Analysis
-
max time kernel
95s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-06-2023 12:00
Static task
static1
Behavioral task
behavioral1
Sample
08002399.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
08002399.exe
Resource
win10v2004-20230220-en
General
-
Target
08002399.exe
-
Size
807KB
-
MD5
1daeb81d9c3201beb8ea848fd869fc80
-
SHA1
33aaf3d172952a169e97b4912506b08df3e01c75
-
SHA256
5d3511735bed246367c3fa97c21ce7bdc9ade8ce5212d4a40504ddc9a9330122
-
SHA512
1b998a59a2c4d746b270ba5fddd1c1000f457d627c2bef114ea6d116085004deffbfd83d0f50ad56bc1bc366b3647da2499357b704fc4a303e3bbc74f242c115
-
SSDEEP
24576:KUHKH42cH3Gz0BwDbu2fglQPvX+QZZUI1L3:KuKHGHWgIu+f+QD3
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
AppLaunch.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe" AppLaunch.exe -
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 952 1612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 392 1612 schtasks.exe -
Processes:
resource yara_rule behavioral1/memory/1092-56-0x0000000000400000-0x00000000004A4000-memory.dmp dcrat behavioral1/memory/1092-62-0x0000000000400000-0x00000000004A4000-memory.dmp dcrat behavioral1/memory/1092-63-0x0000000000400000-0x00000000004A4000-memory.dmp dcrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
08002399.exedescription pid process target process PID 2028 set thread context of 1092 2028 08002399.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
AppLaunch.exepid process 1092 AppLaunch.exe 1092 AppLaunch.exe 1092 AppLaunch.exe 1092 AppLaunch.exe 1092 AppLaunch.exe 1092 AppLaunch.exe 1092 AppLaunch.exe 1092 AppLaunch.exe 1092 AppLaunch.exe 1092 AppLaunch.exe 1092 AppLaunch.exe 1092 AppLaunch.exe 1092 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1092 AppLaunch.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
08002399.exeAppLaunch.execmd.exew32tm.exedescription pid process target process PID 2028 wrote to memory of 1092 2028 08002399.exe AppLaunch.exe PID 2028 wrote to memory of 1092 2028 08002399.exe AppLaunch.exe PID 2028 wrote to memory of 1092 2028 08002399.exe AppLaunch.exe PID 2028 wrote to memory of 1092 2028 08002399.exe AppLaunch.exe PID 2028 wrote to memory of 1092 2028 08002399.exe AppLaunch.exe PID 2028 wrote to memory of 1092 2028 08002399.exe AppLaunch.exe PID 2028 wrote to memory of 1092 2028 08002399.exe AppLaunch.exe PID 2028 wrote to memory of 1092 2028 08002399.exe AppLaunch.exe PID 2028 wrote to memory of 1092 2028 08002399.exe AppLaunch.exe PID 1092 wrote to memory of 1072 1092 AppLaunch.exe cmd.exe PID 1092 wrote to memory of 1072 1092 AppLaunch.exe cmd.exe PID 1092 wrote to memory of 1072 1092 AppLaunch.exe cmd.exe PID 1092 wrote to memory of 1072 1092 AppLaunch.exe cmd.exe PID 1092 wrote to memory of 1072 1092 AppLaunch.exe cmd.exe PID 1092 wrote to memory of 1072 1092 AppLaunch.exe cmd.exe PID 1092 wrote to memory of 1072 1092 AppLaunch.exe cmd.exe PID 1072 wrote to memory of 856 1072 cmd.exe w32tm.exe PID 1072 wrote to memory of 856 1072 cmd.exe w32tm.exe PID 1072 wrote to memory of 856 1072 cmd.exe w32tm.exe PID 1072 wrote to memory of 856 1072 cmd.exe w32tm.exe PID 1072 wrote to memory of 856 1072 cmd.exe w32tm.exe PID 1072 wrote to memory of 856 1072 cmd.exe w32tm.exe PID 1072 wrote to memory of 856 1072 cmd.exe w32tm.exe PID 856 wrote to memory of 896 856 w32tm.exe w32tm.exe PID 856 wrote to memory of 896 856 w32tm.exe w32tm.exe PID 856 wrote to memory of 896 856 w32tm.exe w32tm.exe PID 856 wrote to memory of 896 856 w32tm.exe w32tm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\08002399.exe"C:\Users\Admin\AppData\Local\Temp\08002399.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Modifies WinLogon for persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\xghrCifyI9.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "AppLaunch" /f1⤵
- Process spawned unexpected child process
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "AppLaunchA" /f1⤵
- Process spawned unexpected child process
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\xghrCifyI9.batFilesize
305B
MD5ffe36d9748fd1046ecab190c6bfe68cc
SHA112604e4e14fa0e62cb9745d451d93dc1c2306ac5
SHA256daa8fafed958b515e5e9d502951c95e4a729fba87bc0086943aa1510c46bfd7a
SHA51276196443db5be627b105b8e9c20d482c0bfb4b57e1bd57e75627ced2a63854069c50e615f9bf124e1b4ae55756c334b82fc884a4d4c808c69a4e93b5b6424850
-
C:\Users\Admin\AppData\Local\Temp\xghrCifyI9.batFilesize
305B
MD5ffe36d9748fd1046ecab190c6bfe68cc
SHA112604e4e14fa0e62cb9745d451d93dc1c2306ac5
SHA256daa8fafed958b515e5e9d502951c95e4a729fba87bc0086943aa1510c46bfd7a
SHA51276196443db5be627b105b8e9c20d482c0bfb4b57e1bd57e75627ced2a63854069c50e615f9bf124e1b4ae55756c334b82fc884a4d4c808c69a4e93b5b6424850
-
memory/1092-55-0x0000000000400000-0x00000000004A4000-memory.dmpFilesize
656KB
-
memory/1092-56-0x0000000000400000-0x00000000004A4000-memory.dmpFilesize
656KB
-
memory/1092-60-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/1092-62-0x0000000000400000-0x00000000004A4000-memory.dmpFilesize
656KB
-
memory/1092-63-0x0000000000400000-0x00000000004A4000-memory.dmpFilesize
656KB
-
memory/1092-64-0x00000000003C0000-0x00000000003DC000-memory.dmpFilesize
112KB
-
memory/1092-65-0x00000000004C0000-0x00000000004D6000-memory.dmpFilesize
88KB
-
memory/1092-66-0x0000000000730000-0x0000000000770000-memory.dmpFilesize
256KB
-
memory/1092-84-0x0000000000730000-0x0000000000770000-memory.dmpFilesize
256KB