Analysis
-
max time kernel
127s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01/11/2022, 00:30
Behavioral task
behavioral1
Sample
9f31c60a44a796647e0c24eaf74cf7e1bb9b0e48b43610cc69944b4141df8211.exe
Resource
win10-20220812-en
General
-
Target
9f31c60a44a796647e0c24eaf74cf7e1bb9b0e48b43610cc69944b4141df8211.exe
-
Size
1.3MB
-
MD5
f05541fe0cb50cda68884bfd8c160b7d
-
SHA1
51d5179bc1e6e81c22fac9e3bc085471fc2b2a2e
-
SHA256
9f31c60a44a796647e0c24eaf74cf7e1bb9b0e48b43610cc69944b4141df8211
-
SHA512
266797717fe2b9c0e622085390c90f958cde4ffda9e5177823b1b2b2dab6102d430097a85e62cfc57157c96f7308d3f9f015cb1344e076eeaf6324e0df814508
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 9 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4056 3232 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5104 3232 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4396 3232 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5048 3232 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5044 3232 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5008 3232 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4712 3232 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4704 3232 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4208 3232 schtasks.exe 70 -
resource yara_rule behavioral1/files/0x000800000001ac5f-280.dat dcrat behavioral1/files/0x000800000001ac5f-281.dat dcrat behavioral1/memory/576-282-0x0000000000540000-0x0000000000650000-memory.dmp dcrat behavioral1/files/0x000600000001ac64-300.dat dcrat behavioral1/files/0x000600000001ac64-298.dat dcrat -
Executes dropped EXE 2 IoCs
pid Process 576 DllCommonsvc.exe 1000 System.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Prefetch\ReadyBoot\sihost.exe DllCommonsvc.exe File created C:\Windows\Prefetch\ReadyBoot\66fc9ff0ee96c2 DllCommonsvc.exe File created C:\Windows\Fonts\conhost.exe DllCommonsvc.exe File created C:\Windows\Fonts\088424020bedd6 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5008 schtasks.exe 4712 schtasks.exe 4208 schtasks.exe 4396 schtasks.exe 5104 schtasks.exe 5048 schtasks.exe 5044 schtasks.exe 4704 schtasks.exe 4056 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings 9f31c60a44a796647e0c24eaf74cf7e1bb9b0e48b43610cc69944b4141df8211.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 576 DllCommonsvc.exe 576 DllCommonsvc.exe 576 DllCommonsvc.exe 644 powershell.exe 3928 powershell.exe 4528 powershell.exe 4636 powershell.exe 4528 powershell.exe 1000 System.exe 644 powershell.exe 4636 powershell.exe 3928 powershell.exe 4528 powershell.exe 644 powershell.exe 4636 powershell.exe 3928 powershell.exe 1000 System.exe 1000 System.exe 1000 System.exe 1000 System.exe 1000 System.exe 1000 System.exe 1000 System.exe 1000 System.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1000 System.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 576 DllCommonsvc.exe Token: SeDebugPrivilege 644 powershell.exe Token: SeDebugPrivilege 3928 powershell.exe Token: SeDebugPrivilege 1000 System.exe Token: SeDebugPrivilege 4528 powershell.exe Token: SeDebugPrivilege 4636 powershell.exe Token: SeIncreaseQuotaPrivilege 4528 powershell.exe Token: SeSecurityPrivilege 4528 powershell.exe Token: SeTakeOwnershipPrivilege 4528 powershell.exe Token: SeLoadDriverPrivilege 4528 powershell.exe Token: SeSystemProfilePrivilege 4528 powershell.exe Token: SeSystemtimePrivilege 4528 powershell.exe Token: SeProfSingleProcessPrivilege 4528 powershell.exe Token: SeIncBasePriorityPrivilege 4528 powershell.exe Token: SeCreatePagefilePrivilege 4528 powershell.exe Token: SeBackupPrivilege 4528 powershell.exe Token: SeRestorePrivilege 4528 powershell.exe Token: SeShutdownPrivilege 4528 powershell.exe Token: SeDebugPrivilege 4528 powershell.exe Token: SeSystemEnvironmentPrivilege 4528 powershell.exe Token: SeRemoteShutdownPrivilege 4528 powershell.exe Token: SeUndockPrivilege 4528 powershell.exe Token: SeManageVolumePrivilege 4528 powershell.exe Token: 33 4528 powershell.exe Token: 34 4528 powershell.exe Token: 35 4528 powershell.exe Token: 36 4528 powershell.exe Token: SeIncreaseQuotaPrivilege 644 powershell.exe Token: SeSecurityPrivilege 644 powershell.exe Token: SeTakeOwnershipPrivilege 644 powershell.exe Token: SeLoadDriverPrivilege 644 powershell.exe Token: SeSystemProfilePrivilege 644 powershell.exe Token: SeSystemtimePrivilege 644 powershell.exe Token: SeProfSingleProcessPrivilege 644 powershell.exe Token: SeIncBasePriorityPrivilege 644 powershell.exe Token: SeCreatePagefilePrivilege 644 powershell.exe Token: SeBackupPrivilege 644 powershell.exe Token: SeRestorePrivilege 644 powershell.exe Token: SeShutdownPrivilege 644 powershell.exe Token: SeDebugPrivilege 644 powershell.exe Token: SeSystemEnvironmentPrivilege 644 powershell.exe Token: SeRemoteShutdownPrivilege 644 powershell.exe Token: SeUndockPrivilege 644 powershell.exe Token: SeManageVolumePrivilege 644 powershell.exe Token: 33 644 powershell.exe Token: 34 644 powershell.exe Token: 35 644 powershell.exe Token: 36 644 powershell.exe Token: SeIncreaseQuotaPrivilege 4636 powershell.exe Token: SeSecurityPrivilege 4636 powershell.exe Token: SeTakeOwnershipPrivilege 4636 powershell.exe Token: SeLoadDriverPrivilege 4636 powershell.exe Token: SeSystemProfilePrivilege 4636 powershell.exe Token: SeSystemtimePrivilege 4636 powershell.exe Token: SeProfSingleProcessPrivilege 4636 powershell.exe Token: SeIncBasePriorityPrivilege 4636 powershell.exe Token: SeCreatePagefilePrivilege 4636 powershell.exe Token: SeBackupPrivilege 4636 powershell.exe Token: SeRestorePrivilege 4636 powershell.exe Token: SeShutdownPrivilege 4636 powershell.exe Token: SeDebugPrivilege 4636 powershell.exe Token: SeSystemEnvironmentPrivilege 4636 powershell.exe Token: SeRemoteShutdownPrivilege 4636 powershell.exe Token: SeUndockPrivilege 4636 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3972 wrote to memory of 1388 3972 9f31c60a44a796647e0c24eaf74cf7e1bb9b0e48b43610cc69944b4141df8211.exe 66 PID 3972 wrote to memory of 1388 3972 9f31c60a44a796647e0c24eaf74cf7e1bb9b0e48b43610cc69944b4141df8211.exe 66 PID 3972 wrote to memory of 1388 3972 9f31c60a44a796647e0c24eaf74cf7e1bb9b0e48b43610cc69944b4141df8211.exe 66 PID 1388 wrote to memory of 4012 1388 WScript.exe 67 PID 1388 wrote to memory of 4012 1388 WScript.exe 67 PID 1388 wrote to memory of 4012 1388 WScript.exe 67 PID 4012 wrote to memory of 576 4012 cmd.exe 69 PID 4012 wrote to memory of 576 4012 cmd.exe 69 PID 576 wrote to memory of 3928 576 DllCommonsvc.exe 80 PID 576 wrote to memory of 3928 576 DllCommonsvc.exe 80 PID 576 wrote to memory of 644 576 DllCommonsvc.exe 82 PID 576 wrote to memory of 644 576 DllCommonsvc.exe 82 PID 576 wrote to memory of 4636 576 DllCommonsvc.exe 83 PID 576 wrote to memory of 4636 576 DllCommonsvc.exe 83 PID 576 wrote to memory of 4528 576 DllCommonsvc.exe 84 PID 576 wrote to memory of 4528 576 DllCommonsvc.exe 84 PID 576 wrote to memory of 1000 576 DllCommonsvc.exe 88 PID 576 wrote to memory of 1000 576 DllCommonsvc.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f31c60a44a796647e0c24eaf74cf7e1bb9b0e48b43610cc69944b4141df8211.exe"C:\Users\Admin\AppData\Local\Temp\9f31c60a44a796647e0c24eaf74cf7e1bb9b0e48b43610cc69944b4141df8211.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\System.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Prefetch\ReadyBoot\sihost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Fonts\conhost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\providercommon\System.exe"C:\providercommon\System.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\providercommon\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\providercommon\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\providercommon\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Windows\Prefetch\ReadyBoot\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\Prefetch\ReadyBoot\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:\Windows\Prefetch\ReadyBoot\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\Windows\Fonts\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\Fonts\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Windows\Fonts\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4208
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
Filesize
1KB
MD5cd6448170a2a479bc0eecbbbedbf288c
SHA168151783f621f379cb6b75c184bb2dddc3dad40c
SHA256cc93065ef11aed27cec65cc5cfcb695d7a281972977908fd94e4b4a6fd13835f
SHA5128a23c82433cf271a4cd78d6517a51a93dcb24e038f49b1dc18f6b9fdb17dcd7fca8672ccd7ff84a60ef9c72bc6753b85803314dd318e69f569e633b537bc0b37
-
Filesize
1KB
MD559e0297f6fabe36839c8fab6ecdf76ad
SHA1e7ed52677e37b4d09d7fedd17c18c3fa92f8973f
SHA2564863c173063011549dec45366077696f9bc82cbd99188083c17b7cef0608c23d
SHA5128dd299cbf5b0fbe723f2b8daa91755b4ad87761a048bd82f828cba8ddf89b536c43203c9d893fb4fc6af61b5d1defc69a58a1ecf4be3c5f4e00503fed0f78e2a
-
Filesize
1KB
MD559e0297f6fabe36839c8fab6ecdf76ad
SHA1e7ed52677e37b4d09d7fedd17c18c3fa92f8973f
SHA2564863c173063011549dec45366077696f9bc82cbd99188083c17b7cef0608c23d
SHA5128dd299cbf5b0fbe723f2b8daa91755b4ad87761a048bd82f828cba8ddf89b536c43203c9d893fb4fc6af61b5d1defc69a58a1ecf4be3c5f4e00503fed0f78e2a
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478