Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 20:24
Behavioral task
behavioral1
Sample
51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe
Resource
win10v2004-20220812-en
General
-
Target
51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe
-
Size
413KB
-
MD5
d42e209f293b2f4551ca20bbfaf685bf
-
SHA1
5e77d2a5933e32b57ef96464e94d4a2b692f6421
-
SHA256
51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2
-
SHA512
62580c3a1524d46c907b6c040d20bb67dbf375bc5c9fb0452bdadb30f21e42b9c1e40f0176ebd6eb437f2f7f47825398febaa147f0cb4459c2b19dbd011d0787
-
SSDEEP
12288:XQndjOJNp/0+fS4qVleduxRTP42SgJ3H+DEqn:AndjOJbjS4qVleduxRTP42SgBb+
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Processes:
resource yara_rule behavioral2/memory/2268-132-0x0000020171EE0000-0x0000020171F4E000-memory.dmp dcrat C:\ProgramData\Microsoft\MF\WmiPrvSE.exe dcrat C:\ProgramData\Microsoft\MF\WmiPrvSE.exe dcrat -
Executes dropped EXE 1 IoCs
Processes:
WmiPrvSE.exepid process 4436 WmiPrvSE.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files\\Mozilla Firefox\\gmp-clearkey\\0.1\\fontdrvhost.exe\"" 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\Documents and Settings\\upfc.exe\"" 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Documents and Settings\\System.exe\"" 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Windows Photo Viewer\\en-US\\csrss.exe\"" 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\ProgramData\\Microsoft\\MF\\WmiPrvSE.exe\"" 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Recovery\\WindowsRE\\SppExtComObj.exe\"" 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe -
Drops file in Program Files directory 4 IoCs
Processes:
51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exedescription ioc process File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\fontdrvhost.exe 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\5b884080fd4f94e2695da25c503f9e33b9605b83 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe File created C:\Program Files\Windows Photo Viewer\en-US\csrss.exe 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe File created C:\Program Files\Windows Photo Viewer\en-US\886983d96e3d3e31032c679b2d4ea91b6c05afef 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3732 schtasks.exe 4792 schtasks.exe 4236 schtasks.exe 4788 schtasks.exe 1500 schtasks.exe 1344 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exeWmiPrvSE.exepid process 2268 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe 4436 WmiPrvSE.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exeWmiPrvSE.exedescription pid process Token: SeDebugPrivilege 2268 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe Token: SeDebugPrivilege 4436 WmiPrvSE.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exedescription pid process target process PID 2268 wrote to memory of 3732 2268 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe schtasks.exe PID 2268 wrote to memory of 3732 2268 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe schtasks.exe PID 2268 wrote to memory of 4792 2268 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe schtasks.exe PID 2268 wrote to memory of 4792 2268 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe schtasks.exe PID 2268 wrote to memory of 4236 2268 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe schtasks.exe PID 2268 wrote to memory of 4236 2268 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe schtasks.exe PID 2268 wrote to memory of 4788 2268 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe schtasks.exe PID 2268 wrote to memory of 4788 2268 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe schtasks.exe PID 2268 wrote to memory of 1500 2268 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe schtasks.exe PID 2268 wrote to memory of 1500 2268 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe schtasks.exe PID 2268 wrote to memory of 1344 2268 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe schtasks.exe PID 2268 wrote to memory of 1344 2268 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe schtasks.exe PID 2268 wrote to memory of 4436 2268 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe WmiPrvSE.exe PID 2268 wrote to memory of 4436 2268 51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe WmiPrvSE.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe"C:\Users\Admin\AppData\Local\Temp\51757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\fontdrvhost.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "upfc" /sc ONLOGON /tr "'C:\Documents and Settings\upfc.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "'C:\Documents and Settings\System.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\en-US\csrss.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\ProgramData\Microsoft\MF\WmiPrvSE.exe'" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\ProgramData\Microsoft\MF\WmiPrvSE.exe"C:\ProgramData\Microsoft\MF\WmiPrvSE.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\MF\WmiPrvSE.exeFilesize
413KB
MD5d42e209f293b2f4551ca20bbfaf685bf
SHA15e77d2a5933e32b57ef96464e94d4a2b692f6421
SHA25651757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2
SHA51262580c3a1524d46c907b6c040d20bb67dbf375bc5c9fb0452bdadb30f21e42b9c1e40f0176ebd6eb437f2f7f47825398febaa147f0cb4459c2b19dbd011d0787
-
C:\ProgramData\Microsoft\MF\WmiPrvSE.exeFilesize
413KB
MD5d42e209f293b2f4551ca20bbfaf685bf
SHA15e77d2a5933e32b57ef96464e94d4a2b692f6421
SHA25651757c2b6e29dce91c13dc76c9a75fba921144d80adc56e3fb36e3491ad461d2
SHA51262580c3a1524d46c907b6c040d20bb67dbf375bc5c9fb0452bdadb30f21e42b9c1e40f0176ebd6eb437f2f7f47825398febaa147f0cb4459c2b19dbd011d0787
-
memory/1344-139-0x0000000000000000-mapping.dmp
-
memory/1500-138-0x0000000000000000-mapping.dmp
-
memory/2268-132-0x0000020171EE0000-0x0000020171F4E000-memory.dmpFilesize
440KB
-
memory/2268-133-0x00007FFCC3CB0000-0x00007FFCC4771000-memory.dmpFilesize
10.8MB
-
memory/2268-143-0x00007FFCC3CB0000-0x00007FFCC4771000-memory.dmpFilesize
10.8MB
-
memory/3732-134-0x0000000000000000-mapping.dmp
-
memory/4236-136-0x0000000000000000-mapping.dmp
-
memory/4436-140-0x0000000000000000-mapping.dmp
-
memory/4436-144-0x00007FFCC3CB0000-0x00007FFCC4771000-memory.dmpFilesize
10.8MB
-
memory/4436-145-0x00007FFCC3CB0000-0x00007FFCC4771000-memory.dmpFilesize
10.8MB
-
memory/4436-146-0x00007FFCC3CB0000-0x00007FFCC4771000-memory.dmpFilesize
10.8MB
-
memory/4788-137-0x0000000000000000-mapping.dmp
-
memory/4792-135-0x0000000000000000-mapping.dmp