Analysis
-
max time kernel
55s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2023 20:52
Static task
static1
Behavioral task
behavioral1
Sample
Midnite.exe
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
Midnite.exe
Resource
win10v2004-20221111-en
General
-
Target
Midnite.exe
-
Size
1.3MB
-
MD5
ce12be878d15f0babc5e2ccdec0ec473
-
SHA1
74c770c0c9c7faae5d391f96bde8f1baf3080c6d
-
SHA256
675d500266a8a61ed4ddb26a9bd442f4f25f3c21190a190709d2d2c26825e96d
-
SHA512
ae5d83bd75c1ee080a7461c36e28b1d6981231ace095519c94060689d8b0994a2c3aa16d0df2f7697f6d1f7f94b42bdf03e3179fec7ea2b051b20b4b13cef3bd
-
SSDEEP
24576:5gfTztXIwQkLAvEONLP3c7RgGOxPC/v42qlb:GNXIwQkezs7RC4I2Sb
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Processes:
resource yara_rule behavioral2/memory/3788-135-0x0000000000400000-0x00000000004CE000-memory.dmp dcrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Midnite.exedescription pid process target process PID 2356 set thread context of 3788 2356 Midnite.exe InstallUtil.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
InstallUtil.exetaskmgr.exepid process 3788 InstallUtil.exe 4692 taskmgr.exe 4692 taskmgr.exe 3788 InstallUtil.exe 3788 InstallUtil.exe 3788 InstallUtil.exe 3788 InstallUtil.exe 4692 taskmgr.exe 4692 taskmgr.exe 3788 InstallUtil.exe 3788 InstallUtil.exe 3788 InstallUtil.exe 3788 InstallUtil.exe 3788 InstallUtil.exe 3788 InstallUtil.exe 3788 InstallUtil.exe 3788 InstallUtil.exe 4692 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
InstallUtil.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 3788 InstallUtil.exe Token: SeDebugPrivilege 4692 taskmgr.exe Token: SeSystemProfilePrivilege 4692 taskmgr.exe Token: SeCreateGlobalPrivilege 4692 taskmgr.exe Token: 33 4692 taskmgr.exe Token: SeIncBasePriorityPrivilege 4692 taskmgr.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
Processes:
taskmgr.exepid process 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
taskmgr.exepid process 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe 4692 taskmgr.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Midnite.exedescription pid process target process PID 2356 wrote to memory of 5012 2356 Midnite.exe cmd.exe PID 2356 wrote to memory of 5012 2356 Midnite.exe cmd.exe PID 2356 wrote to memory of 5012 2356 Midnite.exe cmd.exe PID 2356 wrote to memory of 4896 2356 Midnite.exe InstallUtil.exe PID 2356 wrote to memory of 4896 2356 Midnite.exe InstallUtil.exe PID 2356 wrote to memory of 4896 2356 Midnite.exe InstallUtil.exe PID 2356 wrote to memory of 3788 2356 Midnite.exe InstallUtil.exe PID 2356 wrote to memory of 3788 2356 Midnite.exe InstallUtil.exe PID 2356 wrote to memory of 3788 2356 Midnite.exe InstallUtil.exe PID 2356 wrote to memory of 3788 2356 Midnite.exe InstallUtil.exe PID 2356 wrote to memory of 3788 2356 Midnite.exe InstallUtil.exe PID 2356 wrote to memory of 3788 2356 Midnite.exe InstallUtil.exe PID 2356 wrote to memory of 3788 2356 Midnite.exe InstallUtil.exe PID 2356 wrote to memory of 3788 2356 Midnite.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Midnite.exe"C:\Users\Admin\AppData\Local\Temp\Midnite.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:5012
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:4896
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4692