Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 03:55
Static task
static1
Behavioral task
behavioral1
Sample
26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe
Resource
win10v2004-20241007-en
General
-
Target
26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe
-
Size
2.9MB
-
MD5
19aefa5703872789a85c9c8e7c123aca
-
SHA1
5207463f1ec2987e68c97399571c4ef52763bacc
-
SHA256
26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e
-
SHA512
5117be7adb0b42505ce453a3f6e3cb73ed5b71c186ff660d7cceb92b11ab89bbf897f48a3a05d19e63fe69361bc58276c99b1d93eb3173c01f379a11b0850c70
-
SSDEEP
49152:7wefjxPCEjdphA8ZLUj+khAHYevjm7rDeqYQjmCYi78jFg:7zqCA85UuHYeLu0PCYi78a
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2724 2808 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2168 2808 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2836 2808 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1700 2808 schtasks.exe 31 -
resource yara_rule behavioral1/memory/2232-1-0x0000000000C50000-0x0000000001298000-memory.dmp dcrat behavioral1/memory/2232-2-0x0000000000C50000-0x0000000001298000-memory.dmp dcrat behavioral1/memory/2232-22-0x0000000000C50000-0x0000000001298000-memory.dmp dcrat behavioral1/memory/1908-24-0x0000000001260000-0x00000000018A8000-memory.dmp dcrat behavioral1/memory/1908-25-0x0000000001260000-0x00000000018A8000-memory.dmp dcrat behavioral1/memory/1908-28-0x0000000001260000-0x00000000018A8000-memory.dmp dcrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WmiPrvSE.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WmiPrvSE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WmiPrvSE.exe -
Executes dropped EXE 1 IoCs
pid Process 1908 WmiPrvSE.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine WmiPrvSE.exe -
Loads dropped DLL 2 IoCs
pid Process 2232 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 2232 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\System32\\mmres\\lsm.exe\"" 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\oleres\\dllhost.exe\"" 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\System32\\wbem\\wzcdlg\\WmiPrvSE.exe\"" 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WMIADAP = "\"C:\\PerfLogs\\Admin\\WMIADAP.exe\"" 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\wbem\wzcdlg\WmiPrvSE.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\wbem\wzcdlg\24dbde2999530ef5fd907494bc374d663924116c 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\mmres\lsm.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File opened for modification C:\Windows\SysWOW64\mmres\lsm.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\mmres\101b941d020240259ca4912829b53995ad543df6 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\oleres\dllhost.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\oleres\5940a34987c99120d96dace90a3f93f329dcad63 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2232 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 1908 WmiPrvSE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WmiPrvSE.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2724 schtasks.exe 2168 schtasks.exe 2836 schtasks.exe 1700 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2232 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 2232 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 1908 WmiPrvSE.exe 1908 WmiPrvSE.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2232 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Token: SeDebugPrivilege 1908 WmiPrvSE.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1908 2232 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 36 PID 2232 wrote to memory of 1908 2232 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 36 PID 2232 wrote to memory of 1908 2232 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 36 PID 2232 wrote to memory of 1908 2232 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe"C:\Users\Admin\AppData\Local\Temp\26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\wbem\wzcdlg\WmiPrvSE.exe"C:\Windows\System32\wbem\wzcdlg\WmiPrvSE.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\mmres\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\oleres\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\wzcdlg\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\PerfLogs\Admin\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1700
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD519aefa5703872789a85c9c8e7c123aca
SHA15207463f1ec2987e68c97399571c4ef52763bacc
SHA25626c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e
SHA5125117be7adb0b42505ce453a3f6e3cb73ed5b71c186ff660d7cceb92b11ab89bbf897f48a3a05d19e63fe69361bc58276c99b1d93eb3173c01f379a11b0850c70