Resubmissions
16-11-2024 10:31
241116-mkna4sylcm 10Analysis
-
max time kernel
7s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
16-11-2024 10:31
Behavioral task
behavioral1
Sample
Bridgewebsvc.exe
Resource
win11-20241007-en
General
-
Target
Bridgewebsvc.exe
-
Size
828KB
-
MD5
fddea23e803e9e5de212e4c0475c8f93
-
SHA1
c4426bf36ce54917155da2bfbec1508c5a799664
-
SHA256
f014b4dd1600fb5ecd92de55165573415c2d7ee184a4f70f2f975ee7909150f6
-
SHA512
05459fc75998ee306e8de7e544aaf744e5c6e1930dcb7e02b94a566a7ad6e874a9fe50a78a1da50b4e7110282e49353f8ced586117d772b600b84d09ee070591
-
SSDEEP
12288:F+RK+UfXST5/rKMyFckcb8M41AT0z/GAFPz3DhsHxrofdV:5STuMMATKPTVgxr4
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
Processes:
Bridgewebsvc.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\backgroundTaskHost.exe\"" Bridgewebsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\backgroundTaskHost.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\uk-UA\\dllhost.exe\"" Bridgewebsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\backgroundTaskHost.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\uk-UA\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\"" Bridgewebsvc.exe -
Process spawned unexpected child process 9 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1744 448 schtasks.exe 79 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4436 448 schtasks.exe 79 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5064 448 schtasks.exe 79 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3736 448 schtasks.exe 79 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2932 448 schtasks.exe 79 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2096 448 schtasks.exe 79 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4372 448 schtasks.exe 79 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 132 448 schtasks.exe 79 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1108 448 schtasks.exe 79 -
Processes:
resource yara_rule behavioral1/memory/3480-1-0x0000000000BA0000-0x0000000000C76000-memory.dmp dcrat behavioral1/files/0x001c00000002ab59-17.dat dcrat -
Executes dropped EXE 1 IoCs
Processes:
backgroundTaskHost.exepid Process 664 backgroundTaskHost.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
Bridgewebsvc.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000\Software\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Windows\\DigitalLocker\\en-US\\backgroundTaskHost.exe\"" Bridgewebsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Windows\\DigitalLocker\\en-US\\backgroundTaskHost.exe\"" Bridgewebsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\uk-UA\\dllhost.exe\"" Bridgewebsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\uk-UA\\dllhost.exe\"" Bridgewebsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000\Software\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\"" Bridgewebsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\"" Bridgewebsvc.exe -
Drops file in Program Files directory 3 IoCs
Processes:
Bridgewebsvc.exedescription ioc Process File created C:\Program Files\WindowsApps\Microsoft.Paint_10.2104.17.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\sppsvc.exe Bridgewebsvc.exe File created C:\Program Files (x86)\Windows Photo Viewer\uk-UA\dllhost.exe Bridgewebsvc.exe File created C:\Program Files (x86)\Windows Photo Viewer\uk-UA\5940a34987c991 Bridgewebsvc.exe -
Drops file in Windows directory 3 IoCs
Processes:
Bridgewebsvc.exedescription ioc Process File created C:\Windows\DigitalLocker\en-US\backgroundTaskHost.exe Bridgewebsvc.exe File opened for modification C:\Windows\DigitalLocker\en-US\backgroundTaskHost.exe Bridgewebsvc.exe File created C:\Windows\DigitalLocker\en-US\eddb19405b7ce1 Bridgewebsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
Bridgewebsvc.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings Bridgewebsvc.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 1744 schtasks.exe 5064 schtasks.exe 2932 schtasks.exe 2096 schtasks.exe 132 schtasks.exe 4436 schtasks.exe 3736 schtasks.exe 4372 schtasks.exe 1108 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Bridgewebsvc.exebackgroundTaskHost.exepid Process 3480 Bridgewebsvc.exe 3480 Bridgewebsvc.exe 3480 Bridgewebsvc.exe 664 backgroundTaskHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Bridgewebsvc.exebackgroundTaskHost.exedescription pid Process Token: SeDebugPrivilege 3480 Bridgewebsvc.exe Token: SeDebugPrivilege 664 backgroundTaskHost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Bridgewebsvc.execmd.exedescription pid Process procid_target PID 3480 wrote to memory of 3820 3480 Bridgewebsvc.exe 89 PID 3480 wrote to memory of 3820 3480 Bridgewebsvc.exe 89 PID 3820 wrote to memory of 732 3820 cmd.exe 91 PID 3820 wrote to memory of 732 3820 cmd.exe 91 PID 3820 wrote to memory of 664 3820 cmd.exe 93 PID 3820 wrote to memory of 664 3820 cmd.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bridgewebsvc.exe"C:\Users\Admin\AppData\Local\Temp\Bridgewebsvc.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uOviiU4MXS.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:732
-
-
C:\Recovery\WindowsRE\backgroundTaskHost.exe"C:\Recovery\WindowsRE\backgroundTaskHost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Windows\DigitalLocker\en-US\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\DigitalLocker\en-US\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Windows\DigitalLocker\en-US\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Photo Viewer\uk-UA\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\uk-UA\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Photo Viewer\uk-UA\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1108
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD5fddea23e803e9e5de212e4c0475c8f93
SHA1c4426bf36ce54917155da2bfbec1508c5a799664
SHA256f014b4dd1600fb5ecd92de55165573415c2d7ee184a4f70f2f975ee7909150f6
SHA51205459fc75998ee306e8de7e544aaf744e5c6e1930dcb7e02b94a566a7ad6e874a9fe50a78a1da50b4e7110282e49353f8ced586117d772b600b84d09ee070591
-
Filesize
209B
MD5c7e9be07c0a4da46e774a084e78caa7a
SHA1033f70a926040cb3bbd0cc176e18b18066cff4ed
SHA256ed658d11a20c24bf795d1084e272e217c74a0dd550f7fdab29b7ffb7f2a5c273
SHA51209a55667b1dba441757a3266721fd999d6c822b7168c8587805040f127686e8c5812900e699582ed1702659ab6e5b046e919c2ee3e1fb4d7619a402d4eafde5f