Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2023 17:51

General

  • Target

    HEUR-Trojan-Spy.MSIL.Stealer.gen-9a15e76ca3d8.exe

  • Size

    1.4MB

  • MD5

    7472b67b4bb85e3aefc12555fec10f36

  • SHA1

    e7730285a02fe26e27ea752a84306c4229e8e623

  • SHA256

    9a15e76ca3d8fe65e5bb57588b186b6ba8602509c0b4c8d18955dfc73b7c2e36

  • SHA512

    07b9ace8dc62f85b66be782d4674ac08926a2e96f29c9cd6635063cba21c7ccdf49db94a1a7d100868473ee046e9fb03463ae818488f73feac764398297afd69

  • SSDEEP

    24576:U2G/nvxW3Ww0t5OX6SP7prgJDBT5HHcwsQMghdR/O483h4vAe+4R:UbA30CdeDBT5cbQhnbku

Malware Config

Signatures

  • DcRat 7 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 8 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in System32 directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Spy.MSIL.Stealer.gen-9a15e76ca3d8.exe
    "C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Spy.MSIL.Stealer.gen-9a15e76ca3d8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\intoRuntimeBrokerPerfsvc\Kse9GvoG6zztWApcqT09IoZvt.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:884
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\intoRuntimeBrokerPerfsvc\VWQpcgPADyKkuxJVEzL5.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1468
        • C:\intoRuntimeBrokerPerfsvc\intoRuntimeBrokerPerfsvcreviewHost.exe
          "C:\intoRuntimeBrokerPerfsvc\intoRuntimeBrokerPerfsvcreviewHost.exe"
          4⤵
          • DcRat
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1428
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vFnISYzBpQ.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1636
            • C:\Windows\system32\chcp.com
              chcp 65001
              6⤵
                PID:1020
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                6⤵
                  PID:568
                • C:\Windows\System32\msxml3r\wininit.exe
                  "C:\Windows\System32\msxml3r\wininit.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1036
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\msxml3r\wininit.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:584
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\sppnp\csrss.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:276
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\System32\dcomcnfg\services.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1548
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\System32\vmictimeprovider\conhost.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1552
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\winbio\lsass.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:592
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\System32\winbrand\conhost.exe'" /rl HIGHEST /f
        1⤵
        • DcRat
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:392

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\vFnISYzBpQ.bat

        Filesize

        255B

        MD5

        257d291bcf1210d862e2c03ee404acd8

        SHA1

        6bb601d92b80657719aa9000392c33403f835cbc

        SHA256

        d74598b69de568f8347597dd473c223cdc93728c77fdc14aad0357058f7a0ea1

        SHA512

        00c6ae69e7c6134930a2196735425b9e25d6cd1ca3c3a8e79e926ca7c2a1952f9d90db7adc917ac956d957cf45cbe055304bb1610dabba07d4c21a202c85d897

      • C:\Windows\System32\msxml3r\wininit.exe

        Filesize

        1.1MB

        MD5

        4d3227c49bb3db6940a04296e0c7ad1b

        SHA1

        21a152feb2ef0ffba34587b63a832bf47c696be5

        SHA256

        a7c4851eb45e364c5d00a0ac9604be177f5ce178525599f63995e3527ef4a93b

        SHA512

        1718378593be5159e53ff7ba36b5fe4eb72869cc9a9a05b100eda0414bc416ef65fefdb5a454e7948fab486897de91f0e245cfaed0539aebd1c98e0ce988f058

      • C:\Windows\System32\msxml3r\wininit.exe

        Filesize

        1.1MB

        MD5

        4d3227c49bb3db6940a04296e0c7ad1b

        SHA1

        21a152feb2ef0ffba34587b63a832bf47c696be5

        SHA256

        a7c4851eb45e364c5d00a0ac9604be177f5ce178525599f63995e3527ef4a93b

        SHA512

        1718378593be5159e53ff7ba36b5fe4eb72869cc9a9a05b100eda0414bc416ef65fefdb5a454e7948fab486897de91f0e245cfaed0539aebd1c98e0ce988f058

      • C:\intoRuntimeBrokerPerfsvc\Kse9GvoG6zztWApcqT09IoZvt.vbe

        Filesize

        221B

        MD5

        ee7a0ca43d3e2f06f4ffb7a3b81dee6e

        SHA1

        5f455c15d61e0fcf7a8cf0b34e13a129eaf21983

        SHA256

        bf5c167ad7cc9e829947f95bcf822a50d6584b70c7df3a5d3a5efb0097969746

        SHA512

        790202d75fa39b94f73abed09df2b86b569ec51cf13d76e5ce25071a70f51646f6c993a53dc0c8537042d17f79744200f9a8bdcfd28bd075a4c452d23f3fbeed

      • C:\intoRuntimeBrokerPerfsvc\VWQpcgPADyKkuxJVEzL5.bat

        Filesize

        68B

        MD5

        e46f01b0317b956c45b23d23af2c653b

        SHA1

        6632672bddb08844eed580deef1e63e937b7e16e

        SHA256

        bbabc7715a4d359f192f2b43f65157151d74f29eaf6dd2fae8356e9f93d4e25a

        SHA512

        2be651ea68f605734820c38c62e58a5bc5c357483a33e0be3a13fac1261d0ebc7468c2ba887244721355e8dc4dae1c7879379612a5bbd98c7a377944d74ce0dc

      • C:\intoRuntimeBrokerPerfsvc\intoRuntimeBrokerPerfsvcreviewHost.exe

        Filesize

        1.1MB

        MD5

        4d3227c49bb3db6940a04296e0c7ad1b

        SHA1

        21a152feb2ef0ffba34587b63a832bf47c696be5

        SHA256

        a7c4851eb45e364c5d00a0ac9604be177f5ce178525599f63995e3527ef4a93b

        SHA512

        1718378593be5159e53ff7ba36b5fe4eb72869cc9a9a05b100eda0414bc416ef65fefdb5a454e7948fab486897de91f0e245cfaed0539aebd1c98e0ce988f058

      • C:\intoRuntimeBrokerPerfsvc\intoRuntimeBrokerPerfsvcreviewHost.exe

        Filesize

        1.1MB

        MD5

        4d3227c49bb3db6940a04296e0c7ad1b

        SHA1

        21a152feb2ef0ffba34587b63a832bf47c696be5

        SHA256

        a7c4851eb45e364c5d00a0ac9604be177f5ce178525599f63995e3527ef4a93b

        SHA512

        1718378593be5159e53ff7ba36b5fe4eb72869cc9a9a05b100eda0414bc416ef65fefdb5a454e7948fab486897de91f0e245cfaed0539aebd1c98e0ce988f058

      • \intoRuntimeBrokerPerfsvc\intoRuntimeBrokerPerfsvcreviewHost.exe

        Filesize

        1.1MB

        MD5

        4d3227c49bb3db6940a04296e0c7ad1b

        SHA1

        21a152feb2ef0ffba34587b63a832bf47c696be5

        SHA256

        a7c4851eb45e364c5d00a0ac9604be177f5ce178525599f63995e3527ef4a93b

        SHA512

        1718378593be5159e53ff7ba36b5fe4eb72869cc9a9a05b100eda0414bc416ef65fefdb5a454e7948fab486897de91f0e245cfaed0539aebd1c98e0ce988f058

      • \intoRuntimeBrokerPerfsvc\intoRuntimeBrokerPerfsvcreviewHost.exe

        Filesize

        1.1MB

        MD5

        4d3227c49bb3db6940a04296e0c7ad1b

        SHA1

        21a152feb2ef0ffba34587b63a832bf47c696be5

        SHA256

        a7c4851eb45e364c5d00a0ac9604be177f5ce178525599f63995e3527ef4a93b

        SHA512

        1718378593be5159e53ff7ba36b5fe4eb72869cc9a9a05b100eda0414bc416ef65fefdb5a454e7948fab486897de91f0e245cfaed0539aebd1c98e0ce988f058

      • memory/568-69-0x0000000000000000-mapping.dmp

      • memory/884-55-0x0000000000000000-mapping.dmp

      • memory/1020-68-0x0000000000000000-mapping.dmp

      • memory/1036-71-0x0000000000000000-mapping.dmp

      • memory/1036-73-0x0000000000350000-0x0000000000468000-memory.dmp

        Filesize

        1.1MB

      • memory/1428-63-0x0000000000000000-mapping.dmp

      • memory/1428-65-0x0000000001200000-0x0000000001318000-memory.dmp

        Filesize

        1.1MB

      • memory/1468-59-0x0000000000000000-mapping.dmp

      • memory/1636-66-0x0000000000000000-mapping.dmp

      • memory/2036-54-0x0000000075521000-0x0000000075523000-memory.dmp

        Filesize

        8KB