\\updates\\308046B0AF4A39CB\\csrss.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\iscsiexe\\csrss.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\System32\\wbem\\wpcuninst\\WmiPrvSE.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\Cartridges\\csrss.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Recovery\\0d211b22-5878-11ec-a979-5e852a8e65ec\\smss.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\System32\\control\\wininit.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ab7fbb991d61dcb9affcb581c459e9d3 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\lpksetup-20211208-150211-0\\ab7fbb991d61dcb9affcb581c459e9d3.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ab7fbb991d61dcb9affcb581c459e9d3.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\System32\control\wininit.exe ab7fbb991d61dcb9affcb581c459e9d3.exe File created C:\Windows\System32\control\56085415360792 ab7fbb991d61dcb9affcb581c459e9d3.exe File created C:\Windows\System32\iscsiexe\csrss.exe ab7fbb991d61dcb9affcb581c459e9d3.exe File created C:\Windows\System32\iscsiexe\886983d96e3d3e ab7fbb991d61dcb9affcb581c459e9d3.exe File created C:\Windows\System32\wbem\wpcuninst\WmiPrvSE.exe ab7fbb991d61dcb9affcb581c459e9d3.exe File created C:\Windows\System32\wbem\wpcuninst\24dbde2999530e ab7fbb991d61dcb9affcb581c459e9d3.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\csrss.exe ab7fbb991d61dcb9affcb581c459e9d3.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\886983d96e3d3e ab7fbb991d61dcb9affcb581c459e9d3.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1064 956 WerFault.exe 19 1908 972 WerFault.exe 30 -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1736 schtasks.exe 1732 schtasks.exe 1792 schtasks.exe 1612 schtasks.exe 1048 schtasks.exe 972 schtasks.exe 1924 schtasks.exe 360 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 1064 WerFault.exe 1064 WerFault.exe 1064 WerFault.exe 1064 WerFault.exe 1064 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 956 ab7fbb991d61dcb9affcb581c459e9d3.exe Token: SeDebugPrivilege 1064 WerFault.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 956 wrote to memory of 1064 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 31 PID 956 wrote to memory of 1064 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 31 PID 956 wrote to memory of 1064 956 ab7fbb991d61dcb9affcb581c459e9d3.exe 31 PID 972 wrote to memory of 1908 972 schtasks.exe 39 PID 972 wrote to memory of 1908 972 schtasks.exe 39 PID 972 wrote to memory of 1908 972 schtasks.exe 39 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ab7fbb991d61dcb9affcb581c459e9d3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab7fbb991d61dcb9affcb581c459e9d3.exe"C:\Users\Admin\AppData\Local\Temp\ab7fbb991d61dcb9affcb581c459e9d3.exe"1⤵
- DcRat
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:956 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 956 -s 12322⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\0d211b22-5878-11ec-a979-5e852a8e65ec\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 972 -s 2442⤵
- Program crash
PID:1908
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\control\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ab7fbb991d61dcb9affcb581c459e9d3" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\lpksetup-20211208-150211-0\ab7fbb991d61dcb9affcb581c459e9d3.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Documents and Settings\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\ProgramData\Mozilla\updates\308046B0AF4A39CB\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\iscsiexe\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\wpcuninst\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1048