Analysis
-
max time kernel
301s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 07:48
Static task
static1
Behavioral task
behavioral1
Sample
8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe
Resource
win10v2004-20220901-en
General
-
Target
8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe
-
Size
1.1MB
-
MD5
b478d340a787b85e086cc951d0696cb1
-
SHA1
563d9f1b35b4898d16aff1dccd8969299f7ab8b7
-
SHA256
8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95
-
SHA512
93c5a3010ae7bf41ad966902aeaa32e17faa0bad3e76248e2096478af5bf169f817c6914a775efc666967a425716609099be8bf69e2900613a65791e4fcd3e09
-
SSDEEP
24576:npe9a9aC/qF5EZNo9DzDn07bPVICwUmmHcexxnn:pwa9a9F54qH075kUmmHxx1n
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Executes dropped EXE 6 IoCs
Processes:
mnb.exefsdffc.exedfsds.exedaaca.exesvchost.exedal.exepid process 4720 mnb.exe 2204 fsdffc.exe 1332 dfsds.exe 4384 daaca.exe 2224 svchost.exe 3500 dal.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
mnb.exedfsds.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation mnb.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation dfsds.exe -
Drops startup file 2 IoCs
Processes:
dfsds.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sysdll32.lnk dfsds.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dotNET.lnk dfsds.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
dfsds.exeExplorer.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wininit = "C:\\Sysdll32.lnk" dfsds.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Time Manager = "C:\\ProgramData\\TimeManager.exe" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\scrss = "C:\\Users\\Admin\\AppData\\Roaming\\dotNET.lnk" dfsds.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3108 4384 WerFault.exe daaca.exe -
NSIS installer 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\dal.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\dal.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\dal.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\dal.exe nsis_installer_2 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Explorer.EXEfsdffc.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Explorer.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 fsdffc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz fsdffc.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Explorer.EXE -
Processes:
Explorer.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Explorer.EXE -
Modifies registry class 64 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\IconSize = "48" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupView = "4294967295" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 020000000100000000000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = ffffffff Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\FFlags = "1092616193" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Mode = "6" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{25CC242B-9A7C-4F51-80E0-7A2928FEBE42}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{25CC242B-9A7C-4F51-80E0-7A2928FEBE42}\Sort = 000000000000000000000000000000000100000002d5cdd59c2e1b10939708002b2cf9ae0200000001000000 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{25CC242B-9A7C-4F51-80E0-7A2928FEBE42}\GroupByKey:FMTID = "{D5CDD502-2E9C-101B-9397-08002B2CF9AE}" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668} Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 14001f580d1a2cf021be504388b07367fc96ef3c0000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac04000000c8000000354b179bff40d211a27e00c04fc308710300000080000000354b179bff40d211a27e00c04fc308710200000080000000 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{25CC242B-9A7C-4F51-80E0-7A2928FEBE42}\GroupByDirection = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\FFlags = "1092616209" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f80cb859f6720028040b29b5540cc05aab60000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\NodeSlot = "1" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Rev = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\NodeSlot = "3" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{25CC242B-9A7C-4F51-80E0-7A2928FEBE42} Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\LogicalViewMode = "2" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Sort = 0000000000000000000000000000000002000000f4eec83032a8e241ab32e3c3ca28fd29030000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupByDirection = "1" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{25CC242B-9A7C-4F51-80E0-7A2928FEBE42}\Mode = "6" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{25CC242B-9A7C-4F51-80E0-7A2928FEBE42}\IconSize = "48" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "48" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "4294967295" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{25CC242B-9A7C-4F51-80E0-7A2928FEBE42}\GroupView = "4294967295" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{25CC242B-9A7C-4F51-80E0-7A2928FEBE42}\GroupByKey:PID = "2" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupByKey:PID = "2" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{25CC242B-9A7C-4F51-80E0-7A2928FEBE42}\LogicalViewMode = "2" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{25CC242B-9A7C-4F51-80E0-7A2928FEBE42}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000f000000002d5cdd59c2e1b10939708002b2cf9ae02000000f00000000e9fde5ce41d534496a956e8832efa3d02000000f0000000a66a63283d95d211b5d600c04fd918d004000000f0000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = ffffffff Explorer.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Explorer.EXEpid process 2440 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
daaca.exedfsds.exesvchost.exepid process 4384 daaca.exe 4384 daaca.exe 1332 dfsds.exe 1332 dfsds.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2440 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 61 IoCs
Processes:
daaca.exedfsds.exeExplorer.EXEsvchost.exedescription pid process Token: SeDebugPrivilege 4384 daaca.exe Token: SeDebugPrivilege 1332 dfsds.exe Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeDebugPrivilege 2224 svchost.exe Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Explorer.EXEpid process 2440 Explorer.EXE 2440 Explorer.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exemnb.exedaaca.exedfsds.exedescription pid process target process PID 4100 wrote to memory of 4720 4100 8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe mnb.exe PID 4100 wrote to memory of 4720 4100 8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe mnb.exe PID 4100 wrote to memory of 4720 4100 8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe mnb.exe PID 4720 wrote to memory of 2204 4720 mnb.exe fsdffc.exe PID 4720 wrote to memory of 2204 4720 mnb.exe fsdffc.exe PID 4720 wrote to memory of 2204 4720 mnb.exe fsdffc.exe PID 4720 wrote to memory of 1332 4720 mnb.exe dfsds.exe PID 4720 wrote to memory of 1332 4720 mnb.exe dfsds.exe PID 4720 wrote to memory of 4384 4720 mnb.exe daaca.exe PID 4720 wrote to memory of 4384 4720 mnb.exe daaca.exe PID 4720 wrote to memory of 4384 4720 mnb.exe daaca.exe PID 4384 wrote to memory of 2440 4384 daaca.exe Explorer.EXE PID 4384 wrote to memory of 2440 4384 daaca.exe Explorer.EXE PID 4384 wrote to memory of 2440 4384 daaca.exe Explorer.EXE PID 4384 wrote to memory of 2440 4384 daaca.exe Explorer.EXE PID 4384 wrote to memory of 2440 4384 daaca.exe Explorer.EXE PID 4384 wrote to memory of 2440 4384 daaca.exe Explorer.EXE PID 4384 wrote to memory of 2440 4384 daaca.exe Explorer.EXE PID 4384 wrote to memory of 2440 4384 daaca.exe Explorer.EXE PID 4384 wrote to memory of 2440 4384 daaca.exe Explorer.EXE PID 4384 wrote to memory of 2440 4384 daaca.exe Explorer.EXE PID 4384 wrote to memory of 2440 4384 daaca.exe Explorer.EXE PID 1332 wrote to memory of 2224 1332 dfsds.exe svchost.exe PID 1332 wrote to memory of 2224 1332 dfsds.exe svchost.exe PID 4100 wrote to memory of 3500 4100 8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe dal.exe PID 4100 wrote to memory of 3500 4100 8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe dal.exe PID 4100 wrote to memory of 3500 4100 8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe dal.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe"C:\Users\Admin\AppData\Local\Temp\8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\mnb.exe"C:\Users\Admin\AppData\Local\Temp\mnb.exe" -s -psfghrykjrsetdrfhjryuygs3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Roaming\fsdffc.exe"C:\Users\Admin\AppData\Roaming\fsdffc.exe"4⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2204 -
C:\Users\Admin\AppData\Roaming\dfsds.exe"C:\Users\Admin\AppData\Roaming\dfsds.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2224 -
C:\Users\Admin\AppData\Roaming\daaca.exe"C:\Users\Admin\AppData\Roaming\daaca.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 1445⤵
- Program crash
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\dal.exe"C:\Users\Admin\AppData\Local\Temp\dal.exe"3⤵
- Executes dropped EXE
PID:3500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4384 -ip 43841⤵PID:4092
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost1⤵PID:2836
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD569947fc31894cd78ea651768721e26fa
SHA18f1d431dc0e082e29b8e420df9063737c56d6600
SHA2562e16065cb223473d0891696e8bed97c240baad32d66c71a9c35b3f2faa1c02b7
SHA512d1ebb7427a16201f827c918798e9c90a278b936846459f01ad09f4f095989792260cfab243f3a3655db2784a4a979f9badfd57462d0e7aa233f8c7f83a5fd1f0
-
Filesize
35KB
MD569947fc31894cd78ea651768721e26fa
SHA18f1d431dc0e082e29b8e420df9063737c56d6600
SHA2562e16065cb223473d0891696e8bed97c240baad32d66c71a9c35b3f2faa1c02b7
SHA512d1ebb7427a16201f827c918798e9c90a278b936846459f01ad09f4f095989792260cfab243f3a3655db2784a4a979f9badfd57462d0e7aa233f8c7f83a5fd1f0
-
Filesize
1.2MB
MD58d44f882db1ce5ec780096bd698cadeb
SHA15eb4589f28d054befe40750a7c54de8a6f1bd0fa
SHA256103df9101017558d967a8d246739520b7024a930319c3352278c19298ec6084e
SHA512f97ccc467096023d704a4761c253ac73ed9bd3173cf1b7734b3cc6433e53f9e26393b30922c6836349a834ce8293c8b55c742a2be3f89cef42f5d2e8473347e7
-
Filesize
1.2MB
MD58d44f882db1ce5ec780096bd698cadeb
SHA15eb4589f28d054befe40750a7c54de8a6f1bd0fa
SHA256103df9101017558d967a8d246739520b7024a930319c3352278c19298ec6084e
SHA512f97ccc467096023d704a4761c253ac73ed9bd3173cf1b7734b3cc6433e53f9e26393b30922c6836349a834ce8293c8b55c742a2be3f89cef42f5d2e8473347e7
-
Filesize
415KB
MD5dda23435a7b21721ba96ae7fb9812e20
SHA12e179d2f38f04879d249aac505ec05e99efbe6aa
SHA256521729034f0ce5b2d3616d8efb8fc43202181cd8c6ff48b535b695dbcde75eb6
SHA512b0972d4ad7f1ca9b3ff08fef2bd4f39368877233c100aa17caf7d93c0d8baa3cc390b7f6d3150af5f4e2d2f6352bbba9b51862790f53934cab1755720293b7ce
-
Filesize
415KB
MD5dda23435a7b21721ba96ae7fb9812e20
SHA12e179d2f38f04879d249aac505ec05e99efbe6aa
SHA256521729034f0ce5b2d3616d8efb8fc43202181cd8c6ff48b535b695dbcde75eb6
SHA512b0972d4ad7f1ca9b3ff08fef2bd4f39368877233c100aa17caf7d93c0d8baa3cc390b7f6d3150af5f4e2d2f6352bbba9b51862790f53934cab1755720293b7ce
-
Filesize
1.2MB
MD5047af34af65efd5c6ee38eb7ad100a01
SHA161809e8f559b27e72a603a45a53116327845dbeb
SHA256931972b7531ee614ff9f9403fb0612ca4e3d668c5bfbedacb9fe18e4ac312f1d
SHA5127e0355636e5883fff7d42c78bc67973b5da4216a7b07fa94e089ff2aaa6f957356e0bc089d89dde71ba0151d3588c5713c9d15f205419cbb5abcd253beed9f4d
-
Filesize
1.2MB
MD5047af34af65efd5c6ee38eb7ad100a01
SHA161809e8f559b27e72a603a45a53116327845dbeb
SHA256931972b7531ee614ff9f9403fb0612ca4e3d668c5bfbedacb9fe18e4ac312f1d
SHA5127e0355636e5883fff7d42c78bc67973b5da4216a7b07fa94e089ff2aaa6f957356e0bc089d89dde71ba0151d3588c5713c9d15f205419cbb5abcd253beed9f4d
-
Filesize
48KB
MD5f12bdda1f8ea3816740ba7a81df1e92e
SHA17e8f561c66e76868d2145029f71fd6ed8bc3dd50
SHA256d93f9e11688e7317fabcf7ea26ed573619edece0ae6520e80624705ac1dbb273
SHA512f095f82295fda5622a0b682041d7934a1e943c652a9527d649764cbd0c0ae5d16f2a341aa95bf03383793cead97cea93c38276b6260acae431836088ff944abb
-
Filesize
48KB
MD5f12bdda1f8ea3816740ba7a81df1e92e
SHA17e8f561c66e76868d2145029f71fd6ed8bc3dd50
SHA256d93f9e11688e7317fabcf7ea26ed573619edece0ae6520e80624705ac1dbb273
SHA512f095f82295fda5622a0b682041d7934a1e943c652a9527d649764cbd0c0ae5d16f2a341aa95bf03383793cead97cea93c38276b6260acae431836088ff944abb
-
Filesize
1.2MB
MD5047af34af65efd5c6ee38eb7ad100a01
SHA161809e8f559b27e72a603a45a53116327845dbeb
SHA256931972b7531ee614ff9f9403fb0612ca4e3d668c5bfbedacb9fe18e4ac312f1d
SHA5127e0355636e5883fff7d42c78bc67973b5da4216a7b07fa94e089ff2aaa6f957356e0bc089d89dde71ba0151d3588c5713c9d15f205419cbb5abcd253beed9f4d
-
Filesize
1.2MB
MD5047af34af65efd5c6ee38eb7ad100a01
SHA161809e8f559b27e72a603a45a53116327845dbeb
SHA256931972b7531ee614ff9f9403fb0612ca4e3d668c5bfbedacb9fe18e4ac312f1d
SHA5127e0355636e5883fff7d42c78bc67973b5da4216a7b07fa94e089ff2aaa6f957356e0bc089d89dde71ba0151d3588c5713c9d15f205419cbb5abcd253beed9f4d