Analysis

  • max time kernel
    144s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2023 18:26

General

  • Target

    HEUR-Trojan-Spy.MSIL.Stealer.gen-39a3a518c36b.exe

  • Size

    1.1MB

  • MD5

    56180487c674bc5e9ae5346a8fa72b4a

  • SHA1

    86058ef7aecd0a9d3bc5f97809e1e0844ab68109

  • SHA256

    39a3a518c36b4c72d04a00171bfe84b36c830ef87afcd69c8d120abddafa97c8

  • SHA512

    27a051a7a6072e8556c6771648ebb16dffe2116c14e30c50ace66f3370b56904f35f96f8e18a628e16c35b3049f8f420523f90e0f46fa5f167211569280250c5

  • SSDEEP

    12288:7ooQ4tQRgvTUxOjOK2C6vo7FFPfvgPVQy3TiNUOckHd4qn4:7out+gvTUwjOK2C4oLPformNUOtH2+4

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Spy.MSIL.Stealer.gen-39a3a518c36b.exe
    "C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Spy.MSIL.Stealer.gen-39a3a518c36b.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3468
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Documents and Settings\StartMenuExperienceHost.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:4092
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\EapTeapExt\dllhost.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:3212
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\en-US\StartMenuExperienceHost.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:3764
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AppxSignature\StartMenuExperienceHost.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1116
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\System32\msg711\sihost.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:4960
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\D3D12\dllhost.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:4912
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\kbdlisub\winlogon.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1744
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\Windows.UI.Logon\RuntimeBroker.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:3484
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\DDORes\spoolsv.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1328
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zAxBcO0nJT.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5020
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:4732
        • C:\Windows\system32\PING.EXE
          ping -n 5 localhost
          3⤵
          • Runs ping.exe
          PID:3172
        • C:\Windows\System32\EapTeapExt\dllhost.exe
          "C:\Windows\System32\EapTeapExt\dllhost.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:236

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Remote System Discovery

    1
    T1018

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\zAxBcO0nJT.bat
      Filesize

      208B

      MD5

      5574d6b25c94f486c6c78f10a4d69216

      SHA1

      ef9bf19d721441aea262631fb26037ab9e47bc52

      SHA256

      8f73873b1b1748b649655b5619eaa5e8911a0c48e276fe5d29898ba97dbc5596

      SHA512

      94f34728ae3f5915f9cfe70403481bc572dee858efe78819195ff9361b9427e0af364c080ef6ae64818c26febf7abf04659efc18b7ce14faf621dc94c80e6f5f

    • C:\Windows\System32\EapTeapExt\dllhost.exe
      Filesize

      1.1MB

      MD5

      56180487c674bc5e9ae5346a8fa72b4a

      SHA1

      86058ef7aecd0a9d3bc5f97809e1e0844ab68109

      SHA256

      39a3a518c36b4c72d04a00171bfe84b36c830ef87afcd69c8d120abddafa97c8

      SHA512

      27a051a7a6072e8556c6771648ebb16dffe2116c14e30c50ace66f3370b56904f35f96f8e18a628e16c35b3049f8f420523f90e0f46fa5f167211569280250c5

    • C:\Windows\System32\EapTeapExt\dllhost.exe
      Filesize

      1.1MB

      MD5

      56180487c674bc5e9ae5346a8fa72b4a

      SHA1

      86058ef7aecd0a9d3bc5f97809e1e0844ab68109

      SHA256

      39a3a518c36b4c72d04a00171bfe84b36c830ef87afcd69c8d120abddafa97c8

      SHA512

      27a051a7a6072e8556c6771648ebb16dffe2116c14e30c50ace66f3370b56904f35f96f8e18a628e16c35b3049f8f420523f90e0f46fa5f167211569280250c5

    • memory/236-152-0x00007FFA02680000-0x00007FFA03141000-memory.dmp
      Filesize

      10.8MB

    • memory/236-151-0x00007FFA02680000-0x00007FFA03141000-memory.dmp
      Filesize

      10.8MB

    • memory/236-148-0x0000000000000000-mapping.dmp
    • memory/1116-137-0x0000000000000000-mapping.dmp
    • memory/1328-142-0x0000000000000000-mapping.dmp
    • memory/1744-140-0x0000000000000000-mapping.dmp
    • memory/3172-147-0x0000000000000000-mapping.dmp
    • memory/3212-135-0x0000000000000000-mapping.dmp
    • memory/3468-132-0x0000000000870000-0x0000000000986000-memory.dmp
      Filesize

      1.1MB

    • memory/3468-133-0x00007FFA02680000-0x00007FFA03141000-memory.dmp
      Filesize

      10.8MB

    • memory/3468-146-0x00007FFA02680000-0x00007FFA03141000-memory.dmp
      Filesize

      10.8MB

    • memory/3484-141-0x0000000000000000-mapping.dmp
    • memory/3764-136-0x0000000000000000-mapping.dmp
    • memory/4092-134-0x0000000000000000-mapping.dmp
    • memory/4732-145-0x0000000000000000-mapping.dmp
    • memory/4912-139-0x0000000000000000-mapping.dmp
    • memory/4960-138-0x0000000000000000-mapping.dmp
    • memory/5020-143-0x0000000000000000-mapping.dmp