Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-01-2023 14:01

General

  • Target

    HEUR-Backdoor.MSIL.LightStone.gen-1901ac563dc.exe

  • Size

    1.3MB

  • MD5

    bbcb2719208a4b82dce603101e18c7d9

  • SHA1

    dc778b4cc86f331381cbbccf6c823a2c31225288

  • SHA256

    1901ac563dc9ca30665837cb510c5e05b757e0017ac8e6dd038f1b8b87a69e30

  • SHA512

    adec71d8daf3ae8bb241840808fb274bb997f8554b47057270c0cf06cc4696a6e1a55ebd977c7e67f8b66d08b36aed430498e6f209b7b543cf76d38c2c040a90

  • SSDEEP

    24576:t/4NroVWFKq4XG+b3cuEx9V9P8nt6Qhc0yB+4:KNroVWhclcuE9VWoIJ

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Modifies WinLogon for persistence 2 TTPs 8 IoCs
  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 16 IoCs
  • Drops file in System32 directory 13 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HEUR-Backdoor.MSIL.LightStone.gen-1901ac563dc.exe
    "C:\Users\Admin\AppData\Local\Temp\HEUR-Backdoor.MSIL.LightStone.gen-1901ac563dc.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\pla\csrss.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1260
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\twunk_16\explorer.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1740
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\DeviceDisplayStatusManager\csrss.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:560
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "Idle" /sc ONLOGON /tr "'C:\PerfLogs\Admin\Idle.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1308
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\WMASF\smss.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1384
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\msxml3r\csrss.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:540
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\serwvdrv\lsm.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1568
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\msgsm32\csrss.exe'" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:988
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nFbtq0N3zk.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1832
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:912
        • C:\Windows\system32\PING.EXE
          ping -n 5 localhost
          3⤵
          • Runs ping.exe
          PID:1856
        • C:\Windows\System32\serwvdrv\lsm.exe
          "C:\Windows\System32\serwvdrv\lsm.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1932

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nFbtq0N3zk.bat

      Filesize

      202B

      MD5

      0a4597c1975617e9470e76c324304081

      SHA1

      73f913f74a951967f40b9eb5d09145678e95e777

      SHA256

      9a69f7afc7cd6dfe4d86d748c07b2a2c6e4132ca83154ee9ba96a43c082070d1

      SHA512

      86b96a5b160286f16f1f50bd2be142b9a57115045f09274b80a7b272e1042f2beac8507bfa87e318e89c909f0cc2f44ab424d8edb0e0e2d4d42f016e707c808c

    • C:\Windows\System32\serwvdrv\lsm.exe

      Filesize

      1.3MB

      MD5

      bbcb2719208a4b82dce603101e18c7d9

      SHA1

      dc778b4cc86f331381cbbccf6c823a2c31225288

      SHA256

      1901ac563dc9ca30665837cb510c5e05b757e0017ac8e6dd038f1b8b87a69e30

      SHA512

      adec71d8daf3ae8bb241840808fb274bb997f8554b47057270c0cf06cc4696a6e1a55ebd977c7e67f8b66d08b36aed430498e6f209b7b543cf76d38c2c040a90

    • C:\Windows\System32\serwvdrv\lsm.exe

      Filesize

      1.3MB

      MD5

      bbcb2719208a4b82dce603101e18c7d9

      SHA1

      dc778b4cc86f331381cbbccf6c823a2c31225288

      SHA256

      1901ac563dc9ca30665837cb510c5e05b757e0017ac8e6dd038f1b8b87a69e30

      SHA512

      adec71d8daf3ae8bb241840808fb274bb997f8554b47057270c0cf06cc4696a6e1a55ebd977c7e67f8b66d08b36aed430498e6f209b7b543cf76d38c2c040a90

    • memory/540-60-0x0000000000000000-mapping.dmp

    • memory/560-57-0x0000000000000000-mapping.dmp

    • memory/912-65-0x0000000000000000-mapping.dmp

    • memory/988-62-0x0000000000000000-mapping.dmp

    • memory/1112-54-0x0000000001040000-0x0000000001192000-memory.dmp

      Filesize

      1.3MB

    • memory/1260-55-0x0000000000000000-mapping.dmp

    • memory/1308-58-0x0000000000000000-mapping.dmp

    • memory/1384-59-0x0000000000000000-mapping.dmp

    • memory/1568-61-0x0000000000000000-mapping.dmp

    • memory/1740-56-0x0000000000000000-mapping.dmp

    • memory/1832-63-0x0000000000000000-mapping.dmp

    • memory/1856-66-0x0000000000000000-mapping.dmp

    • memory/1932-67-0x0000000000000000-mapping.dmp

    • memory/1932-70-0x0000000000B10000-0x0000000000C62000-memory.dmp

      Filesize

      1.3MB