Analysis
-
max time kernel
112s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 21:26
Behavioral task
behavioral1
Sample
40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe
Resource
win10v2004-20220901-en
General
-
Target
40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe
-
Size
356KB
-
MD5
922a77e55160186e8d3558c88f45f0fd
-
SHA1
97981a4019c4c0f8aae6ddc20aeae64bf1927718
-
SHA256
40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c
-
SHA512
04aeb1f8d8ba0f6cd0b905a981988b3005cc69da7ec659465c4972df5b2916e963529444d9819ee26a47c6f18db428e44c1972c9ad22b6747871f7c9ecc9fd38
-
SSDEEP
6144:/Csr2b54tGixuPmxbHTcv0C3bqqDLpiWb7BNy2AlVbg:/9tGixvYiqnpd/u
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Processes:
resource yara_rule behavioral2/memory/5080-132-0x000001FA1BD50000-0x000001FA1BDB0000-memory.dmp dcrat C:\Users\Public\Desktop\RuntimeBroker.exe dcrat C:\ProgramData\Desktop\RuntimeBroker.exe dcrat -
Executes dropped EXE 1 IoCs
Processes:
RuntimeBroker.exepid process 4796 RuntimeBroker.exe -
Drops file in Program Files directory 3 IoCs
Processes:
40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exedescription ioc process File created C:\Program Files\Windows Photo Viewer\en-US\RuntimeBroker.exe 40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\RuntimeBroker.exe 40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe File created C:\Program Files\Windows Photo Viewer\en-US\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d 40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 3984 schtasks.exe 1188 schtasks.exe 3056 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exeRuntimeBroker.exepid process 5080 40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe 4796 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exeRuntimeBroker.exedescription pid process Token: SeDebugPrivilege 5080 40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe Token: SeDebugPrivilege 4796 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exedescription pid process target process PID 5080 wrote to memory of 3984 5080 40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe schtasks.exe PID 5080 wrote to memory of 3984 5080 40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe schtasks.exe PID 5080 wrote to memory of 1188 5080 40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe schtasks.exe PID 5080 wrote to memory of 1188 5080 40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe schtasks.exe PID 5080 wrote to memory of 3056 5080 40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe schtasks.exe PID 5080 wrote to memory of 3056 5080 40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe schtasks.exe PID 5080 wrote to memory of 4796 5080 40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe RuntimeBroker.exe PID 5080 wrote to memory of 4796 5080 40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe RuntimeBroker.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe"C:\Users\Admin\AppData\Local\Temp\40a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\en-US\RuntimeBroker.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3984 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:1188 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\ProgramData\Desktop\RuntimeBroker.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3056 -
C:\ProgramData\Desktop\RuntimeBroker.exe"C:\ProgramData\Desktop\RuntimeBroker.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356KB
MD5922a77e55160186e8d3558c88f45f0fd
SHA197981a4019c4c0f8aae6ddc20aeae64bf1927718
SHA25640a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c
SHA51204aeb1f8d8ba0f6cd0b905a981988b3005cc69da7ec659465c4972df5b2916e963529444d9819ee26a47c6f18db428e44c1972c9ad22b6747871f7c9ecc9fd38
-
Filesize
356KB
MD5922a77e55160186e8d3558c88f45f0fd
SHA197981a4019c4c0f8aae6ddc20aeae64bf1927718
SHA25640a1f82ba46ac86ff0b663d8b0d48e2fe6a55cb8e29b0baecab526279c1fcc5c
SHA51204aeb1f8d8ba0f6cd0b905a981988b3005cc69da7ec659465c4972df5b2916e963529444d9819ee26a47c6f18db428e44c1972c9ad22b6747871f7c9ecc9fd38