Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2023, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
3053cb488a47f0cfa652722c79486ff8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3053cb488a47f0cfa652722c79486ff8.exe
Resource
win10v2004-20230221-en
General
-
Target
3053cb488a47f0cfa652722c79486ff8.exe
-
Size
2.3MB
-
MD5
3053cb488a47f0cfa652722c79486ff8
-
SHA1
59eeca2266169cab55c917755e5f0996b4866cf8
-
SHA256
d4e0dbb934691a16f4c9fb7534e2c0f2940389e65e1799f6f231909edaf171a7
-
SHA512
c346ac3d951e85371a237a0eef469331f756096a5d68f7b529cef9e48fa2ea2e8a4d6687f09fdad177c0b4eb4d70ca6fd3edeb13e38f9d91eecef5e92b730a4c
-
SSDEEP
49152:AWZrpdaJJVoYNRFmujPP2TyqYOENC3tAaJWX/L2qU6A77DA7so8j8K:AWp8oYNquTkyPXw3yaJ0JUL7ah
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 24 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4252 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1064 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1460 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2064 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2460 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3904 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3612 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4172 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3576 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2684 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3548 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1664 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4372 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3096 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 320 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 216 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2876 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 404 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4956 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5052 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3828 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4364 1940 schtasks.exe 63 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4796 1940 schtasks.exe 63 -
resource yara_rule behavioral2/memory/4772-134-0x0000000000820000-0x0000000000D18000-memory.dmp dcrat behavioral2/memory/4772-169-0x0000000000820000-0x0000000000D18000-memory.dmp dcrat behavioral2/memory/340-171-0x0000000001000000-0x00000000014F8000-memory.dmp dcrat behavioral2/memory/340-172-0x0000000001000000-0x00000000014F8000-memory.dmp dcrat behavioral2/memory/340-176-0x0000000001000000-0x00000000014F8000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 3053cb488a47f0cfa652722c79486ff8.exe -
Executes dropped EXE 1 IoCs
pid Process 340 sihost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 ipinfo.io 22 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
pid Process 4772 3053cb488a47f0cfa652722c79486ff8.exe 4772 3053cb488a47f0cfa652722c79486ff8.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\sihost.exe 3053cb488a47f0cfa652722c79486ff8.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\886983d96e3d3e 3053cb488a47f0cfa652722c79486ff8.exe File created C:\Program Files (x86)\Windows Photo Viewer\ja-JP\7a0fd90576e088 3053cb488a47f0cfa652722c79486ff8.exe File created C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\RuntimeBroker.exe 3053cb488a47f0cfa652722c79486ff8.exe File created C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\9e8d7a4ca61bd9 3053cb488a47f0cfa652722c79486ff8.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\sihost.exe 3053cb488a47f0cfa652722c79486ff8.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\66fc9ff0ee96c2 3053cb488a47f0cfa652722c79486ff8.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\csrss.exe 3053cb488a47f0cfa652722c79486ff8.exe File created C:\Program Files (x86)\Windows Photo Viewer\ja-JP\explorer.exe 3053cb488a47f0cfa652722c79486ff8.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Boot\PCAT\es-MX\upfc.exe 3053cb488a47f0cfa652722c79486ff8.exe File created C:\Windows\de-DE\backgroundTaskHost.exe 3053cb488a47f0cfa652722c79486ff8.exe File created C:\Windows\de-DE\eddb19405b7ce1 3053cb488a47f0cfa652722c79486ff8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 24 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 404 schtasks.exe 4252 schtasks.exe 3904 schtasks.exe 3576 schtasks.exe 3548 schtasks.exe 2736 schtasks.exe 320 schtasks.exe 216 schtasks.exe 4956 schtasks.exe 4364 schtasks.exe 4796 schtasks.exe 2460 schtasks.exe 1664 schtasks.exe 4372 schtasks.exe 3096 schtasks.exe 2876 schtasks.exe 3828 schtasks.exe 1064 schtasks.exe 1460 schtasks.exe 2064 schtasks.exe 3612 schtasks.exe 4172 schtasks.exe 2684 schtasks.exe 5052 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4772 3053cb488a47f0cfa652722c79486ff8.exe 4772 3053cb488a47f0cfa652722c79486ff8.exe 4772 3053cb488a47f0cfa652722c79486ff8.exe 4772 3053cb488a47f0cfa652722c79486ff8.exe 4772 3053cb488a47f0cfa652722c79486ff8.exe 4772 3053cb488a47f0cfa652722c79486ff8.exe 4772 3053cb488a47f0cfa652722c79486ff8.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe 340 sihost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 340 sihost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4772 3053cb488a47f0cfa652722c79486ff8.exe Token: SeDebugPrivilege 340 sihost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4772 3053cb488a47f0cfa652722c79486ff8.exe 340 sihost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4772 wrote to memory of 340 4772 3053cb488a47f0cfa652722c79486ff8.exe 110 PID 4772 wrote to memory of 340 4772 3053cb488a47f0cfa652722c79486ff8.exe 110 PID 4772 wrote to memory of 340 4772 3053cb488a47f0cfa652722c79486ff8.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3053cb488a47f0cfa652722c79486ff8.exe"C:\Users\Admin\AppData\Local\Temp\3053cb488a47f0cfa652722c79486ff8.exe"1⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\All Users\sihost.exe"C:\Users\All Users\sihost.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:340
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Windows\de-DE\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\de-DE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Windows\de-DE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\odt\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\odt\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\odt\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\Public\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Public\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Users\Public\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Users\All Users\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD53053cb488a47f0cfa652722c79486ff8
SHA159eeca2266169cab55c917755e5f0996b4866cf8
SHA256d4e0dbb934691a16f4c9fb7534e2c0f2940389e65e1799f6f231909edaf171a7
SHA512c346ac3d951e85371a237a0eef469331f756096a5d68f7b529cef9e48fa2ea2e8a4d6687f09fdad177c0b4eb4d70ca6fd3edeb13e38f9d91eecef5e92b730a4c
-
Filesize
2.3MB
MD53053cb488a47f0cfa652722c79486ff8
SHA159eeca2266169cab55c917755e5f0996b4866cf8
SHA256d4e0dbb934691a16f4c9fb7534e2c0f2940389e65e1799f6f231909edaf171a7
SHA512c346ac3d951e85371a237a0eef469331f756096a5d68f7b529cef9e48fa2ea2e8a4d6687f09fdad177c0b4eb4d70ca6fd3edeb13e38f9d91eecef5e92b730a4c
-
Filesize
2.3MB
MD53053cb488a47f0cfa652722c79486ff8
SHA159eeca2266169cab55c917755e5f0996b4866cf8
SHA256d4e0dbb934691a16f4c9fb7534e2c0f2940389e65e1799f6f231909edaf171a7
SHA512c346ac3d951e85371a237a0eef469331f756096a5d68f7b529cef9e48fa2ea2e8a4d6687f09fdad177c0b4eb4d70ca6fd3edeb13e38f9d91eecef5e92b730a4c