Analysis
-
max time kernel
125s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2023 09:56
Behavioral task
behavioral1
Sample
bbd5709ac40896d243f619941d4789c3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bbd5709ac40896d243f619941d4789c3.exe
Resource
win10v2004-20221111-en
General
-
Target
bbd5709ac40896d243f619941d4789c3.exe
-
Size
1.4MB
-
MD5
bbd5709ac40896d243f619941d4789c3
-
SHA1
d6e45ca38ffcb71b1df4fdd51c628ffdc58ab7b0
-
SHA256
d2ac899a907641ad38d3d535723be9fd3f581590bb461c93f30d1d2dc5706087
-
SHA512
61d76a75f6143acf0e15b6b6f2b9d810e71b96a32c25f3083476b1cf23bc4d0a04c609115b7def17a91872134f17aa068a484d97306eb2fdd046d97df297eb92
-
SSDEEP
24576:sWcUeg8DqSBzKMC5n9yjh7VU6KSQBVh5iIq0YLCTayC7NR:PNepqeGMCG9nKLPhIIqjGWyC5
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 21 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2088 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4668 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4240 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4236 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1448 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2056 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1276 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3952 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3256 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2228 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4332 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4428 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5044 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3540 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1648 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 32 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2588 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 116 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4308 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4312 4324 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2880 4324 schtasks.exe -
Processes:
resource yara_rule behavioral2/memory/2348-132-0x00000000001B0000-0x0000000000312000-memory.dmp dcrat C:\ProgramData\Microsoft\Windows\Templates\dwm.exe dcrat C:\Users\All Users\Templates\dwm.exe dcrat -
Executes dropped EXE 1 IoCs
Processes:
dwm.exepid process 428 dwm.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bbd5709ac40896d243f619941d4789c3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation bbd5709ac40896d243f619941d4789c3.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Drops file in Program Files directory 5 IoCs
Processes:
bbd5709ac40896d243f619941d4789c3.exedescription ioc process File created C:\Program Files\Windows Security\System.exe bbd5709ac40896d243f619941d4789c3.exe File created C:\Program Files\Windows Security\27d1bcfc3c54e0 bbd5709ac40896d243f619941d4789c3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Idle.exe bbd5709ac40896d243f619941d4789c3.exe File created C:\Program Files (x86)\Windows Multimedia Platform\backgroundTaskHost.exe bbd5709ac40896d243f619941d4789c3.exe File created C:\Program Files (x86)\Windows Multimedia Platform\eddb19405b7ce1 bbd5709ac40896d243f619941d4789c3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 21 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3540 schtasks.exe 1648 schtasks.exe 4668 schtasks.exe 4236 schtasks.exe 2056 schtasks.exe 5044 schtasks.exe 4428 schtasks.exe 4312 schtasks.exe 2880 schtasks.exe 2588 schtasks.exe 116 schtasks.exe 4240 schtasks.exe 1276 schtasks.exe 3952 schtasks.exe 2228 schtasks.exe 32 schtasks.exe 4308 schtasks.exe 2088 schtasks.exe 1448 schtasks.exe 3256 schtasks.exe 4332 schtasks.exe -
Modifies registry class 1 IoCs
Processes:
bbd5709ac40896d243f619941d4789c3.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings bbd5709ac40896d243f619941d4789c3.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
bbd5709ac40896d243f619941d4789c3.exedwm.exepid process 2348 bbd5709ac40896d243f619941d4789c3.exe 2348 bbd5709ac40896d243f619941d4789c3.exe 2348 bbd5709ac40896d243f619941d4789c3.exe 2348 bbd5709ac40896d243f619941d4789c3.exe 2348 bbd5709ac40896d243f619941d4789c3.exe 428 dwm.exe 428 dwm.exe 428 dwm.exe 428 dwm.exe 428 dwm.exe 428 dwm.exe 428 dwm.exe 428 dwm.exe 428 dwm.exe 428 dwm.exe 428 dwm.exe 428 dwm.exe 428 dwm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
dwm.exepid process 428 dwm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bbd5709ac40896d243f619941d4789c3.exedwm.exedescription pid process Token: SeDebugPrivilege 2348 bbd5709ac40896d243f619941d4789c3.exe Token: SeDebugPrivilege 428 dwm.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
bbd5709ac40896d243f619941d4789c3.execmd.exedescription pid process target process PID 2348 wrote to memory of 1904 2348 bbd5709ac40896d243f619941d4789c3.exe cmd.exe PID 2348 wrote to memory of 1904 2348 bbd5709ac40896d243f619941d4789c3.exe cmd.exe PID 1904 wrote to memory of 3940 1904 cmd.exe w32tm.exe PID 1904 wrote to memory of 3940 1904 cmd.exe w32tm.exe PID 1904 wrote to memory of 428 1904 cmd.exe dwm.exe PID 1904 wrote to memory of 428 1904 cmd.exe dwm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbd5709ac40896d243f619941d4789c3.exe"C:\Users\Admin\AppData\Local\Temp\bbd5709ac40896d243f619941d4789c3.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TWPzVZgPhl.bat"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
-
C:\Users\All Users\Templates\dwm.exe"C:\Users\All Users\Templates\dwm.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Security\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows Security\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Security\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\All Users\Templates\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Templates\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Templates\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\Templates\dwm.exeFilesize
1.4MB
MD5bbd5709ac40896d243f619941d4789c3
SHA1d6e45ca38ffcb71b1df4fdd51c628ffdc58ab7b0
SHA256d2ac899a907641ad38d3d535723be9fd3f581590bb461c93f30d1d2dc5706087
SHA51261d76a75f6143acf0e15b6b6f2b9d810e71b96a32c25f3083476b1cf23bc4d0a04c609115b7def17a91872134f17aa068a484d97306eb2fdd046d97df297eb92
-
C:\Users\Admin\AppData\Local\Temp\TWPzVZgPhl.batFilesize
201B
MD5bec3bc43ad081b5f7250f0806b35c7a8
SHA164ad95d15ec113e3e327adb5613ec4303bc10bb8
SHA25694395580380b1d1a7d9b7811c39241ed8a38673d25b94075d6eba0c14706e811
SHA5129284e8fdba15300fc3a7d4f254fa176f1b06a8506545dfe7098bcefaad2c88d8795e50332746a894fc48f5b2446446fc514e3026a106386a360dfcffc11c43bc
-
C:\Users\All Users\Templates\dwm.exeFilesize
1.4MB
MD5bbd5709ac40896d243f619941d4789c3
SHA1d6e45ca38ffcb71b1df4fdd51c628ffdc58ab7b0
SHA256d2ac899a907641ad38d3d535723be9fd3f581590bb461c93f30d1d2dc5706087
SHA51261d76a75f6143acf0e15b6b6f2b9d810e71b96a32c25f3083476b1cf23bc4d0a04c609115b7def17a91872134f17aa068a484d97306eb2fdd046d97df297eb92
-
memory/428-140-0x0000000000000000-mapping.dmp
-
memory/428-143-0x00007FF8B2070000-0x00007FF8B2B31000-memory.dmpFilesize
10.8MB
-
memory/428-144-0x00007FF8B2070000-0x00007FF8B2B31000-memory.dmpFilesize
10.8MB
-
memory/1904-136-0x0000000000000000-mapping.dmp
-
memory/2348-134-0x000000001C510000-0x000000001C560000-memory.dmpFilesize
320KB
-
memory/2348-135-0x000000001CC20000-0x000000001D148000-memory.dmpFilesize
5.2MB
-
memory/2348-132-0x00000000001B0000-0x0000000000312000-memory.dmpFilesize
1.4MB
-
memory/2348-139-0x00007FF8B3180000-0x00007FF8B3C41000-memory.dmpFilesize
10.8MB
-
memory/2348-133-0x00007FF8B3180000-0x00007FF8B3C41000-memory.dmpFilesize
10.8MB
-
memory/3940-138-0x0000000000000000-mapping.dmp