Analysis

  • max time kernel
    122s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 12:50

General

  • Target

    15949a8ac89553949278777a580044ac.exe

  • Size

    2.7MB

  • MD5

    15949a8ac89553949278777a580044ac

  • SHA1

    d04205fde4db2c89e556d2f023b6b83e4c37360b

  • SHA256

    ac0c0dbb347d0ed2096610d72ef708415f29ecc0bb560ff62bffd31675637fd4

  • SHA512

    4d81e608d024480c4e6dd695a80c5114298e870a92540138ba92b169e1f921f348f191841c01a1b511406f65c2cb0f3ac2e0a32e240e2387c5689f577cbbaace

  • SSDEEP

    49152:3b8iGewegzYlAyJ0rxJcq7oAVEKt6ZfBd8NDFZ6yDoJNdTZw7UJk2byImVXsyyO:3QhrbaIxCq7oASDfBdELhEJ2wz+syb

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15949a8ac89553949278777a580044ac.exe
    "C:\Users\Admin\AppData\Local\Temp\15949a8ac89553949278777a580044ac.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jEEliCGCGs.bat"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
          PID:1168
        • C:\Windows\SysWOW64\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1284
          • C:\Windows\system32\w32tm.exe
            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
            4⤵
              PID:1488
          • C:\Windows\SysWOW64\wbem\pnpsetup\WmiPrvSE.exe
            "C:\Windows\System32\wbem\pnpsetup\WmiPrvSE.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Checks whether UAC is enabled
            • Writes to the Master Boot Record (MBR)
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:332
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\WPDShextAutoplay\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1716
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\pnpsetup\WmiPrvSE.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2632
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\720a7ca2-9b9e-11ee-89df-aefc3be66ef1\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2608
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\NlsLexicons0022\spoolsv.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2144

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\mntemp

        Filesize

        16B

        MD5

        3698d97cea8f207a36aeacc3b0e42891

        SHA1

        63a2ea25aca4d5b98cd4eb53a1c5d20f1cbc8e2e

        SHA256

        d86412066ef7ea5a4a8ff48708365cf24f35d21ad32ed8f9498bae94b4320ff7

        SHA512

        7498dd3081cff4c5a40d115edbff2c992a45060efc00c33ab0e598f46b1d25288e72e7079cf64d160cb68aacc9c70ec949c8ae6073eb9d75ca48afe4a9363377

      • C:\Users\Admin\AppData\Local\Temp\jEEliCGCGs.bat

        Filesize

        262B

        MD5

        42333da004e6147de181759467e067de

        SHA1

        2d4af4536712cd0deb141d48d5d28e4fd377dfd8

        SHA256

        7d52802a8bf9536525c57e454ea971ac051dad0825a7ae6161e1a6c48405a5e5

        SHA512

        6c414803af0dee5ee2692f52a05abc45d242d495ea77eb6cf4c99ccf55b128710e0c24ef26a144f97d2a0efd5e2a85f64f0dfbabccd8b35619abfd122ec4fb8f

      • C:\Windows\SysWOW64\wbem\pnpsetup\WmiPrvSE.exe

        Filesize

        327KB

        MD5

        ddfcee45f505bbe4c00eceb9b6b64d10

        SHA1

        6f692b9e267b86a2db2fa45b34abe79e8d31bd17

        SHA256

        728f356142f20f2ea1be244a994c698862873195f6e038fef8d106227cd698f7

        SHA512

        31c9951708e7ec50ade27b88c7758d7babbdf84c1f207a3b0fd13cf15f940342946e2fb61ca9448d5356847f354e1cf9fe2d6f5c6cc167cd3d71ae371600d1b6

      • C:\Windows\SysWOW64\wbem\pnpsetup\WmiPrvSE.exe

        Filesize

        436KB

        MD5

        debc42373576093a23c4156d049adefd

        SHA1

        76965e79486a6b3e67af859f7b15f5910ac86b88

        SHA256

        72caa7b370ea5ccfdf517a79cc3c16d5fe2f21c85ca6622c5d23d3b7e6c0bad1

        SHA512

        0fd602394c55313bc1060d12a507db6dda24ce2ffbe48c0e62efaf9516ab083c713070c804dcf6e4eb66977e00ec974d334eac9962392418d28efd3ac459bbca

      • \Windows\SysWOW64\wbem\pnpsetup\WmiPrvSE.exe

        Filesize

        454KB

        MD5

        0e05ea8a06db1f416ecfc6d06b473465

        SHA1

        f7faf2c10a7f65272c558907abfeb8ef16cee91c

        SHA256

        2c2f94a3abef0a3854592358e8a5d3aa224599ce7e7879cb2ceb4645bb5184a2

        SHA512

        22f828df383ce26a53d5eef4646c432028cf81e1bc369a1e896a121af1872ea60db7d6d0c517cab6bce2e4859f05e8bc362e88262c3e1c8f9026b8982e52411a

      • \Windows\SysWOW64\wbem\pnpsetup\WmiPrvSE.exe

        Filesize

        608KB

        MD5

        8851e7fb6c89ceba6b81500bc58ffa98

        SHA1

        4d6601d3ce1b369d59971282af469088d1494677

        SHA256

        dbee9af7a82c9b109a5e2f0d56dbe02a6b6fad824ea8d96d2cc98f9d164b539e

        SHA512

        279203ba8021eb2cef34597a7bfe59fcd1ccab382f7d7a54c632cdbe3628f85f4edde5b3e41fd2dc4b4214c13b5968adb97d88ae5136062d6c9e75253765c517

      • memory/332-69-0x0000000074B60000-0x0000000074B77000-memory.dmp

        Filesize

        92KB

      • memory/332-67-0x0000000074250000-0x00000000742D0000-memory.dmp

        Filesize

        512KB

      • memory/332-77-0x0000000073BC0000-0x0000000073C18000-memory.dmp

        Filesize

        352KB

      • memory/332-78-0x0000000073BC0000-0x0000000073C18000-memory.dmp

        Filesize

        352KB

      • memory/332-75-0x0000000073C70000-0x0000000073CC2000-memory.dmp

        Filesize

        328KB

      • memory/332-76-0x0000000073D20000-0x0000000073D2D000-memory.dmp

        Filesize

        52KB

      • memory/332-73-0x0000000000CF0000-0x0000000000CFC000-memory.dmp

        Filesize

        48KB

      • memory/332-72-0x0000000000CE0000-0x0000000000CE8000-memory.dmp

        Filesize

        32KB

      • memory/332-70-0x00000000001E0000-0x000000000090A000-memory.dmp

        Filesize

        7.2MB

      • memory/332-71-0x0000000000DD0000-0x0000000000E10000-memory.dmp

        Filesize

        256KB

      • memory/332-79-0x0000000075170000-0x0000000075197000-memory.dmp

        Filesize

        156KB

      • memory/332-68-0x00000000001E0000-0x000000000090A000-memory.dmp

        Filesize

        7.2MB

      • memory/332-66-0x00000000001E0000-0x000000000090A000-memory.dmp

        Filesize

        7.2MB

      • memory/332-80-0x0000000073B40000-0x0000000073B4E000-memory.dmp

        Filesize

        56KB

      • memory/332-81-0x0000000074BC0000-0x0000000074C0A000-memory.dmp

        Filesize

        296KB

      • memory/332-62-0x0000000074BB0000-0x0000000074BB9000-memory.dmp

        Filesize

        36KB

      • memory/332-65-0x00000000743D0000-0x0000000074ABE000-memory.dmp

        Filesize

        6.9MB

      • memory/332-63-0x0000000075360000-0x0000000075450000-memory.dmp

        Filesize

        960KB

      • memory/332-64-0x0000000075930000-0x00000000759FC000-memory.dmp

        Filesize

        816KB

      • memory/332-61-0x0000000074BC0000-0x0000000074C0A000-memory.dmp

        Filesize

        296KB

      • memory/332-82-0x0000000075360000-0x0000000075450000-memory.dmp

        Filesize

        960KB

      • memory/332-60-0x0000000074D70000-0x0000000074D7B000-memory.dmp

        Filesize

        44KB

      • memory/332-83-0x00000000743D0000-0x0000000074ABE000-memory.dmp

        Filesize

        6.9MB

      • memory/332-85-0x0000000074250000-0x00000000742D0000-memory.dmp

        Filesize

        512KB

      • memory/332-58-0x00000000001E0000-0x000000000090A000-memory.dmp

        Filesize

        7.2MB

      • memory/332-86-0x0000000000DD0000-0x0000000000E10000-memory.dmp

        Filesize

        256KB

      • memory/2024-21-0x0000000073B30000-0x0000000073B3F000-memory.dmp

        Filesize

        60KB

      • memory/2024-32-0x0000000074440000-0x0000000074B2E000-memory.dmp

        Filesize

        6.9MB

      • memory/2024-45-0x0000000073B40000-0x0000000073B4A000-memory.dmp

        Filesize

        40KB

      • memory/2024-44-0x00000000742C0000-0x0000000074340000-memory.dmp

        Filesize

        512KB

      • memory/2024-43-0x0000000075930000-0x00000000759FC000-memory.dmp

        Filesize

        816KB

      • memory/2024-39-0x0000000074D60000-0x0000000074D6B000-memory.dmp

        Filesize

        44KB

      • memory/2024-38-0x0000000000230000-0x000000000095A000-memory.dmp

        Filesize

        7.2MB

      • memory/2024-48-0x0000000073BB0000-0x0000000073BC7000-memory.dmp

        Filesize

        92KB

      • memory/2024-47-0x0000000073BD0000-0x0000000073BDE000-memory.dmp

        Filesize

        56KB

      • memory/2024-53-0x0000000074440000-0x0000000074B2E000-memory.dmp

        Filesize

        6.9MB

      • memory/2024-51-0x0000000073B30000-0x0000000073B3F000-memory.dmp

        Filesize

        60KB

      • memory/2024-52-0x00000000756F0000-0x000000007588D000-memory.dmp

        Filesize

        1.6MB

      • memory/2024-49-0x00000000750E0000-0x0000000075163000-memory.dmp

        Filesize

        524KB

      • memory/2024-50-0x000000006F850000-0x000000006F87E000-memory.dmp

        Filesize

        184KB

      • memory/2024-40-0x0000000074C10000-0x0000000074C5A000-memory.dmp

        Filesize

        296KB

      • memory/2024-42-0x0000000075360000-0x0000000075450000-memory.dmp

        Filesize

        960KB

      • memory/2024-41-0x0000000074B30000-0x0000000074B39000-memory.dmp

        Filesize

        36KB

      • memory/2024-36-0x000000006F850000-0x000000006F87E000-memory.dmp

        Filesize

        184KB

      • memory/2024-35-0x00000000756F0000-0x000000007588D000-memory.dmp

        Filesize

        1.6MB

      • memory/2024-46-0x0000000073E70000-0x0000000073E87000-memory.dmp

        Filesize

        92KB

      • memory/2024-31-0x0000000074C10000-0x0000000074C5A000-memory.dmp

        Filesize

        296KB

      • memory/2024-0-0x0000000000230000-0x000000000095A000-memory.dmp

        Filesize

        7.2MB

      • memory/2024-17-0x00000000750E0000-0x0000000075163000-memory.dmp

        Filesize

        524KB

      • memory/2024-18-0x0000000073BB0000-0x0000000073BC7000-memory.dmp

        Filesize

        92KB

      • memory/2024-19-0x0000000073BD0000-0x0000000073BDE000-memory.dmp

        Filesize

        56KB

      • memory/2024-20-0x0000000073B40000-0x0000000073B4A000-memory.dmp

        Filesize

        40KB

      • memory/2024-13-0x0000000005140000-0x0000000005180000-memory.dmp

        Filesize

        256KB

      • memory/2024-12-0x0000000073E70000-0x0000000073E87000-memory.dmp

        Filesize

        92KB

      • memory/2024-11-0x0000000075360000-0x0000000075450000-memory.dmp

        Filesize

        960KB

      • memory/2024-8-0x0000000075930000-0x00000000759FC000-memory.dmp

        Filesize

        816KB

      • memory/2024-10-0x0000000000230000-0x000000000095A000-memory.dmp

        Filesize

        7.2MB

      • memory/2024-9-0x00000000742C0000-0x0000000074340000-memory.dmp

        Filesize

        512KB

      • memory/2024-6-0x0000000074440000-0x0000000074B2E000-memory.dmp

        Filesize

        6.9MB

      • memory/2024-7-0x0000000000230000-0x000000000095A000-memory.dmp

        Filesize

        7.2MB

      • memory/2024-5-0x0000000074B30000-0x0000000074B39000-memory.dmp

        Filesize

        36KB

      • memory/2024-4-0x0000000074C10000-0x0000000074C5A000-memory.dmp

        Filesize

        296KB

      • memory/2024-2-0x0000000074D60000-0x0000000074D6B000-memory.dmp

        Filesize

        44KB

      • memory/2024-1-0x0000000077490000-0x0000000077492000-memory.dmp

        Filesize

        8KB