Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
22-01-2023 13:26
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe
Resource
win10v2004-20221111-en
General
-
Target
HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe
-
Size
1.5MB
-
MD5
142fc3f98e2b78474c392c72a6e4b826
-
SHA1
85e4bf6f82e3bc640652df5982a937fa1457e541
-
SHA256
f45baeadbd3670a3d6f0e5e5dd53325269153dcd02195c8d98d1a49db8a6b46c
-
SHA512
f1c80e94cc0d3deb7302d98fd9349d90114ccf370ba29e89329797f43404daa38fedde38bf241e713b78da3c43fbefd32566b522bf89fef195dcd1442e4ae964
-
SSDEEP
24576:fClaqwJlj0Wxxjb2dTGH7i3uOpK4KH/cKgphBhxqdvhm/Y3TnJ6f:fCqlj0exjxH7xn/WphBhg8A7J
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Processes:
resource yara_rule behavioral1/memory/588-65-0x000000000051817E-mapping.dmp dcrat behavioral1/memory/588-66-0x0000000000330000-0x0000000000454000-memory.dmp dcrat behavioral1/memory/588-67-0x0000000000330000-0x0000000000454000-memory.dmp dcrat behavioral1/memory/588-71-0x0000000000330000-0x0000000000454000-memory.dmp dcrat behavioral1/memory/588-74-0x0000000000330000-0x0000000000454000-memory.dmp dcrat behavioral1/memory/436-90-0x0000000000400000-0x0000000000524000-memory.dmp dcrat behavioral1/memory/436-91-0x0000000000400000-0x0000000000524000-memory.dmp dcrat behavioral1/memory/436-93-0x000000000051817E-mapping.dmp dcrat behavioral1/memory/436-88-0x0000000000400000-0x0000000000524000-memory.dmp dcrat behavioral1/memory/436-98-0x0000000000400000-0x0000000000524000-memory.dmp dcrat behavioral1/memory/436-96-0x0000000000400000-0x0000000000524000-memory.dmp dcrat -
Executes dropped EXE 2 IoCs
Processes:
csrss.execsrss.exepid process 1136 csrss.exe 436 csrss.exe -
Loads dropped DLL 1 IoCs
Processes:
HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exepid process 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe -
Drops file in System32 directory 7 IoCs
Processes:
HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exedescription ioc process File created C:\Windows\SysWOW64\wbem\wbemdisp\WmiPrvSE.exe HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe File opened for modification C:\Windows\SysWOW64\wbem\wbemdisp\WmiPrvSE.exe HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe File created C:\Windows\SysWOW64\wbem\wbemdisp\24dbde2999530ef5fd907494bc374d663924116c HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe File created C:\Windows\SysWOW64\ndptsp\csrss.exe HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe File created C:\Windows\SysWOW64\ndptsp\886983d96e3d3e31032c679b2d4ea91b6c05afef HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe File created C:\Windows\SysWOW64\nlsbres\winlogon.exe HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe File created C:\Windows\SysWOW64\nlsbres\cc11b995f2a76da408ea6a601e682e64743153ad HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.execsrss.exedescription pid process target process PID 1276 set thread context of 588 1276 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe PID 1136 set thread context of 436 1136 csrss.exe csrss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1556 schtasks.exe 844 schtasks.exe 900 schtasks.exe 1648 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.execsrss.exepid process 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe 436 csrss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.execsrss.exedescription pid process Token: SeDebugPrivilege 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe Token: SeDebugPrivilege 436 csrss.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exeHEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.execsrss.exedescription pid process target process PID 1276 wrote to memory of 588 1276 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe PID 1276 wrote to memory of 588 1276 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe PID 1276 wrote to memory of 588 1276 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe PID 1276 wrote to memory of 588 1276 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe PID 1276 wrote to memory of 588 1276 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe PID 1276 wrote to memory of 588 1276 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe PID 1276 wrote to memory of 588 1276 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe PID 1276 wrote to memory of 588 1276 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe PID 1276 wrote to memory of 588 1276 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe PID 1276 wrote to memory of 588 1276 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe PID 588 wrote to memory of 900 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe schtasks.exe PID 588 wrote to memory of 900 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe schtasks.exe PID 588 wrote to memory of 900 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe schtasks.exe PID 588 wrote to memory of 900 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe schtasks.exe PID 588 wrote to memory of 1648 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe schtasks.exe PID 588 wrote to memory of 1648 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe schtasks.exe PID 588 wrote to memory of 1648 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe schtasks.exe PID 588 wrote to memory of 1648 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe schtasks.exe PID 588 wrote to memory of 1556 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe schtasks.exe PID 588 wrote to memory of 1556 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe schtasks.exe PID 588 wrote to memory of 1556 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe schtasks.exe PID 588 wrote to memory of 1556 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe schtasks.exe PID 588 wrote to memory of 844 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe schtasks.exe PID 588 wrote to memory of 844 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe schtasks.exe PID 588 wrote to memory of 844 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe schtasks.exe PID 588 wrote to memory of 844 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe schtasks.exe PID 588 wrote to memory of 1136 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe csrss.exe PID 588 wrote to memory of 1136 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe csrss.exe PID 588 wrote to memory of 1136 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe csrss.exe PID 588 wrote to memory of 1136 588 HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe csrss.exe PID 1136 wrote to memory of 436 1136 csrss.exe csrss.exe PID 1136 wrote to memory of 436 1136 csrss.exe csrss.exe PID 1136 wrote to memory of 436 1136 csrss.exe csrss.exe PID 1136 wrote to memory of 436 1136 csrss.exe csrss.exe PID 1136 wrote to memory of 436 1136 csrss.exe csrss.exe PID 1136 wrote to memory of 436 1136 csrss.exe csrss.exe PID 1136 wrote to memory of 436 1136 csrss.exe csrss.exe PID 1136 wrote to memory of 436 1136 csrss.exe csrss.exe PID 1136 wrote to memory of 436 1136 csrss.exe csrss.exe PID 1136 wrote to memory of 436 1136 csrss.exe csrss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-PSW.MSIL.Reline.gen-f45baeadbd367.exe"{path}"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\wbemdisp\WmiPrvSE.exe'" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\ndptsp\csrss.exe'" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\nlsbres\winlogon.exe'" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Admin\Videos\Idle.exe'" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\ndptsp\csrss.exe"C:\Windows\System32\ndptsp\csrss.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ndptsp\csrss.exe"{path}"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\ndptsp\csrss.exeFilesize
1.5MB
MD5142fc3f98e2b78474c392c72a6e4b826
SHA185e4bf6f82e3bc640652df5982a937fa1457e541
SHA256f45baeadbd3670a3d6f0e5e5dd53325269153dcd02195c8d98d1a49db8a6b46c
SHA512f1c80e94cc0d3deb7302d98fd9349d90114ccf370ba29e89329797f43404daa38fedde38bf241e713b78da3c43fbefd32566b522bf89fef195dcd1442e4ae964
-
C:\Windows\SysWOW64\ndptsp\csrss.exeFilesize
1.5MB
MD5142fc3f98e2b78474c392c72a6e4b826
SHA185e4bf6f82e3bc640652df5982a937fa1457e541
SHA256f45baeadbd3670a3d6f0e5e5dd53325269153dcd02195c8d98d1a49db8a6b46c
SHA512f1c80e94cc0d3deb7302d98fd9349d90114ccf370ba29e89329797f43404daa38fedde38bf241e713b78da3c43fbefd32566b522bf89fef195dcd1442e4ae964
-
C:\Windows\SysWOW64\ndptsp\csrss.exeFilesize
1.5MB
MD5142fc3f98e2b78474c392c72a6e4b826
SHA185e4bf6f82e3bc640652df5982a937fa1457e541
SHA256f45baeadbd3670a3d6f0e5e5dd53325269153dcd02195c8d98d1a49db8a6b46c
SHA512f1c80e94cc0d3deb7302d98fd9349d90114ccf370ba29e89329797f43404daa38fedde38bf241e713b78da3c43fbefd32566b522bf89fef195dcd1442e4ae964
-
\Windows\SysWOW64\ndptsp\csrss.exeFilesize
1.5MB
MD5142fc3f98e2b78474c392c72a6e4b826
SHA185e4bf6f82e3bc640652df5982a937fa1457e541
SHA256f45baeadbd3670a3d6f0e5e5dd53325269153dcd02195c8d98d1a49db8a6b46c
SHA512f1c80e94cc0d3deb7302d98fd9349d90114ccf370ba29e89329797f43404daa38fedde38bf241e713b78da3c43fbefd32566b522bf89fef195dcd1442e4ae964
-
memory/436-96-0x0000000000400000-0x0000000000524000-memory.dmpFilesize
1.1MB
-
memory/436-98-0x0000000000400000-0x0000000000524000-memory.dmpFilesize
1.1MB
-
memory/436-88-0x0000000000400000-0x0000000000524000-memory.dmpFilesize
1.1MB
-
memory/436-93-0x000000000051817E-mapping.dmp
-
memory/436-91-0x0000000000400000-0x0000000000524000-memory.dmpFilesize
1.1MB
-
memory/436-90-0x0000000000400000-0x0000000000524000-memory.dmpFilesize
1.1MB
-
memory/588-66-0x0000000000330000-0x0000000000454000-memory.dmpFilesize
1.1MB
-
memory/588-58-0x0000000000330000-0x0000000000454000-memory.dmpFilesize
1.1MB
-
memory/588-57-0x0000000000330000-0x0000000000454000-memory.dmpFilesize
1.1MB
-
memory/588-65-0x000000000051817E-mapping.dmp
-
memory/588-67-0x0000000000330000-0x0000000000454000-memory.dmpFilesize
1.1MB
-
memory/588-75-0x0000000076381000-0x0000000076383000-memory.dmpFilesize
8KB
-
memory/588-71-0x0000000000330000-0x0000000000454000-memory.dmpFilesize
1.1MB
-
memory/588-74-0x0000000000330000-0x0000000000454000-memory.dmpFilesize
1.1MB
-
memory/844-79-0x0000000000000000-mapping.dmp
-
memory/900-76-0x0000000000000000-mapping.dmp
-
memory/1136-81-0x0000000000000000-mapping.dmp
-
memory/1136-84-0x0000000001000000-0x000000000118A000-memory.dmpFilesize
1.5MB
-
memory/1276-54-0x0000000000030000-0x00000000001BA000-memory.dmpFilesize
1.5MB
-
memory/1276-56-0x0000000000440000-0x000000000044C000-memory.dmpFilesize
48KB
-
memory/1276-55-0x00000000072D0000-0x0000000007514000-memory.dmpFilesize
2.3MB
-
memory/1556-78-0x0000000000000000-mapping.dmp
-
memory/1648-77-0x0000000000000000-mapping.dmp