Analysis
-
max time kernel
160s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 22:00
Static task
static1
Behavioral task
behavioral1
Sample
2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe
Resource
win10v2004-20220812-en
General
-
Target
2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe
-
Size
757KB
-
MD5
892d94eeae3c0501181abe6f5c07fd11
-
SHA1
3c4555d758ae1e695436404a5b0b5347447afc96
-
SHA256
2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb
-
SHA512
a1c4bcfe4e5118348531ae6c18fdfc3ec3066b193b21c683130b2ea24dc5f9e8bc7212300836af353560eeffbe0a14847e851615d71e0055dced9e455cea359a
-
SSDEEP
12288:keZM0+7o7YNQxF4WioPJicryGBWECTmvJ52liBXIA5yCJnSr3/35ellbLdV2BQjM:kedfwQ66icoECk52liBXIAMCJnQ3v0lo
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Processes:
resource yara_rule behavioral2/memory/4604-133-0x0000000000340000-0x0000000000748000-memory.dmp dcrat behavioral2/memory/4604-134-0x0000000000340000-0x0000000000748000-memory.dmp dcrat behavioral2/memory/3364-151-0x00000000005A0000-0x00000000009A8000-memory.dmp dcrat behavioral2/memory/4604-152-0x0000000000340000-0x0000000000748000-memory.dmp dcrat behavioral2/memory/3364-153-0x00000000005A0000-0x00000000009A8000-memory.dmp dcrat behavioral2/memory/3364-155-0x00000000005A0000-0x00000000009A8000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 3364 svchost.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\PerfLogs\\svchost.exe\"" 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Program Files (x86)\\Windows Defender\\svchost.exe\"" 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Program Files (x86)\\Windows Sidebar\\Shared Gadgets\\svchost.exe\"" 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\ja\\svchost.exe\"" 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Documents and Settings\\svchost.exe\"" 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exesvchost.exepid process 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe 3364 svchost.exe 3364 svchost.exe 3364 svchost.exe -
Drops file in Program Files directory 7 IoCs
Processes:
2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exedescription ioc process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\svchost.exe 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe File created C:\Program Files (x86)\Windows Defender\svchost.exe 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe File created C:\Program Files (x86)\Windows Defender\f4d236fdec2fd03914189c3b26e5cb0dfea9d761 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\svchost.exe 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\f4d236fdec2fd03914189c3b26e5cb0dfea9d761 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\svchost.exe 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\f4d236fdec2fd03914189c3b26e5cb0dfea9d761 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 448 3364 WerFault.exe svchost.exe -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2296 schtasks.exe 100 schtasks.exe 2588 schtasks.exe 4228 schtasks.exe 4260 schtasks.exe 1612 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exesvchost.exepid process 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe 3364 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exesvchost.exedescription pid process Token: SeDebugPrivilege 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe Token: SeDebugPrivilege 3364 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exesvchost.exepid process 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe 3364 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exedescription pid process target process PID 4604 wrote to memory of 4260 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 4260 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 4260 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 1612 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 1612 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 1612 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 2296 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 2296 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 2296 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 100 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 100 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 100 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 2588 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 2588 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 2588 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 4228 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 4228 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 4228 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe schtasks.exe PID 4604 wrote to memory of 3364 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe svchost.exe PID 4604 wrote to memory of 3364 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe svchost.exe PID 4604 wrote to memory of 3364 4604 2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe"C:\Users\Admin\AppData\Local\Temp\2ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "'C:\PerfLogs\svchost.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\svchost.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "'C:\PerfLogs\svchost.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\svchost.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\svchost.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "'C:\Documents and Settings\svchost.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Documents and Settings\svchost.exe"C:\Documents and Settings\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 20883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 3364 -ip 33641⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Documents and Settings\svchost.exeFilesize
757KB
MD5892d94eeae3c0501181abe6f5c07fd11
SHA13c4555d758ae1e695436404a5b0b5347447afc96
SHA2562ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb
SHA512a1c4bcfe4e5118348531ae6c18fdfc3ec3066b193b21c683130b2ea24dc5f9e8bc7212300836af353560eeffbe0a14847e851615d71e0055dced9e455cea359a
-
C:\Users\svchost.exeFilesize
757KB
MD5892d94eeae3c0501181abe6f5c07fd11
SHA13c4555d758ae1e695436404a5b0b5347447afc96
SHA2562ffa712d8f0bd9a4441047edce9e9f28d88ff15d26513b0cdf1925f6df461ecb
SHA512a1c4bcfe4e5118348531ae6c18fdfc3ec3066b193b21c683130b2ea24dc5f9e8bc7212300836af353560eeffbe0a14847e851615d71e0055dced9e455cea359a
-
\??\c:\users\admin\appdata\local\temp\80EB2F5CFilesize
14B
MD50f23365183a767a0103be4db061899f2
SHA1cf2bfd48c1e347ebf4d5a08f836cbb9bf1731c87
SHA256f1a9b003ae175bc74e3abf0acb66aad36b2393545f7aa7818b13fa723f0abeb0
SHA51215546c07d91bf7be33f00efdabd97bdec177f968e66b9c1f8b7c39d6c856fdca74d5867a038ebe30870339e210ea8341b13f6cec1e0d62cc3e2997fa92a74d3e
-
memory/100-143-0x0000000000000000-mapping.dmp
-
memory/1612-141-0x0000000000000000-mapping.dmp
-
memory/2296-142-0x0000000000000000-mapping.dmp
-
memory/2588-144-0x0000000000000000-mapping.dmp
-
memory/3364-151-0x00000000005A0000-0x00000000009A8000-memory.dmpFilesize
4.0MB
-
memory/3364-146-0x0000000000000000-mapping.dmp
-
memory/3364-155-0x00000000005A0000-0x00000000009A8000-memory.dmpFilesize
4.0MB
-
memory/3364-148-0x00000000005A0000-0x00000000009A8000-memory.dmpFilesize
4.0MB
-
memory/3364-154-0x00000000005A0000-0x00000000009A8000-memory.dmpFilesize
4.0MB
-
memory/3364-153-0x00000000005A0000-0x00000000009A8000-memory.dmpFilesize
4.0MB
-
memory/4228-145-0x0000000000000000-mapping.dmp
-
memory/4260-140-0x0000000000000000-mapping.dmp
-
memory/4604-136-0x0000000000340000-0x0000000000748000-memory.dmpFilesize
4.0MB
-
memory/4604-138-0x0000000006B00000-0x0000000006B92000-memory.dmpFilesize
584KB
-
memory/4604-135-0x00000000063B0000-0x0000000006954000-memory.dmpFilesize
5.6MB
-
memory/4604-133-0x0000000000340000-0x0000000000748000-memory.dmpFilesize
4.0MB
-
memory/4604-139-0x0000000006BA0000-0x0000000006C3C000-memory.dmpFilesize
624KB
-
memory/4604-152-0x0000000000340000-0x0000000000748000-memory.dmpFilesize
4.0MB
-
memory/4604-134-0x0000000000340000-0x0000000000748000-memory.dmpFilesize
4.0MB
-
memory/4604-132-0x0000000000340000-0x0000000000748000-memory.dmpFilesize
4.0MB
-
memory/4604-137-0x0000000003D20000-0x0000000003D86000-memory.dmpFilesize
408KB