Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 19:05
Behavioral task
behavioral1
Sample
WaveCrackByTq893.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
WaveCrackByTq893.exe
Resource
win10v2004-20241007-en
General
-
Target
WaveCrackByTq893.exe
-
Size
2.6MB
-
MD5
96fc82b7358cd1693d8e1a98a559a3ac
-
SHA1
86aa0c234c4e9b5887239d3693ff9e43900c7411
-
SHA256
db584544b07377ff63a4d73244080aa00ed64f4f358419d879b068c56fcee837
-
SHA512
da0d7898e599b4fd96a1d6326bcad4880708679e0864d46a47653f4c96ff8f401fb72a161112511c4ac4f2eec50fc18e06367bb9a67ac1a7103727d1969fb357
-
SSDEEP
49152:UbA30ad1pTKLPbJfcBxP2KQLLzvQsTSKmwFWUjUY1:Ub01p2LlfcLP2KwzvQynWUQM
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 12 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2356 576 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1704 576 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2404 576 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2676 576 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2372 576 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2248 576 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2184 576 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2172 576 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2528 576 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2928 576 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2888 576 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2104 576 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x00060000000186c5-15.dat dcrat behavioral1/memory/2812-18-0x0000000000F40000-0x0000000001192000-memory.dmp dcrat behavioral1/memory/2932-40-0x0000000000980000-0x0000000000BD2000-memory.dmp dcrat -
Executes dropped EXE 2 IoCs
pid Process 2812 providerDllcommon.exe 2932 WmiPrvSE.exe -
Loads dropped DLL 2 IoCs
pid Process 2712 cmd.exe 2712 cmd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Media Player\Skins\winlogon.exe providerDllcommon.exe File created C:\Program Files (x86)\Windows Media Player\Skins\cc11b995f2a76d providerDllcommon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaveCrackByTq893.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2356 schtasks.exe 1704 schtasks.exe 2404 schtasks.exe 2676 schtasks.exe 2372 schtasks.exe 2248 schtasks.exe 2184 schtasks.exe 2172 schtasks.exe 2528 schtasks.exe 2928 schtasks.exe 2888 schtasks.exe 2104 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2812 providerDllcommon.exe 2932 WmiPrvSE.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2812 providerDllcommon.exe Token: SeDebugPrivilege 2932 WmiPrvSE.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2852 2944 WaveCrackByTq893.exe 30 PID 2944 wrote to memory of 2852 2944 WaveCrackByTq893.exe 30 PID 2944 wrote to memory of 2852 2944 WaveCrackByTq893.exe 30 PID 2944 wrote to memory of 2852 2944 WaveCrackByTq893.exe 30 PID 2944 wrote to memory of 2884 2944 WaveCrackByTq893.exe 31 PID 2944 wrote to memory of 2884 2944 WaveCrackByTq893.exe 31 PID 2944 wrote to memory of 2884 2944 WaveCrackByTq893.exe 31 PID 2944 wrote to memory of 2884 2944 WaveCrackByTq893.exe 31 PID 2852 wrote to memory of 2712 2852 WScript.exe 32 PID 2852 wrote to memory of 2712 2852 WScript.exe 32 PID 2852 wrote to memory of 2712 2852 WScript.exe 32 PID 2852 wrote to memory of 2712 2852 WScript.exe 32 PID 2712 wrote to memory of 2812 2712 cmd.exe 34 PID 2712 wrote to memory of 2812 2712 cmd.exe 34 PID 2712 wrote to memory of 2812 2712 cmd.exe 34 PID 2712 wrote to memory of 2812 2712 cmd.exe 34 PID 2812 wrote to memory of 2932 2812 providerDllcommon.exe 48 PID 2812 wrote to memory of 2932 2812 providerDllcommon.exe 48 PID 2812 wrote to memory of 2932 2812 providerDllcommon.exe 48 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\WaveCrackByTq893.exe"C:\Users\Admin\AppData\Local\Temp\WaveCrackByTq893.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\blockProviderreviewwin\4Qgcue5Dj.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\blockProviderreviewwin\9wAH2eg9ZDmdczf.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\blockProviderreviewwin\providerDllcommon.exe"C:\blockProviderreviewwin\providerDllcommon.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\blockProviderreviewwin\WmiPrvSE.exe"C:\blockProviderreviewwin\WmiPrvSE.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\blockProviderreviewwin\file.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\blockProviderreviewwin\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\blockProviderreviewwin\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\blockProviderreviewwin\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\blockProviderreviewwin\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\blockProviderreviewwin\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\blockProviderreviewwin\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Media Player\Skins\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\Skins\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Media Player\Skins\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214B
MD5f2ec303cdbe64b3590ced50784d1c467
SHA10c1f4f24916f2c0da0d62e5a44ab5ab43f223db6
SHA256292b3ef1293df2d68408b56d38effb8cca9eac785f712a3f5644e093b4829513
SHA512827509437fd6d0c5810862ef6fac547d52fa6aa6a765ee9d02d11ffb3e8233d5b6e824c70b436731eda6c566dfad6f3c404cc0f43c7cad07614545255077d624
-
Filesize
49B
MD50b3eb634d6f6debee46880897366a475
SHA116922ddfb8e7bf97fbd4f8750ced6c9c8b193bd6
SHA256da578fc2bc197e72ec660cc06edc6638d8eb9a7e8571a0e4cb43eca9465a04ae
SHA51295c61b28c796ccc4720e4603ece203681b288cca0527e3d246741baf94492970910c3592c7867c6397d003b5ba056532a9b4df06e47ba36f3c384f1abb9db68d
-
Filesize
34B
MD5677cc4360477c72cb0ce00406a949c61
SHA1b679e8c3427f6c5fc47c8ac46cd0e56c9424de05
SHA256f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b
SHA5127cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a
-
Filesize
2.3MB
MD50a01395b434c2d2af59f90aaceb1c11c
SHA160ed7515bc12b7537ac99578d663ec57069aec82
SHA256570e798f1a2acc51e1f6d613e025ab35dc488377c6c4a3f7ef4de1f16bc0f808
SHA512dfaa0e66e5cd0550adc7a30464f9124799d7c5d50815836ca441e2bc54c362816d251a362bf142dd8604924c408ab838b2ac8c3bfcac75e385848b30399dffa9