Malware Analysis Report

2024-10-10 12:59

Sample ID 240602-kmmq9agd41
Target 567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe
SHA256 567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3
Tags
dcrat infostealer rat spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3

Threat Level: Known bad

The file 567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe was found to be: Known bad.

Malicious Activity Summary

dcrat infostealer rat spyware stealer

Dcrat family

Process spawned unexpected child process

DcRat

DCRat payload

DCRat payload

Checks computer location settings

Executes dropped EXE

Reads user/profile data of web browsers

Drops file in Program Files directory

Drops file in Windows directory

Unsigned PE

Enumerates physical storage devices

Creates scheduled task(s)

Uses Task Scheduler COM API

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious behavior: GetForegroundWindowSpam

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-02 08:43

Signatures

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Dcrat family

dcrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-02 08:43

Reported

2024-06-02 08:45

Platform

win10v2004-20240426-en

Max time kernel

119s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe"

Signatures

DcRat

rat infostealer dcrat

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\Fonts\dwm.exe N/A

Reads user/profile data of web browsers

spyware stealer

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Internet Explorer\uk-UA\38384e6a620884 C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
File created C:\Program Files\Windows NT\Accessories\en-US\smss.exe C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\spoolsv.exe C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\f3b6ecef712a24 C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\spoolsv.exe C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
File created C:\Program Files (x86)\Internet Explorer\uk-UA\SearchApp.exe C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
File created C:\Program Files\Windows NT\Accessories\en-US\69ddcba757bf72 C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
File created C:\Program Files\Java\jdk-1.8\RuntimeBroker.exe C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
File created C:\Program Files\Java\jdk-1.8\9e8d7a4ca61bd9 C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\f3b6ecef712a24 C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
N/A N/A C:\Windows\Fonts\dwm.exe N/A
N/A N/A C:\Windows\Fonts\dwm.exe N/A
N/A N/A C:\Windows\Fonts\dwm.exe N/A
N/A N/A C:\Windows\Fonts\dwm.exe N/A
N/A N/A C:\Windows\Fonts\dwm.exe N/A
N/A N/A C:\Windows\Fonts\dwm.exe N/A
N/A N/A C:\Windows\Fonts\dwm.exe N/A
N/A N/A C:\Windows\Fonts\dwm.exe N/A
N/A N/A C:\Windows\Fonts\dwm.exe N/A
N/A N/A C:\Windows\Fonts\dwm.exe N/A
N/A N/A C:\Windows\Fonts\dwm.exe N/A
N/A N/A C:\Windows\Fonts\dwm.exe N/A
N/A N/A C:\Windows\Fonts\dwm.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\Fonts\dwm.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Fonts\dwm.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe

"C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe"

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\Public\csrss.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Public\csrss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\Public\csrss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Internet Explorer\uk-UA\SearchApp.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\uk-UA\SearchApp.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Internet Explorer\uk-UA\SearchApp.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows NT\Accessories\en-US\smss.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\en-US\smss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows NT\Accessories\en-US\smss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Users\Default\My Documents\taskhostw.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\Default\My Documents\taskhostw.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\Users\Default\My Documents\taskhostw.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Java\jdk-1.8\RuntimeBroker.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Java\jdk-1.8\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files\Java\jdk-1.8\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Windows\Fonts\dwm.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\Fonts\dwm.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Windows\Fonts\dwm.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\spoolsv.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\spoolsv.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\spoolsv.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Pictures\dwm.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Public\Pictures\dwm.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Pictures\dwm.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 5 /tr "'C:\Windows\appcompat\sysmon.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\appcompat\sysmon.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 10 /tr "'C:\Windows\appcompat\sysmon.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\spoolsv.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\spoolsv.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\spoolsv.exe'" /rl HIGHEST /f

C:\Windows\Fonts\dwm.exe

"C:\Windows\Fonts\dwm.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 a0988934.xsph.ru udp
RU 141.8.192.93:80 a0988934.xsph.ru tcp
RU 141.8.192.93:80 a0988934.xsph.ru tcp
US 8.8.8.8:53 93.192.8.141.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
RU 141.8.192.93:80 a0988934.xsph.ru tcp
US 8.8.8.8:53 25.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
RU 141.8.192.93:80 a0988934.xsph.ru tcp

Files

memory/3624-0-0x00007FFB1E913000-0x00007FFB1E915000-memory.dmp

memory/3624-1-0x0000000000D30000-0x0000000000E62000-memory.dmp

memory/3624-2-0x00007FFB1E910000-0x00007FFB1F3D1000-memory.dmp

memory/3624-3-0x0000000003090000-0x00000000030AC000-memory.dmp

memory/3624-4-0x000000001C180000-0x000000001C1D0000-memory.dmp

memory/3624-5-0x00000000030B0000-0x00000000030C6000-memory.dmp

memory/3624-6-0x00000000030D0000-0x00000000030DC000-memory.dmp

C:\Users\Default\Documents\taskhostw.exe

MD5 05b4e0a30e4bf8cd0d39f26aec6ffeaa
SHA1 d33033200167e6462497368c4fffedece8df35e6
SHA256 567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3
SHA512 18e3d7622071a316b77c2fd099b0af5559b9ecb66526e4c9d1842777e7cc6bc0671dd7b1617c9bfb442689a0fd47fc068127af10b6a8ab965047c7a02a74d174

memory/3624-42-0x00007FFB1E910000-0x00007FFB1F3D1000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-02 08:43

Reported

2024-06-02 08:45

Platform

win7-20240221-en

Max time kernel

119s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe"

Signatures

DcRat

rat infostealer dcrat

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Windows NT\TableTextService\es-ES\audiodg.exe N/A

Reads user/profile data of web browsers

spyware stealer

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Java\jre7\Idle.exe C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
File opened for modification C:\Program Files\Java\jre7\Idle.exe C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
File created C:\Program Files\Java\jre7\6ccacd8608530f C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
File created C:\Program Files (x86)\Windows NT\TableTextService\es-ES\audiodg.exe C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
File created C:\Program Files (x86)\Windows NT\TableTextService\es-ES\42af1c969fbb7b C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\it-IT\lsm.exe C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
File created C:\Windows\it-IT\101b941d020240 C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Windows NT\TableTextService\es-ES\audiodg.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files (x86)\Windows NT\TableTextService\es-ES\audiodg.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe

"C:\Users\Admin\AppData\Local\Temp\567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3.exe"

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Program Files\Java\jre7\Idle.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Java\jre7\Idle.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files\Java\jre7\Idle.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsml" /sc MINUTE /mo 14 /tr "'C:\Windows\it-IT\lsm.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\it-IT\lsm.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsml" /sc MINUTE /mo 5 /tr "'C:\Windows\it-IT\lsm.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\es-ES\audiodg.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\es-ES\audiodg.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\es-ES\audiodg.exe'" /rl HIGHEST /f

C:\Program Files (x86)\Windows NT\TableTextService\es-ES\audiodg.exe

"C:\Program Files (x86)\Windows NT\TableTextService\es-ES\audiodg.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 a0988934.xsph.ru udp
RU 141.8.192.93:80 a0988934.xsph.ru tcp
RU 141.8.192.93:80 a0988934.xsph.ru tcp
RU 141.8.192.93:80 a0988934.xsph.ru tcp
RU 141.8.192.93:80 a0988934.xsph.ru tcp

Files

memory/2812-0-0x000007FEF53D3000-0x000007FEF53D4000-memory.dmp

memory/2812-1-0x00000000010A0000-0x00000000011D2000-memory.dmp

memory/2812-2-0x000007FEF53D0000-0x000007FEF5DBC000-memory.dmp

memory/2812-3-0x0000000000440000-0x000000000045C000-memory.dmp

memory/2812-4-0x00000000005F0000-0x0000000000606000-memory.dmp

memory/2812-5-0x0000000000610000-0x000000000061C000-memory.dmp

C:\Program Files (x86)\Windows NT\TableTextService\es-ES\audiodg.exe

MD5 05b4e0a30e4bf8cd0d39f26aec6ffeaa
SHA1 d33033200167e6462497368c4fffedece8df35e6
SHA256 567a658aaa58107041e4810103dd6957478885bf88d6819100c861392f3c23f3
SHA512 18e3d7622071a316b77c2fd099b0af5559b9ecb66526e4c9d1842777e7cc6bc0671dd7b1617c9bfb442689a0fd47fc068127af10b6a8ab965047c7a02a74d174

memory/2352-18-0x0000000000140000-0x0000000000272000-memory.dmp

memory/2812-19-0x000007FEF53D0000-0x000007FEF5DBC000-memory.dmp