Analysis
-
max time kernel
118s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2023 09:58
Behavioral task
behavioral1
Sample
bbd5709ac40896d243f619941d4789c3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bbd5709ac40896d243f619941d4789c3.exe
Resource
win10v2004-20221111-en
General
-
Target
bbd5709ac40896d243f619941d4789c3.exe
-
Size
1.4MB
-
MD5
bbd5709ac40896d243f619941d4789c3
-
SHA1
d6e45ca38ffcb71b1df4fdd51c628ffdc58ab7b0
-
SHA256
d2ac899a907641ad38d3d535723be9fd3f581590bb461c93f30d1d2dc5706087
-
SHA512
61d76a75f6143acf0e15b6b6f2b9d810e71b96a32c25f3083476b1cf23bc4d0a04c609115b7def17a91872134f17aa068a484d97306eb2fdd046d97df297eb92
-
SSDEEP
24576:sWcUeg8DqSBzKMC5n9yjh7VU6KSQBVh5iIq0YLCTayC7NR:PNepqeGMCG9nKLPhIIqjGWyC5
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3300 1280 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3852 1280 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4732 1280 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4320 1280 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4560 1280 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3880 1280 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4276 1280 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3404 1280 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1540 1280 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1588 1280 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 1280 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2272 1280 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1236 1280 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1648 1280 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2364 1280 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 456 1280 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 644 1280 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4332 1280 schtasks.exe -
Processes:
resource yara_rule behavioral2/memory/4160-132-0x00000000009D0000-0x0000000000B32000-memory.dmp dcrat C:\odt\Idle.exe dcrat C:\odt\Idle.exe dcrat -
Executes dropped EXE 1 IoCs
Processes:
Idle.exepid process 3472 Idle.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bbd5709ac40896d243f619941d4789c3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation bbd5709ac40896d243f619941d4789c3.exe -
Drops file in Program Files directory 4 IoCs
Processes:
bbd5709ac40896d243f619941d4789c3.exedescription ioc process File created C:\Program Files\Windows Multimedia Platform\sihost.exe bbd5709ac40896d243f619941d4789c3.exe File created C:\Program Files\Windows Multimedia Platform\66fc9ff0ee96c2 bbd5709ac40896d243f619941d4789c3.exe File created C:\Program Files\Windows Photo Viewer\System.exe bbd5709ac40896d243f619941d4789c3.exe File created C:\Program Files\Windows Photo Viewer\27d1bcfc3c54e0 bbd5709ac40896d243f619941d4789c3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4320 schtasks.exe 3880 schtasks.exe 2364 schtasks.exe 1588 schtasks.exe 2300 schtasks.exe 1648 schtasks.exe 644 schtasks.exe 4332 schtasks.exe 3300 schtasks.exe 3852 schtasks.exe 4560 schtasks.exe 1236 schtasks.exe 4276 schtasks.exe 3404 schtasks.exe 2272 schtasks.exe 4732 schtasks.exe 1540 schtasks.exe 456 schtasks.exe -
Modifies registry class 1 IoCs
Processes:
bbd5709ac40896d243f619941d4789c3.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings bbd5709ac40896d243f619941d4789c3.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
bbd5709ac40896d243f619941d4789c3.exeIdle.exepid process 4160 bbd5709ac40896d243f619941d4789c3.exe 4160 bbd5709ac40896d243f619941d4789c3.exe 4160 bbd5709ac40896d243f619941d4789c3.exe 3472 Idle.exe 3472 Idle.exe 3472 Idle.exe 3472 Idle.exe 3472 Idle.exe 3472 Idle.exe 3472 Idle.exe 3472 Idle.exe 3472 Idle.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Idle.exepid process 3472 Idle.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bbd5709ac40896d243f619941d4789c3.exeIdle.exedescription pid process Token: SeDebugPrivilege 4160 bbd5709ac40896d243f619941d4789c3.exe Token: SeDebugPrivilege 3472 Idle.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
bbd5709ac40896d243f619941d4789c3.execmd.exedescription pid process target process PID 4160 wrote to memory of 728 4160 bbd5709ac40896d243f619941d4789c3.exe cmd.exe PID 4160 wrote to memory of 728 4160 bbd5709ac40896d243f619941d4789c3.exe cmd.exe PID 728 wrote to memory of 3868 728 cmd.exe w32tm.exe PID 728 wrote to memory of 3868 728 cmd.exe w32tm.exe PID 728 wrote to memory of 3472 728 cmd.exe Idle.exe PID 728 wrote to memory of 3472 728 cmd.exe Idle.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbd5709ac40896d243f619941d4789c3.exe"C:\Users\Admin\AppData\Local\Temp\bbd5709ac40896d243f619941d4789c3.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0ePW2wqFIk.bat"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
-
C:\odt\Idle.exe"C:\odt\Idle.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\odt\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\odt\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\odt\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\odt\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\odt\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\odt\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Photo Viewer\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Photo Viewer\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Multimedia Platform\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Multimedia Platform\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\odt\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\odt\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\odt\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0ePW2wqFIk.batFilesize
180B
MD5aa44cb92ca12a42e477e9d3b614c1edd
SHA102368b64c51bba7a53cc3327da3ed7b9ccc80ad4
SHA256671f6517e587e4622cefacd4a4a519b83bdbcabd2eb0d49cee32e274af89d4e4
SHA51276e8efdbc1a11c9c41095b77c57a4dcdafc546d5866f644aa8b66f1392d463afaea5e9c4a95184b8fba3ad96f95e24b7119121ad3eca4eec41157a9dd345a0c3
-
C:\odt\Idle.exeFilesize
1.4MB
MD5bbd5709ac40896d243f619941d4789c3
SHA1d6e45ca38ffcb71b1df4fdd51c628ffdc58ab7b0
SHA256d2ac899a907641ad38d3d535723be9fd3f581590bb461c93f30d1d2dc5706087
SHA51261d76a75f6143acf0e15b6b6f2b9d810e71b96a32c25f3083476b1cf23bc4d0a04c609115b7def17a91872134f17aa068a484d97306eb2fdd046d97df297eb92
-
C:\odt\Idle.exeFilesize
1.4MB
MD5bbd5709ac40896d243f619941d4789c3
SHA1d6e45ca38ffcb71b1df4fdd51c628ffdc58ab7b0
SHA256d2ac899a907641ad38d3d535723be9fd3f581590bb461c93f30d1d2dc5706087
SHA51261d76a75f6143acf0e15b6b6f2b9d810e71b96a32c25f3083476b1cf23bc4d0a04c609115b7def17a91872134f17aa068a484d97306eb2fdd046d97df297eb92
-
memory/728-136-0x0000000000000000-mapping.dmp
-
memory/3472-144-0x00007FFA22CD0000-0x00007FFA23791000-memory.dmpFilesize
10.8MB
-
memory/3472-143-0x00007FFA22CD0000-0x00007FFA23791000-memory.dmpFilesize
10.8MB
-
memory/3472-140-0x0000000000000000-mapping.dmp
-
memory/3868-138-0x0000000000000000-mapping.dmp
-
memory/4160-139-0x00007FFA23010000-0x00007FFA23AD1000-memory.dmpFilesize
10.8MB
-
memory/4160-132-0x00000000009D0000-0x0000000000B32000-memory.dmpFilesize
1.4MB
-
memory/4160-135-0x000000001CFA0000-0x000000001D4C8000-memory.dmpFilesize
5.2MB
-
memory/4160-134-0x000000001C8F0000-0x000000001C940000-memory.dmpFilesize
320KB
-
memory/4160-133-0x00007FFA23010000-0x00007FFA23AD1000-memory.dmpFilesize
10.8MB