Analysis
-
max time kernel
91s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-07-2022 07:54
Static task
static1
Behavioral task
behavioral1
Sample
a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe
Resource
win7-20220414-en
General
-
Target
a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe
-
Size
3.9MB
-
MD5
84c119baf2964e44d504f6172d89f593
-
SHA1
d74042f52d0a2d5cd4543b6c4a8e31b8a4c5bee4
-
SHA256
a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409
-
SHA512
3dcac82230c278b8a1c4e063d79bd308c8e8ee65e71d8e0b371ac8520049fd2a863bc0b9b910989a5e310534aea6fe1274c2774e755ca701b977f8bc983bef6b
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Processes:
resource yara_rule behavioral2/memory/4648-135-0x00000000005A0000-0x0000000001012000-memory.dmp dcrat behavioral2/memory/4648-136-0x00000000005A0000-0x0000000001012000-memory.dmp dcrat behavioral2/memory/4648-148-0x00000000005A0000-0x0000000001012000-memory.dmp dcrat behavioral2/memory/3876-150-0x0000000000BE0000-0x0000000001652000-memory.dmp dcrat behavioral2/memory/3876-155-0x0000000000BE0000-0x0000000001652000-memory.dmp dcrat behavioral2/memory/3876-156-0x0000000000BE0000-0x0000000001652000-memory.dmp dcrat behavioral2/memory/3876-159-0x0000000000BE0000-0x0000000001652000-memory.dmp dcrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exeexplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe -
Executes dropped EXE 1 IoCs
Processes:
explorer.exepid process 3876 explorer.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exeexplorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe -
Processes:
resource yara_rule behavioral2/memory/4648-135-0x00000000005A0000-0x0000000001012000-memory.dmp themida behavioral2/memory/4648-136-0x00000000005A0000-0x0000000001012000-memory.dmp themida C:\Users\explorer.exe themida C:\Documents and Settings\explorer.exe themida behavioral2/memory/4648-148-0x00000000005A0000-0x0000000001012000-memory.dmp themida behavioral2/memory/3876-155-0x0000000000BE0000-0x0000000001652000-memory.dmp themida behavioral2/memory/3876-156-0x0000000000BE0000-0x0000000001652000-memory.dmp themida behavioral2/memory/3876-159-0x0000000000BE0000-0x0000000001652000-memory.dmp themida -
Processes:
a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exeexplorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exeexplorer.exepid process 4648 a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe 3876 explorer.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 4720 schtasks.exe 4120 schtasks.exe 4480 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exeexplorer.exepid process 4648 a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe 3876 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exeexplorer.exedescription pid process Token: SeDebugPrivilege 4648 a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe Token: SeDebugPrivilege 3876 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exedescription pid process target process PID 4648 wrote to memory of 4120 4648 a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe schtasks.exe PID 4648 wrote to memory of 4120 4648 a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe schtasks.exe PID 4648 wrote to memory of 4120 4648 a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe schtasks.exe PID 4648 wrote to memory of 4480 4648 a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe schtasks.exe PID 4648 wrote to memory of 4480 4648 a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe schtasks.exe PID 4648 wrote to memory of 4480 4648 a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe schtasks.exe PID 4648 wrote to memory of 4720 4648 a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe schtasks.exe PID 4648 wrote to memory of 4720 4648 a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe schtasks.exe PID 4648 wrote to memory of 4720 4648 a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe schtasks.exe PID 4648 wrote to memory of 3876 4648 a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe explorer.exe PID 4648 wrote to memory of 3876 4648 a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe explorer.exe PID 4648 wrote to memory of 3876 4648 a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe"C:\Users\Admin\AppData\Local\Temp\a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "services" /sc ONLOGON /tr "'C:\Users\Default User\services.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Documents and Settings\OfficeClickToRun.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "explorer" /sc ONLOGON /tr "'C:\Documents and Settings\explorer.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Documents and Settings\explorer.exe"C:\Documents and Settings\explorer.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Documents and Settings\explorer.exeFilesize
3.9MB
MD584c119baf2964e44d504f6172d89f593
SHA1d74042f52d0a2d5cd4543b6c4a8e31b8a4c5bee4
SHA256a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409
SHA5123dcac82230c278b8a1c4e063d79bd308c8e8ee65e71d8e0b371ac8520049fd2a863bc0b9b910989a5e310534aea6fe1274c2774e755ca701b977f8bc983bef6b
-
C:\Users\explorer.exeFilesize
3.9MB
MD584c119baf2964e44d504f6172d89f593
SHA1d74042f52d0a2d5cd4543b6c4a8e31b8a4c5bee4
SHA256a753520f6e10b07283488893315f3c5e03fbed7e27b303e95934d62f1acaa409
SHA5123dcac82230c278b8a1c4e063d79bd308c8e8ee65e71d8e0b371ac8520049fd2a863bc0b9b910989a5e310534aea6fe1274c2774e755ca701b977f8bc983bef6b
-
memory/3876-157-0x0000000077C90000-0x0000000077E33000-memory.dmpFilesize
1.6MB
-
memory/3876-145-0x0000000000000000-mapping.dmp
-
memory/3876-156-0x0000000000BE0000-0x0000000001652000-memory.dmpFilesize
10.4MB
-
memory/3876-155-0x0000000000BE0000-0x0000000001652000-memory.dmpFilesize
10.4MB
-
memory/3876-152-0x0000000077C90000-0x0000000077E33000-memory.dmpFilesize
1.6MB
-
memory/3876-151-0x0000000000BE0000-0x0000000001652000-memory.dmpFilesize
10.4MB
-
memory/3876-150-0x0000000000BE0000-0x0000000001652000-memory.dmpFilesize
10.4MB
-
memory/3876-158-0x0000000077C90000-0x0000000077E33000-memory.dmpFilesize
1.6MB
-
memory/3876-159-0x0000000000BE0000-0x0000000001652000-memory.dmpFilesize
10.4MB
-
memory/4120-142-0x0000000000000000-mapping.dmp
-
memory/4480-143-0x0000000000000000-mapping.dmp
-
memory/4648-138-0x0000000005B10000-0x0000000005B76000-memory.dmpFilesize
408KB
-
memory/4648-141-0x0000000077C90000-0x0000000077E33000-memory.dmpFilesize
1.6MB
-
memory/4648-148-0x00000000005A0000-0x0000000001012000-memory.dmpFilesize
10.4MB
-
memory/4648-149-0x0000000077C90000-0x0000000077E33000-memory.dmpFilesize
1.6MB
-
memory/4648-140-0x0000000006920000-0x00000000069BC000-memory.dmpFilesize
624KB
-
memory/4648-139-0x0000000006880000-0x0000000006912000-memory.dmpFilesize
584KB
-
memory/4648-130-0x00000000005A0000-0x0000000001012000-memory.dmpFilesize
10.4MB
-
memory/4648-137-0x0000000006030000-0x00000000065D4000-memory.dmpFilesize
5.6MB
-
memory/4648-136-0x00000000005A0000-0x0000000001012000-memory.dmpFilesize
10.4MB
-
memory/4648-135-0x00000000005A0000-0x0000000001012000-memory.dmpFilesize
10.4MB
-
memory/4648-132-0x0000000077C90000-0x0000000077E33000-memory.dmpFilesize
1.6MB
-
memory/4648-131-0x00000000005A0000-0x0000000001012000-memory.dmpFilesize
10.4MB
-
memory/4720-144-0x0000000000000000-mapping.dmp