Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 21:57
Static task
static1
Behavioral task
behavioral1
Sample
d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe
Resource
win10v2004-20220414-en
General
-
Target
d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe
-
Size
3.3MB
-
MD5
f402c0307b58cfdf41835eb11df774ec
-
SHA1
7000c5f2bc10a560c799665a1fa381b58fd8fa1e
-
SHA256
d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8
-
SHA512
5e0f77c858cf16b3590a989645712f60ce0c4d0d1dc3e7b8c5763006c399629f9c2c06d2a12ae908ce4c6c4ace599d89634a7e0d71acc53188908d97fc138613
Malware Config
Signatures
-
suricata: ET MALWARE DCRat Initial CnC Activity
suricata: ET MALWARE DCRat Initial CnC Activity
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
svchost32.exepid process 996 svchost32.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exesvchost32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe -
Drops startup file 2 IoCs
Processes:
d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dotNET.lnk d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sysdll32.lnk d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exesvchost32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Wine d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Wine svchost32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\scrss = "C:\\Users\\Admin\\AppData\\Roaming\\dotNET.lnk" d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wininit = "C:\\Users\\Admin\\Sysdll32.lnk" d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exesvchost32.exepid process 2124 d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe 996 svchost32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4124 996 WerFault.exe svchost32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exesvchost32.exepid process 2124 d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe 2124 d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe 2124 d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe 2124 d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe 996 svchost32.exe 996 svchost32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exesvchost32.exedescription pid process Token: SeDebugPrivilege 2124 d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe Token: SeDebugPrivilege 996 svchost32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exedescription pid process target process PID 2124 wrote to memory of 996 2124 d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe svchost32.exe PID 2124 wrote to memory of 996 2124 d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe svchost32.exe PID 2124 wrote to memory of 996 2124 d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe svchost32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe"C:\Users\Admin\AppData\Local\Temp\d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Drops startup file
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\svchost32.exe"C:\Users\Admin\AppData\Roaming\svchost32.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 18763⤵
- Program crash
PID:4124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 996 -ip 9961⤵PID:3140
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD5f402c0307b58cfdf41835eb11df774ec
SHA17000c5f2bc10a560c799665a1fa381b58fd8fa1e
SHA256d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8
SHA5125e0f77c858cf16b3590a989645712f60ce0c4d0d1dc3e7b8c5763006c399629f9c2c06d2a12ae908ce4c6c4ace599d89634a7e0d71acc53188908d97fc138613
-
Filesize
3.3MB
MD5f402c0307b58cfdf41835eb11df774ec
SHA17000c5f2bc10a560c799665a1fa381b58fd8fa1e
SHA256d2c34c179cf1892e5b8c6243db348d09090c14622dd069589f21fef3d2c171a8
SHA5125e0f77c858cf16b3590a989645712f60ce0c4d0d1dc3e7b8c5763006c399629f9c2c06d2a12ae908ce4c6c4ace599d89634a7e0d71acc53188908d97fc138613