Analysis
-
max time kernel
44s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-01-2023 22:31
Behavioral task
behavioral1
Sample
b313d25c0fed1c6069e6a72e73a5751f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b313d25c0fed1c6069e6a72e73a5751f.exe
Resource
win10v2004-20220812-en
General
-
Target
b313d25c0fed1c6069e6a72e73a5751f.exe
-
Size
1.2MB
-
MD5
b313d25c0fed1c6069e6a72e73a5751f
-
SHA1
1717db41053d68f4b6cb0619eaee7d7617a6ebc9
-
SHA256
01e2946bab81b880ec494a1692a791ced92624246e6aed7a15c725851ede71dd
-
SHA512
6807bc163b386f0398a7195f83f7b0619d912724582780ace94d0cd115c2f192a90536f9950cf61c9f18d7df0da58ea9116a22544ff9f3a5489e6c2398d975d3
-
SSDEEP
24576:1oz7PdSo8OhfvG83PxEXY5TZ95f+bYy4HKTtadCK2yseqa+B:1odSo80/GXC9+bl4ewpEe+
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 21 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 680 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 468 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1000 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1008 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1776 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1796 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 316 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 928 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1432 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1832 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 744 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1424 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 968 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 868 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1960 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1288 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1732 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1232 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1644 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2020 1388 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1296 1388 schtasks.exe -
Processes:
resource yara_rule behavioral1/memory/1080-54-0x0000000001270000-0x00000000013A6000-memory.dmp dcrat C:\Users\Admin\Contacts\WmiPrvSE.exe dcrat C:\Users\Admin\Contacts\WmiPrvSE.exe dcrat behavioral1/memory/1524-61-0x0000000000C40000-0x0000000000D76000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
Processes:
WmiPrvSE.exepid process 1524 WmiPrvSE.exe -
Drops file in Program Files directory 2 IoCs
Processes:
b313d25c0fed1c6069e6a72e73a5751f.exedescription ioc process File created C:\Program Files (x86)\Windows Portable Devices\WMIADAP.exe b313d25c0fed1c6069e6a72e73a5751f.exe File created C:\Program Files (x86)\Windows Portable Devices\75a57c1bdf437c b313d25c0fed1c6069e6a72e73a5751f.exe -
Drops file in Windows directory 3 IoCs
Processes:
b313d25c0fed1c6069e6a72e73a5751f.exedescription ioc process File created C:\Windows\es-ES\csrss.exe b313d25c0fed1c6069e6a72e73a5751f.exe File opened for modification C:\Windows\es-ES\csrss.exe b313d25c0fed1c6069e6a72e73a5751f.exe File created C:\Windows\es-ES\886983d96e3d3e b313d25c0fed1c6069e6a72e73a5751f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 21 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 680 schtasks.exe 316 schtasks.exe 1832 schtasks.exe 868 schtasks.exe 1288 schtasks.exe 2020 schtasks.exe 1296 schtasks.exe 468 schtasks.exe 1796 schtasks.exe 1432 schtasks.exe 1960 schtasks.exe 1732 schtasks.exe 1232 schtasks.exe 1000 schtasks.exe 1008 schtasks.exe 1776 schtasks.exe 928 schtasks.exe 744 schtasks.exe 1424 schtasks.exe 968 schtasks.exe 1644 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
b313d25c0fed1c6069e6a72e73a5751f.exeWmiPrvSE.exepid process 1080 b313d25c0fed1c6069e6a72e73a5751f.exe 1524 WmiPrvSE.exe 1524 WmiPrvSE.exe 1524 WmiPrvSE.exe 1524 WmiPrvSE.exe 1524 WmiPrvSE.exe 1524 WmiPrvSE.exe 1524 WmiPrvSE.exe 1524 WmiPrvSE.exe 1524 WmiPrvSE.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b313d25c0fed1c6069e6a72e73a5751f.exeWmiPrvSE.exedescription pid process Token: SeDebugPrivilege 1080 b313d25c0fed1c6069e6a72e73a5751f.exe Token: SeDebugPrivilege 1524 WmiPrvSE.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
b313d25c0fed1c6069e6a72e73a5751f.exedescription pid process target process PID 1080 wrote to memory of 1524 1080 b313d25c0fed1c6069e6a72e73a5751f.exe WmiPrvSE.exe PID 1080 wrote to memory of 1524 1080 b313d25c0fed1c6069e6a72e73a5751f.exe WmiPrvSE.exe PID 1080 wrote to memory of 1524 1080 b313d25c0fed1c6069e6a72e73a5751f.exe WmiPrvSE.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b313d25c0fed1c6069e6a72e73a5751f.exe"C:\Users\Admin\AppData\Local\Temp\b313d25c0fed1c6069e6a72e73a5751f.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Contacts\WmiPrvSE.exe"C:\Users\Admin\Contacts\WmiPrvSE.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Windows\es-ES\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\es-ES\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Windows\es-ES\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Admin\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\SendTo\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Admin\SendTo\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\SendTo\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Portable Devices\WMIADAP.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Portable Devices\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Recovery\ed738222-6219-11ed-b5ae-5e34c4ab0fa3\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\ed738222-6219-11ed-b5ae-5e34c4ab0fa3\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Recovery\ed738222-6219-11ed-b5ae-5e34c4ab0fa3\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Contacts\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Admin\Contacts\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Contacts\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Contacts\WmiPrvSE.exeFilesize
1.2MB
MD5b313d25c0fed1c6069e6a72e73a5751f
SHA11717db41053d68f4b6cb0619eaee7d7617a6ebc9
SHA25601e2946bab81b880ec494a1692a791ced92624246e6aed7a15c725851ede71dd
SHA5126807bc163b386f0398a7195f83f7b0619d912724582780ace94d0cd115c2f192a90536f9950cf61c9f18d7df0da58ea9116a22544ff9f3a5489e6c2398d975d3
-
C:\Users\Admin\Contacts\WmiPrvSE.exeFilesize
1.2MB
MD5b313d25c0fed1c6069e6a72e73a5751f
SHA11717db41053d68f4b6cb0619eaee7d7617a6ebc9
SHA25601e2946bab81b880ec494a1692a791ced92624246e6aed7a15c725851ede71dd
SHA5126807bc163b386f0398a7195f83f7b0619d912724582780ace94d0cd115c2f192a90536f9950cf61c9f18d7df0da58ea9116a22544ff9f3a5489e6c2398d975d3
-
memory/1080-54-0x0000000001270000-0x00000000013A6000-memory.dmpFilesize
1.2MB
-
memory/1080-55-0x00000000003D0000-0x00000000003EC000-memory.dmpFilesize
112KB
-
memory/1080-56-0x0000000000B50000-0x0000000000B66000-memory.dmpFilesize
88KB
-
memory/1080-57-0x00000000003F0000-0x00000000003FE000-memory.dmpFilesize
56KB
-
memory/1524-58-0x0000000000000000-mapping.dmp
-
memory/1524-61-0x0000000000C40000-0x0000000000D76000-memory.dmpFilesize
1.2MB