Analysis
-
max time kernel
183s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
b067ce756638b4266dc38d81abb68af2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b067ce756638b4266dc38d81abb68af2.exe
Resource
win10v2004-20230915-en
General
-
Target
b067ce756638b4266dc38d81abb68af2.exe
-
Size
1.9MB
-
MD5
b067ce756638b4266dc38d81abb68af2
-
SHA1
a5dfa0b07ddc85b5bf3ab0a1027bb6fef3470f37
-
SHA256
5c445f99c3c151573f373b65e070381d96df9260169433a01e7a7fab04ad88fe
-
SHA512
3f49947ee3b8436a09a027496cd5e6a0ff0ae56f811d74e17b2f166f4da5cfddbf9a8d33926c8a4c228edbe53d05b6bcd1507aba064a56e31e688d91b4d677ed
-
SSDEEP
49152:qcbzAoVVRaWf4aEqGaU5XBkvRdLtkdbW0qmxKghiX:qcbx9dtxu5arZkdX1K
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 652 4524 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2212 4524 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2376 4524 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3408 4524 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2908 4524 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3792 4524 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1240 4524 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 452 4524 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3732 4524 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4384 4524 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4656 4524 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5056 4524 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2104 4524 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4560 4524 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4992 4524 schtasks.exe 93 -
resource yara_rule behavioral2/memory/4268-23-0x00000000000F0000-0x000000000052E000-memory.dmp dcrat behavioral2/memory/3160-55-0x0000000000CA0000-0x00000000010DE000-memory.dmp dcrat behavioral2/memory/3160-57-0x0000000000CA0000-0x00000000010DE000-memory.dmp dcrat behavioral2/memory/4268-60-0x00000000000F0000-0x000000000052E000-memory.dmp dcrat behavioral2/memory/3160-68-0x0000000000CA0000-0x00000000010DE000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation b067ce756638b4266dc38d81abb68af2.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation 1.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation portwebhost_protected.exe -
Executes dropped EXE 3 IoCs
pid Process 3252 1.exe 4268 portwebhost_protected.exe 3160 services.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4268 portwebhost_protected.exe 4268 portwebhost_protected.exe 4268 portwebhost_protected.exe 4268 portwebhost_protected.exe 3160 services.exe 3160 services.exe 3160 services.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\PackageManifests\dllhost.exe portwebhost_protected.exe File created C:\Program Files\Microsoft Office\PackageManifests\5940a34987c991 portwebhost_protected.exe File created C:\Program Files (x86)\WindowsPowerShell\Configuration\sppsvc.exe portwebhost_protected.exe File created C:\Program Files (x86)\WindowsPowerShell\Configuration\0a1fd5f707cd16 portwebhost_protected.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\fr-FR\backgroundTaskHost.exe portwebhost_protected.exe File opened for modification C:\Windows\fr-FR\backgroundTaskHost.exe portwebhost_protected.exe File created C:\Windows\fr-FR\eddb19405b7ce1 portwebhost_protected.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2376 schtasks.exe 3408 schtasks.exe 4656 schtasks.exe 5056 schtasks.exe 2104 schtasks.exe 652 schtasks.exe 452 schtasks.exe 4560 schtasks.exe 2212 schtasks.exe 1240 schtasks.exe 3732 schtasks.exe 4384 schtasks.exe 4992 schtasks.exe 2908 schtasks.exe 3792 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4268 portwebhost_protected.exe 4268 portwebhost_protected.exe 4268 portwebhost_protected.exe 4268 portwebhost_protected.exe 4268 portwebhost_protected.exe 4268 portwebhost_protected.exe 4268 portwebhost_protected.exe 4268 portwebhost_protected.exe 4268 portwebhost_protected.exe 3160 services.exe 3160 services.exe 3160 services.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4268 portwebhost_protected.exe Token: SeDebugPrivilege 3160 services.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4268 portwebhost_protected.exe 3160 services.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 840 wrote to memory of 628 840 b067ce756638b4266dc38d81abb68af2.exe 90 PID 840 wrote to memory of 628 840 b067ce756638b4266dc38d81abb68af2.exe 90 PID 840 wrote to memory of 628 840 b067ce756638b4266dc38d81abb68af2.exe 90 PID 628 wrote to memory of 3252 628 cmd.exe 94 PID 628 wrote to memory of 3252 628 cmd.exe 94 PID 628 wrote to memory of 3252 628 cmd.exe 94 PID 3252 wrote to memory of 4268 3252 1.exe 95 PID 3252 wrote to memory of 4268 3252 1.exe 95 PID 3252 wrote to memory of 4268 3252 1.exe 95 PID 4268 wrote to memory of 3160 4268 portwebhost_protected.exe 117 PID 4268 wrote to memory of 3160 4268 portwebhost_protected.exe 117 PID 4268 wrote to memory of 3160 4268 portwebhost_protected.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b067ce756638b4266dc38d81abb68af2.exe"C:\Users\Admin\AppData\Local\Temp\b067ce756638b4266dc38d81abb68af2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe -pOIUTRGROID8IRGD7GD6UG3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\portwebhost_protected.exe"C:\Users\Admin\AppData\Local\Temp\portwebhost_protected.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\odt\services.exe"C:\odt\services.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3160
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Windows\fr-FR\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\fr-FR\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 14 /tr "'C:\Windows\fr-FR\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\odt\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\odt\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\odt\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office\PackageManifests\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\PackageManifests\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office\PackageManifests\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5485b1f288e5f5e8cf3765a001ad83b90
SHA1c7df06ea8734b550d90f810d84fd8a54c2fedaee
SHA2560267d5b9766a69fc65b9cb2ae5945bc5d42e85d9f155c8f4a15786f27ca84e95
SHA51295ccb456b58249f80fb6a5d0910bb7fd1c83734fac76be0479b238f05f7b5bfed1227656aef3287c956878d1dd6a9dceaea93b482de272aa5764088941700272
-
Filesize
1.8MB
MD5db26634068f2b0c596b1b029f1763792
SHA1883814f09c8462194ea45991e9dbdc499da14709
SHA25637b21ed3b707757ffe29f249a9a47c6729a8354ce9940c4d4a11b0bfb1d24f30
SHA5121c3c7fa7db6dbaf8585eae46b57ea12d5e16ea02b22f499bff49275102f91f09a7ccffa58f9d6adddfc39512e0e3484925c152f799cd77a6ba1118b8fecb364a
-
Filesize
1.8MB
MD5db26634068f2b0c596b1b029f1763792
SHA1883814f09c8462194ea45991e9dbdc499da14709
SHA25637b21ed3b707757ffe29f249a9a47c6729a8354ce9940c4d4a11b0bfb1d24f30
SHA5121c3c7fa7db6dbaf8585eae46b57ea12d5e16ea02b22f499bff49275102f91f09a7ccffa58f9d6adddfc39512e0e3484925c152f799cd77a6ba1118b8fecb364a
-
Filesize
1.5MB
MD5f65cc7ac632006f36da65555ac55ce83
SHA159ab98b973cf37f5aa096b65677f282d24382e64
SHA256f72ec7b3eaf3112713d6d77c7256a25d777d4794a0daa3b864855b68bbf40a5e
SHA5124a10a9b8d1dba01a0dc284c8c3f6c396e3632931fa188c1c6b74dd92d46ab1958b8d09e621fc1461ace4e2ce84c7b9be4e3e6f006dc35647b39b668b02b47e31
-
Filesize
1.5MB
MD5f65cc7ac632006f36da65555ac55ce83
SHA159ab98b973cf37f5aa096b65677f282d24382e64
SHA256f72ec7b3eaf3112713d6d77c7256a25d777d4794a0daa3b864855b68bbf40a5e
SHA5124a10a9b8d1dba01a0dc284c8c3f6c396e3632931fa188c1c6b74dd92d46ab1958b8d09e621fc1461ace4e2ce84c7b9be4e3e6f006dc35647b39b668b02b47e31
-
Filesize
1.5MB
MD5f65cc7ac632006f36da65555ac55ce83
SHA159ab98b973cf37f5aa096b65677f282d24382e64
SHA256f72ec7b3eaf3112713d6d77c7256a25d777d4794a0daa3b864855b68bbf40a5e
SHA5124a10a9b8d1dba01a0dc284c8c3f6c396e3632931fa188c1c6b74dd92d46ab1958b8d09e621fc1461ace4e2ce84c7b9be4e3e6f006dc35647b39b668b02b47e31
-
Filesize
1.5MB
MD5f65cc7ac632006f36da65555ac55ce83
SHA159ab98b973cf37f5aa096b65677f282d24382e64
SHA256f72ec7b3eaf3112713d6d77c7256a25d777d4794a0daa3b864855b68bbf40a5e
SHA5124a10a9b8d1dba01a0dc284c8c3f6c396e3632931fa188c1c6b74dd92d46ab1958b8d09e621fc1461ace4e2ce84c7b9be4e3e6f006dc35647b39b668b02b47e31
-
Filesize
1.5MB
MD5f65cc7ac632006f36da65555ac55ce83
SHA159ab98b973cf37f5aa096b65677f282d24382e64
SHA256f72ec7b3eaf3112713d6d77c7256a25d777d4794a0daa3b864855b68bbf40a5e
SHA5124a10a9b8d1dba01a0dc284c8c3f6c396e3632931fa188c1c6b74dd92d46ab1958b8d09e621fc1461ace4e2ce84c7b9be4e3e6f006dc35647b39b668b02b47e31