Analysis
-
max time kernel
173s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
09-02-2022 03:26
Static task
static1
Behavioral task
behavioral1
Sample
ab7fbb991d61dcb9affcb581c459e9d3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ab7fbb991d61dcb9affcb581c459e9d3.exe
Resource
win10v2004-en-20220113
General
-
Target
ab7fbb991d61dcb9affcb581c459e9d3.exe
-
Size
2.3MB
-
MD5
ab7fbb991d61dcb9affcb581c459e9d3
-
SHA1
abe33bd69ac60e2a0b06ed8201d41fb430ff518c
-
SHA256
493a2547e41f5c448e3638a63a91a3b07950202fb912d187688223eb4081483f
-
SHA512
edca9ae34af65a69c7b157adfcc17579e6cd2bfe80aef9c05cb7c1534d49992e234ba43ba76987d6d22d020cf47e34e32c2c600b09df1ff49f1055a0d7e0b5cb
Malware Config
Signatures
-
DcRat 12 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeab7fbb991d61dcb9affcb581c459e9d3.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2832 schtasks.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ab7fbb991d61dcb9affcb581c459e9d3.exe 3304 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Program Files (x86)\\Internet Explorer\\SIGNUP\\taskhostw.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Documents and Settings\\SearchApp.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe 4060 schtasks.exe 2808 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Program Files\\Common Files\\microsoft shared\\ClickToRun\\C2RINTL.cs-cz\\OfficeClickToRun.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe 2984 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\PerfLogs\\smss.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\ProgramData\\Oracle\\Java\\installcache_x64\\backgroundTaskHost.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe 2748 schtasks.exe -
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3304 3212 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2832 3212 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 3212 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2808 3212 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 3212 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4060 3212 schtasks.exe -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 4048 created 1992 4048 WerFault.exe ab7fbb991d61dcb9affcb581c459e9d3.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ab7fbb991d61dcb9affcb581c459e9d3.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Program Files (x86)\\Internet Explorer\\SIGNUP\\taskhostw.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Program Files\\Common Files\\microsoft shared\\ClickToRun\\C2RINTL.cs-cz\\OfficeClickToRun.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Documents and Settings\\SearchApp.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Windows\\System32\\tracerpt\\taskhostw.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\PerfLogs\\smss.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\ProgramData\\Oracle\\Java\\installcache_x64\\backgroundTaskHost.exe\"" ab7fbb991d61dcb9affcb581c459e9d3.exe -
Processes:
ab7fbb991d61dcb9affcb581c459e9d3.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ab7fbb991d61dcb9affcb581c459e9d3.exe -
Drops file in System32 directory 2 IoCs
Processes:
ab7fbb991d61dcb9affcb581c459e9d3.exedescription ioc process File created C:\Windows\System32\tracerpt\ea9f0e6c9e2dcd ab7fbb991d61dcb9affcb581c459e9d3.exe File created C:\Windows\System32\tracerpt\taskhostw.exe ab7fbb991d61dcb9affcb581c459e9d3.exe -
Drops file in Program Files directory 4 IoCs
Processes:
ab7fbb991d61dcb9affcb581c459e9d3.exedescription ioc process File created C:\Program Files (x86)\Internet Explorer\SIGNUP\ea9f0e6c9e2dcd ab7fbb991d61dcb9affcb581c459e9d3.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.cs-cz\OfficeClickToRun.exe ab7fbb991d61dcb9affcb581c459e9d3.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.cs-cz\e6c9b481da804f ab7fbb991d61dcb9affcb581c459e9d3.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\taskhostw.exe ab7fbb991d61dcb9affcb581c459e9d3.exe -
Drops file in Windows directory 6 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3292 1992 WerFault.exe ab7fbb991d61dcb9affcb581c459e9d3.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2832 schtasks.exe 2748 schtasks.exe 2808 schtasks.exe 2984 schtasks.exe 4060 schtasks.exe 3304 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
WerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
ab7fbb991d61dcb9affcb581c459e9d3.exeWerFault.exepid process 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe 3292 WerFault.exe 3292 WerFault.exe 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
ab7fbb991d61dcb9affcb581c459e9d3.exesvchost.exedescription pid process Token: SeDebugPrivilege 1992 ab7fbb991d61dcb9affcb581c459e9d3.exe Token: SeShutdownPrivilege 3716 svchost.exe Token: SeCreatePagefilePrivilege 3716 svchost.exe Token: SeShutdownPrivilege 3716 svchost.exe Token: SeCreatePagefilePrivilege 3716 svchost.exe Token: SeShutdownPrivilege 3716 svchost.exe Token: SeCreatePagefilePrivilege 3716 svchost.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WerFault.exedescription pid process target process PID 4048 wrote to memory of 1992 4048 WerFault.exe ab7fbb991d61dcb9affcb581c459e9d3.exe PID 4048 wrote to memory of 1992 4048 WerFault.exe ab7fbb991d61dcb9affcb581c459e9d3.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
ab7fbb991d61dcb9affcb581c459e9d3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ab7fbb991d61dcb9affcb581c459e9d3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ab7fbb991d61dcb9affcb581c459e9d3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab7fbb991d61dcb9affcb581c459e9d3.exe"C:\Users\Admin\AppData\Local\Temp\ab7fbb991d61dcb9affcb581c459e9d3.exe"1⤵
- DcRat
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1992 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1992 -s 15922⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\PerfLogs\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\ProgramData\Oracle\Java\installcache_x64\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2832
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 416 -p 1992 -ip 19921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:4048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\SIGNUP\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.cs-cz\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Documents and Settings\SearchApp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\System32\tracerpt\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3716