Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 11:41
Behavioral task
behavioral1
Sample
5614b417cca4217b0a1a4a4a081f9f43.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5614b417cca4217b0a1a4a4a081f9f43.exe
Resource
win10v2004-20240802-en
General
-
Target
5614b417cca4217b0a1a4a4a081f9f43.exe
-
Size
831KB
-
MD5
5614b417cca4217b0a1a4a4a081f9f43
-
SHA1
6597f30054da2fcea4f5c37121a0581b1a93781b
-
SHA256
0993c5335a17f17141e1be3f1936fa420e69c33bebedcd39d01bc527f6cd7d96
-
SHA512
bed2ed22e5759aa7d4beac74d0b3cfaf7a045c70dc3ab97c490b978a365b741fd6257a64cf3cdf3f0653febd1176cd5278e57347dbc11d55c9513aa2c7777e12
-
SSDEEP
12288:xmhMcbVbcxC9wcb8QyKJT2ediDP78OK1CALBuMOh7x:xmRVbcxCWKyKJT2Z4xi
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1072 4548 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4464 4548 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4876 4548 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4660 4548 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2680 4548 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3476 4548 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1612 4548 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5032 4548 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4980 4548 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4728 4548 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1064 4548 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 640 4548 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3148 4548 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3800 4548 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 768 4548 schtasks.exe 84 -
resource yara_rule behavioral2/memory/1660-1-0x00000000002E0000-0x00000000003B8000-memory.dmp dcrat behavioral2/files/0x00070000000234dc-11.dat dcrat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation 5614b417cca4217b0a1a4a4a081f9f43.exe -
Executes dropped EXE 1 IoCs
pid Process 4592 RuntimeBroker.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 30 pastebin.com 31 pastebin.com -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Mozilla Firefox\browser\VisualElements\27d1bcfc3c54e0 5614b417cca4217b0a1a4a4a081f9f43.exe File created C:\Program Files\Microsoft Office\PackageManifests\smss.exe 5614b417cca4217b0a1a4a4a081f9f43.exe File created C:\Program Files\Microsoft Office\PackageManifests\69ddcba757bf72 5614b417cca4217b0a1a4a4a081f9f43.exe File created C:\Program Files\Mozilla Firefox\browser\VisualElements\System.exe 5614b417cca4217b0a1a4a4a081f9f43.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings 5614b417cca4217b0a1a4a4a081f9f43.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4464 schtasks.exe 4876 schtasks.exe 3800 schtasks.exe 768 schtasks.exe 2680 schtasks.exe 4980 schtasks.exe 3148 schtasks.exe 1072 schtasks.exe 4660 schtasks.exe 5032 schtasks.exe 4728 schtasks.exe 640 schtasks.exe 3476 schtasks.exe 1612 schtasks.exe 1064 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1660 5614b417cca4217b0a1a4a4a081f9f43.exe 1660 5614b417cca4217b0a1a4a4a081f9f43.exe 1660 5614b417cca4217b0a1a4a4a081f9f43.exe 1660 5614b417cca4217b0a1a4a4a081f9f43.exe 1660 5614b417cca4217b0a1a4a4a081f9f43.exe 1660 5614b417cca4217b0a1a4a4a081f9f43.exe 1660 5614b417cca4217b0a1a4a4a081f9f43.exe 1660 5614b417cca4217b0a1a4a4a081f9f43.exe 1660 5614b417cca4217b0a1a4a4a081f9f43.exe 1660 5614b417cca4217b0a1a4a4a081f9f43.exe 4592 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1660 5614b417cca4217b0a1a4a4a081f9f43.exe Token: SeDebugPrivilege 4592 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2848 1660 5614b417cca4217b0a1a4a4a081f9f43.exe 100 PID 1660 wrote to memory of 2848 1660 5614b417cca4217b0a1a4a4a081f9f43.exe 100 PID 2848 wrote to memory of 3020 2848 cmd.exe 102 PID 2848 wrote to memory of 3020 2848 cmd.exe 102 PID 2848 wrote to memory of 4592 2848 cmd.exe 109 PID 2848 wrote to memory of 4592 2848 cmd.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5614b417cca4217b0a1a4a4a081f9f43.exe"C:\Users\Admin\AppData\Local\Temp\5614b417cca4217b0a1a4a4a081f9f43.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1UeGdALQqr.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3020
-
-
C:\Users\Default\Documents\RuntimeBroker.exe"C:\Users\Default\Documents\RuntimeBroker.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Documents\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default\Documents\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Documents\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Program Files\Microsoft Office\PackageManifests\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\PackageManifests\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office\PackageManifests\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "5614b417cca4217b0a1a4a4a081f9f435" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\5614b417cca4217b0a1a4a4a081f9f43.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "5614b417cca4217b0a1a4a4a081f9f43" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\5614b417cca4217b0a1a4a4a081f9f43.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "5614b417cca4217b0a1a4a4a081f9f435" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\5614b417cca4217b0a1a4a4a081f9f43.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Mozilla Firefox\browser\VisualElements\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\browser\VisualElements\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Program Files\Mozilla Firefox\browser\VisualElements\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
831KB
MD55614b417cca4217b0a1a4a4a081f9f43
SHA16597f30054da2fcea4f5c37121a0581b1a93781b
SHA2560993c5335a17f17141e1be3f1936fa420e69c33bebedcd39d01bc527f6cd7d96
SHA512bed2ed22e5759aa7d4beac74d0b3cfaf7a045c70dc3ab97c490b978a365b741fd6257a64cf3cdf3f0653febd1176cd5278e57347dbc11d55c9513aa2c7777e12
-
Filesize
209B
MD50045aa2fad12a0ab69ff15f46a654b9f
SHA1d2183da6e53ff9579eb0e5a49e1c35244835b8f0
SHA256e0cdcd5b3d2cbc26ceb9b8289811dd7e133f965a10594f7b43cbcd0ede937a94
SHA51265aa08a8c77d47910a8686d3df26a74628b3b6428afde835023a8c825d58b1e101a8d029482c0728d0f72df75458cf3ffd9294c2e1ffe8dfebe8c93dc5aee7ae