Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 06:42
Behavioral task
behavioral1
Sample
1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe
Resource
win10v2004-20241007-en
General
-
Target
1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe
-
Size
2.1MB
-
MD5
96affeab8e13743e57269977f1805472
-
SHA1
8935028d2abde57185acd3e1f59d831cc6ac5bc0
-
SHA256
1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459
-
SHA512
a8a1c5c302f6d51a7d390bf47ee0b4e2513498fec1081ffd2ec819133149c59c6b6bac7f6c8e7d7bd0e557c4f77f2789324cae8ccda90e1d60b3906b5d448fea
-
SSDEEP
49152:Cx55PUIP9xbGEfCErDBBDNvlbslAIETt1TIo3sa:klP9hAqXN6EHTj3sa
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 7 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2696 2824 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2552 2824 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2580 2824 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2688 2824 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2556 2824 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 2824 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2088 2824 schtasks.exe -
Processes:
resource yara_rule behavioral1/memory/2392-1-0x0000000000AD0000-0x0000000000CFC000-memory.dmp dcrat C:\Windows\Panther\setup.exe\WMIADAP.exe dcrat behavioral1/memory/1684-25-0x0000000001350000-0x000000000157C000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
Processes:
dllhost.exepid process 1684 dllhost.exe -
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Recovery\\1f276ee2-69f6-11ef-8b31-62cb582c238c\\wininit.exe\"" 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\dllhost.exe\"" 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\System32\\api-ms-win-core-sysinfo-l1-1-0\\spoolsv.exe\"" 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\System32\\wbem\\mswmdm\\WmiPrvSE.exe\"" 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\System32\\C_1026\\lsm.exe\"" 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WMIADAP = "\"C:\\Windows\\Panther\\setup.exe\\WMIADAP.exe\"" 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\OSPPSVC.exe\"" 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe -
Drops file in System32 directory 6 IoCs
Processes:
1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exedescription ioc process File created C:\Windows\System32\api-ms-win-core-sysinfo-l1-1-0\spoolsv.exe 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe File created C:\Windows\System32\api-ms-win-core-sysinfo-l1-1-0\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe File created C:\Windows\System32\wbem\mswmdm\WmiPrvSE.exe 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe File created C:\Windows\System32\wbem\mswmdm\24dbde2999530ef5fd907494bc374d663924116c 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe File created C:\Windows\System32\C_1026\lsm.exe 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe File created C:\Windows\System32\C_1026\101b941d020240259ca4912829b53995ad543df6 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe -
Drops file in Windows directory 2 IoCs
Processes:
1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exedescription ioc process File created C:\Windows\Panther\setup.exe\WMIADAP.exe 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe File created C:\Windows\Panther\setup.exe\75a57c1bdf437c0c81ad56e81f43c7323ed35745 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2556 schtasks.exe 2148 schtasks.exe 2088 schtasks.exe 2696 schtasks.exe 2552 schtasks.exe 2580 schtasks.exe 2688 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exedllhost.exepid process 2392 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe 1684 dllhost.exe 1684 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exedllhost.exedescription pid process Token: SeDebugPrivilege 2392 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe Token: SeDebugPrivilege 1684 dllhost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.execmd.exedescription pid process target process PID 2392 wrote to memory of 1896 2392 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe cmd.exe PID 2392 wrote to memory of 1896 2392 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe cmd.exe PID 2392 wrote to memory of 1896 2392 1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe cmd.exe PID 1896 wrote to memory of 844 1896 cmd.exe w32tm.exe PID 1896 wrote to memory of 844 1896 cmd.exe w32tm.exe PID 1896 wrote to memory of 844 1896 cmd.exe w32tm.exe PID 1896 wrote to memory of 1684 1896 cmd.exe dllhost.exe PID 1896 wrote to memory of 1684 1896 cmd.exe dllhost.exe PID 1896 wrote to memory of 1684 1896 cmd.exe dllhost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe"C:\Users\Admin\AppData\Local\Temp\1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HKxy6Fqr82.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:844
-
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\dllhost.exe"C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\dllhost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\api-ms-win-core-sysinfo-l1-1-0\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\mswmdm\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\C_1026\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Windows\Panther\setup.exe\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2088
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD5215f5d0e02df9f0937900ebb8d83391f
SHA140f51025bed6395bcba6b02d42509d808a996dbe
SHA256196911071750c58ed0326a1c02304e9038fea006baf1f787e5ad2fdd1c6b3d65
SHA512cc82b05be5357047dc2bae67e97f1926993467ef1cac20c9eb88073edbad74ee3f905c0daf97d784f42fad3ba1e34ef4d71f0b32675f9c4372f2ab3d04513b24
-
Filesize
2.1MB
MD596affeab8e13743e57269977f1805472
SHA18935028d2abde57185acd3e1f59d831cc6ac5bc0
SHA2561a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459
SHA512a8a1c5c302f6d51a7d390bf47ee0b4e2513498fec1081ffd2ec819133149c59c6b6bac7f6c8e7d7bd0e557c4f77f2789324cae8ccda90e1d60b3906b5d448fea