Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
03-02-2023 09:05
Behavioral task
behavioral1
Sample
afdfb3d54332e114744d28d9a672d2bf442cbf3cd60cebf8c68fe85af2b4dcfe.exe
Resource
win10-20220812-en
General
-
Target
afdfb3d54332e114744d28d9a672d2bf442cbf3cd60cebf8c68fe85af2b4dcfe.exe
-
Size
1.3MB
-
MD5
5e1aa027a3a7efea8211014cc28a9d8b
-
SHA1
462f75498619dc151b6a095c7d7d1d1068dc729e
-
SHA256
afdfb3d54332e114744d28d9a672d2bf442cbf3cd60cebf8c68fe85af2b4dcfe
-
SHA512
901f6706ac76005dee1b8e930592307157f504dc4bdb101bfa549238b6ba45df6ba43284604aff50525468eb543b677456b9ae440415e76b424db20e545856f1
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 9 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4236 3260 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4172 3260 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4176 3260 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3736 3260 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4000 3260 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4148 3260 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4124 3260 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4252 3260 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4196 3260 schtasks.exe 70 -
resource yara_rule behavioral1/files/0x000800000001abfd-284.dat dcrat behavioral1/files/0x000800000001abfd-285.dat dcrat behavioral1/memory/4728-286-0x0000000000E70000-0x0000000000F80000-memory.dmp dcrat behavioral1/files/0x000600000001ac07-307.dat dcrat behavioral1/files/0x000600000001ac07-308.dat dcrat -
Executes dropped EXE 2 IoCs
pid Process 4728 DllCommonsvc.exe 1796 winlogon.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\en-US\wininit.exe DllCommonsvc.exe File created C:\Windows\en-US\56085415360792 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4172 schtasks.exe 4176 schtasks.exe 4252 schtasks.exe 4236 schtasks.exe 3736 schtasks.exe 4000 schtasks.exe 4148 schtasks.exe 4124 schtasks.exe 4196 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings afdfb3d54332e114744d28d9a672d2bf442cbf3cd60cebf8c68fe85af2b4dcfe.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4728 DllCommonsvc.exe 4728 DllCommonsvc.exe 4728 DllCommonsvc.exe 4728 DllCommonsvc.exe 4728 DllCommonsvc.exe 3556 powershell.exe 3852 powershell.exe 3852 powershell.exe 3556 powershell.exe 4952 powershell.exe 4952 powershell.exe 4156 powershell.exe 1796 winlogon.exe 3852 powershell.exe 3556 powershell.exe 4156 powershell.exe 4952 powershell.exe 4156 powershell.exe 1796 winlogon.exe 1796 winlogon.exe 1796 winlogon.exe 1796 winlogon.exe 1796 winlogon.exe 1796 winlogon.exe 1796 winlogon.exe 1796 winlogon.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1796 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4728 DllCommonsvc.exe Token: SeDebugPrivilege 3556 powershell.exe Token: SeDebugPrivilege 3852 powershell.exe Token: SeDebugPrivilege 4156 powershell.exe Token: SeDebugPrivilege 4952 powershell.exe Token: SeDebugPrivilege 1796 winlogon.exe Token: SeIncreaseQuotaPrivilege 4952 powershell.exe Token: SeSecurityPrivilege 4952 powershell.exe Token: SeTakeOwnershipPrivilege 4952 powershell.exe Token: SeLoadDriverPrivilege 4952 powershell.exe Token: SeSystemProfilePrivilege 4952 powershell.exe Token: SeSystemtimePrivilege 4952 powershell.exe Token: SeProfSingleProcessPrivilege 4952 powershell.exe Token: SeIncBasePriorityPrivilege 4952 powershell.exe Token: SeCreatePagefilePrivilege 4952 powershell.exe Token: SeBackupPrivilege 4952 powershell.exe Token: SeRestorePrivilege 4952 powershell.exe Token: SeShutdownPrivilege 4952 powershell.exe Token: SeDebugPrivilege 4952 powershell.exe Token: SeSystemEnvironmentPrivilege 4952 powershell.exe Token: SeRemoteShutdownPrivilege 4952 powershell.exe Token: SeUndockPrivilege 4952 powershell.exe Token: SeManageVolumePrivilege 4952 powershell.exe Token: 33 4952 powershell.exe Token: 34 4952 powershell.exe Token: 35 4952 powershell.exe Token: 36 4952 powershell.exe Token: SeIncreaseQuotaPrivilege 3556 powershell.exe Token: SeSecurityPrivilege 3556 powershell.exe Token: SeTakeOwnershipPrivilege 3556 powershell.exe Token: SeLoadDriverPrivilege 3556 powershell.exe Token: SeSystemProfilePrivilege 3556 powershell.exe Token: SeSystemtimePrivilege 3556 powershell.exe Token: SeProfSingleProcessPrivilege 3556 powershell.exe Token: SeIncBasePriorityPrivilege 3556 powershell.exe Token: SeCreatePagefilePrivilege 3556 powershell.exe Token: SeBackupPrivilege 3556 powershell.exe Token: SeRestorePrivilege 3556 powershell.exe Token: SeShutdownPrivilege 3556 powershell.exe Token: SeDebugPrivilege 3556 powershell.exe Token: SeSystemEnvironmentPrivilege 3556 powershell.exe Token: SeRemoteShutdownPrivilege 3556 powershell.exe Token: SeUndockPrivilege 3556 powershell.exe Token: SeManageVolumePrivilege 3556 powershell.exe Token: 33 3556 powershell.exe Token: 34 3556 powershell.exe Token: 35 3556 powershell.exe Token: 36 3556 powershell.exe Token: SeIncreaseQuotaPrivilege 3852 powershell.exe Token: SeSecurityPrivilege 3852 powershell.exe Token: SeTakeOwnershipPrivilege 3852 powershell.exe Token: SeLoadDriverPrivilege 3852 powershell.exe Token: SeSystemProfilePrivilege 3852 powershell.exe Token: SeSystemtimePrivilege 3852 powershell.exe Token: SeProfSingleProcessPrivilege 3852 powershell.exe Token: SeIncBasePriorityPrivilege 3852 powershell.exe Token: SeCreatePagefilePrivilege 3852 powershell.exe Token: SeBackupPrivilege 3852 powershell.exe Token: SeRestorePrivilege 3852 powershell.exe Token: SeShutdownPrivilege 3852 powershell.exe Token: SeDebugPrivilege 3852 powershell.exe Token: SeSystemEnvironmentPrivilege 3852 powershell.exe Token: SeRemoteShutdownPrivilege 3852 powershell.exe Token: SeUndockPrivilege 3852 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1936 2204 afdfb3d54332e114744d28d9a672d2bf442cbf3cd60cebf8c68fe85af2b4dcfe.exe 66 PID 2204 wrote to memory of 1936 2204 afdfb3d54332e114744d28d9a672d2bf442cbf3cd60cebf8c68fe85af2b4dcfe.exe 66 PID 2204 wrote to memory of 1936 2204 afdfb3d54332e114744d28d9a672d2bf442cbf3cd60cebf8c68fe85af2b4dcfe.exe 66 PID 1936 wrote to memory of 3048 1936 WScript.exe 67 PID 1936 wrote to memory of 3048 1936 WScript.exe 67 PID 1936 wrote to memory of 3048 1936 WScript.exe 67 PID 3048 wrote to memory of 4728 3048 cmd.exe 69 PID 3048 wrote to memory of 4728 3048 cmd.exe 69 PID 4728 wrote to memory of 3852 4728 DllCommonsvc.exe 80 PID 4728 wrote to memory of 3852 4728 DllCommonsvc.exe 80 PID 4728 wrote to memory of 3556 4728 DllCommonsvc.exe 81 PID 4728 wrote to memory of 3556 4728 DllCommonsvc.exe 81 PID 4728 wrote to memory of 4156 4728 DllCommonsvc.exe 87 PID 4728 wrote to memory of 4156 4728 DllCommonsvc.exe 87 PID 4728 wrote to memory of 4952 4728 DllCommonsvc.exe 84 PID 4728 wrote to memory of 4952 4728 DllCommonsvc.exe 84 PID 4728 wrote to memory of 1796 4728 DllCommonsvc.exe 88 PID 4728 wrote to memory of 1796 4728 DllCommonsvc.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\afdfb3d54332e114744d28d9a672d2bf442cbf3cd60cebf8c68fe85af2b4dcfe.exe"C:\Users\Admin\AppData\Local\Temp\afdfb3d54332e114744d28d9a672d2bf442cbf3cd60cebf8c68fe85af2b4dcfe.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Music\winlogon.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\OfficeClickToRun.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\en-US\wininit.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
-
C:\Users\Default\Music\winlogon.exe"C:\Users\Default\Music\winlogon.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Music\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Default\Music\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Music\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Windows\en-US\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\en-US\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Windows\en-US\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4196
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
Filesize
1KB
MD50b9e160a692e58671bf6856ee4df365f
SHA155adf742b05f003c6122041e634872899c878cd0
SHA256f50df965c5ebdb7e8b82f5a0e22728e4f2cfebdd69b28f2f7efd1ba57563f8ad
SHA5126fd5ebe7a4c376a1618d645c257dd6325d0d0de6acc602b56d3df9ae139cdc014f39bac176407c7b3a2ca5ee96798ac3e31f8b33e42e12e04aa5a3c58551b109
-
Filesize
1KB
MD50b9e160a692e58671bf6856ee4df365f
SHA155adf742b05f003c6122041e634872899c878cd0
SHA256f50df965c5ebdb7e8b82f5a0e22728e4f2cfebdd69b28f2f7efd1ba57563f8ad
SHA5126fd5ebe7a4c376a1618d645c257dd6325d0d0de6acc602b56d3df9ae139cdc014f39bac176407c7b3a2ca5ee96798ac3e31f8b33e42e12e04aa5a3c58551b109
-
Filesize
1KB
MD528a864a0f539edba4b408800ebe678c3
SHA143951cd3d86c51f20583bc06ec84f667df6473be
SHA2569d60eb7432a29a9a7687a635ee8098c8c7b909e8098a31746d2c46b0257043e3
SHA5124219634dbb3c8dbecc52e6049c460222d13180d067c0e8a53996d55d49013f0e71c82c33356e9c98a027379753a736b3979c7b170d2789ecefcbf3e118a4ffc9
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478