Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 17:45
Behavioral task
behavioral1
Sample
063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe
Resource
win10v2004-20241007-en
General
-
Target
063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe
-
Size
952KB
-
MD5
7146d0c354a5ffc4f39db58415c14022
-
SHA1
2aa91a6ae46fd1fb956e6c8efda7251025b6a90e
-
SHA256
063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f
-
SHA512
b1b799f42e04443097b7f94ee4273377fcad228cfde8e1a0ffbc2e28427a8ebd4e804be0bdafc3e40122dee2a19ac2f4baccd054dbe90b5609b1c945f2719fcf
-
SSDEEP
24576:u+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXXL:p8/KfRTKZ
Malware Config
Signatures
-
DcRat 19 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Windows\\System32\\wlanmsm\\taskhost.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe 2612 schtasks.exe 2640 schtasks.exe 2044 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\FirewallAPI\\csrss.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\FirewallAPI\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\System.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\System.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\FirewallAPI\\csrss.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe 2760 schtasks.exe 2952 schtasks.exe 1284 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\FirewallAPI\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\System.exe\", \"C:\\Windows\\System32\\wlanmsm\\taskhost.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Windows\\System32\\wlanmsm\\taskhost.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe 2236 schtasks.exe 2692 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\FirewallAPI\\csrss.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\System.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe 2124 schtasks.exe -
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\FirewallAPI\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\System.exe\", \"C:\\Windows\\System32\\wlanmsm\\taskhost.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\FirewallAPI\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\System.exe\", \"C:\\Windows\\System32\\wlanmsm\\taskhost.exe\", \"C:\\PerfLogs\\Admin\\explorer.exe\", \"C:\\Windows\\System32\\wbem\\wbemtest\\WmiPrvSE.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\FirewallAPI\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\System.exe\", \"C:\\Windows\\System32\\wlanmsm\\taskhost.exe\", \"C:\\PerfLogs\\Admin\\explorer.exe\", \"C:\\Windows\\System32\\wbem\\wbemtest\\WmiPrvSE.exe\", \"C:\\Windows\\System32\\NlsLexicons001d\\smss.exe\", \"C:\\PerfLogs\\Admin\\services.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\FirewallAPI\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\System.exe\", \"C:\\Windows\\System32\\wlanmsm\\taskhost.exe\", \"C:\\PerfLogs\\Admin\\explorer.exe\", \"C:\\Windows\\System32\\wbem\\wbemtest\\WmiPrvSE.exe\", \"C:\\Windows\\System32\\NlsLexicons001d\\smss.exe\", \"C:\\PerfLogs\\Admin\\services.exe\", \"C:\\Windows\\Performance\\WinSAT\\DataStore\\WmiPrvSE.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\FirewallAPI\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\System.exe\", \"C:\\Windows\\System32\\wlanmsm\\taskhost.exe\", \"C:\\PerfLogs\\Admin\\explorer.exe\", \"C:\\Windows\\System32\\wbem\\wbemtest\\WmiPrvSE.exe\", \"C:\\Windows\\System32\\NlsLexicons001d\\smss.exe\", \"C:\\PerfLogs\\Admin\\services.exe\", \"C:\\Windows\\Performance\\WinSAT\\DataStore\\WmiPrvSE.exe\", \"C:\\Windows\\twain\\explorer.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\FirewallAPI\\csrss.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\FirewallAPI\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\System.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\FirewallAPI\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\System.exe\", \"C:\\Windows\\System32\\wlanmsm\\taskhost.exe\", \"C:\\PerfLogs\\Admin\\explorer.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\FirewallAPI\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\System.exe\", \"C:\\Windows\\System32\\wlanmsm\\taskhost.exe\", \"C:\\PerfLogs\\Admin\\explorer.exe\", \"C:\\Windows\\System32\\wbem\\wbemtest\\WmiPrvSE.exe\", \"C:\\Windows\\System32\\NlsLexicons001d\\smss.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe -
Process spawned unexpected child process 9 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 2884 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 2884 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 2884 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2952 2884 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 2884 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1284 2884 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2236 2884 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2124 2884 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2692 2884 schtasks.exe 30 -
UAC bypass 3 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WmiPrvSE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" WmiPrvSE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" WmiPrvSE.exe -
resource yara_rule behavioral1/memory/1680-1-0x00000000002D0000-0x00000000003C4000-memory.dmp dcrat behavioral1/files/0x0006000000019401-22.dat dcrat behavioral1/files/0x00090000000173fb-43.dat dcrat behavioral1/files/0x0008000000017403-65.dat dcrat behavioral1/memory/2664-66-0x0000000001380000-0x0000000001474000-memory.dmp dcrat behavioral1/memory/1340-98-0x0000000000C80000-0x0000000000D74000-memory.dmp dcrat -
Executes dropped EXE 2 IoCs
pid Process 2664 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe 1340 WmiPrvSE.exe -
Adds Run key to start application 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\PerfLogs\\Admin\\explorer.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\PerfLogs\\Admin\\services.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Windows\\twain\\explorer.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\System32\\NlsLexicons001d\\smss.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\Performance\\WinSAT\\DataStore\\WmiPrvSE.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\System.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Windows\\System32\\wlanmsm\\taskhost.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\PerfLogs\\Admin\\explorer.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Windows\\System32\\wlanmsm\\taskhost.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\PerfLogs\\Admin\\services.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\Performance\\WinSAT\\DataStore\\WmiPrvSE.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\FirewallAPI\\csrss.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\FirewallAPI\\csrss.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\System.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Windows\\twain\\explorer.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\System32\\wbem\\wbemtest\\WmiPrvSE.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\System32\\wbem\\wbemtest\\WmiPrvSE.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\System32\\NlsLexicons001d\\smss.exe\"" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe -
Checks whether UAC is enabled 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WmiPrvSE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WmiPrvSE.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe -
Drops file in System32 directory 16 IoCs
description ioc Process File created C:\Windows\System32\FirewallAPI\csrss.exe 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File opened for modification C:\Windows\System32\FirewallAPI\csrss.exe 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File created C:\Windows\System32\wbem\wbemtest\24dbde2999530ef5fd907494bc374d663924116c 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File opened for modification C:\Windows\System32\NlsLexicons001d\smss.exe 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File created C:\Windows\System32\FirewallAPI\886983d96e3d3e31032c679b2d4ea91b6c05afef 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File created C:\Windows\System32\wlanmsm\taskhost.exe 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File created C:\Windows\System32\wlanmsm\b75386f1303e64d8139363b71e44ac16341adf4e 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File opened for modification C:\Windows\System32\FirewallAPI\RCX987A.tmp 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File created C:\Windows\System32\wbem\wbemtest\WmiPrvSE.exe 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File created C:\Windows\System32\NlsLexicons001d\smss.exe 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File created C:\Windows\System32\NlsLexicons001d\69ddcba757bf72f7d36c464c71f42baab150b2b9 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File opened for modification C:\Windows\System32\FirewallAPI\RCX987B.tmp 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File opened for modification C:\Windows\System32\wlanmsm\RCX9CF1.tmp 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File opened for modification C:\Windows\System32\wlanmsm\RCX9CF2.tmp 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File opened for modification C:\Windows\System32\wlanmsm\taskhost.exe 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File opened for modification C:\Windows\System32\wbem\wbemtest\WmiPrvSE.exe 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\twain\7a0fd90576e08807bde2cc57bcf9854bbce05fe3 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File opened for modification C:\Windows\Performance\WinSAT\DataStore\WmiPrvSE.exe 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File opened for modification C:\Windows\twain\explorer.exe 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File created C:\Windows\Performance\WinSAT\DataStore\WmiPrvSE.exe 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File created C:\Windows\Performance\WinSAT\DataStore\24dbde2999530ef5fd907494bc374d663924116c 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe File created C:\Windows\twain\explorer.exe 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2760 schtasks.exe 2612 schtasks.exe 2952 schtasks.exe 2044 schtasks.exe 2124 schtasks.exe 2640 schtasks.exe 1284 schtasks.exe 2236 schtasks.exe 2692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1680 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe 2664 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe 2664 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe 2664 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1680 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Token: SeDebugPrivilege 2664 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Token: SeDebugPrivilege 1340 WmiPrvSE.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1692 1680 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe 34 PID 1680 wrote to memory of 1692 1680 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe 34 PID 1680 wrote to memory of 1692 1680 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe 34 PID 1692 wrote to memory of 3056 1692 cmd.exe 36 PID 1692 wrote to memory of 3056 1692 cmd.exe 36 PID 1692 wrote to memory of 3056 1692 cmd.exe 36 PID 1692 wrote to memory of 2664 1692 cmd.exe 37 PID 1692 wrote to memory of 2664 1692 cmd.exe 37 PID 1692 wrote to memory of 2664 1692 cmd.exe 37 PID 2664 wrote to memory of 1036 2664 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe 44 PID 2664 wrote to memory of 1036 2664 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe 44 PID 2664 wrote to memory of 1036 2664 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe 44 PID 1036 wrote to memory of 3008 1036 cmd.exe 46 PID 1036 wrote to memory of 3008 1036 cmd.exe 46 PID 1036 wrote to memory of 3008 1036 cmd.exe 46 PID 1036 wrote to memory of 1340 1036 cmd.exe 48 PID 1036 wrote to memory of 1340 1036 cmd.exe 48 PID 1036 wrote to memory of 1340 1036 cmd.exe 48 -
System policy modification 1 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WmiPrvSE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" WmiPrvSE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" WmiPrvSE.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe"C:\Users\Admin\AppData\Local\Temp\063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe"1⤵
- DcRat
- Modifies WinLogon for persistence
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1680 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XZyoUzseb4.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe"C:\Users\Admin\AppData\Local\Temp\063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2664 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\DA0bDZCT7n.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵PID:3008
-
-
C:\Windows\Performance\WinSAT\DataStore\WmiPrvSE.exe"C:\Windows\Performance\WinSAT\DataStore\WmiPrvSE.exe"5⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1340
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\FirewallAPI\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\wlanmsm\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\PerfLogs\Admin\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\wbemtest\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\NlsLexicons001d\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\PerfLogs\Admin\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\Performance\WinSAT\DataStore\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\twain\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2692
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
952KB
MD57161f0bdf6d806032f4f1878d85f5eed
SHA11c74efac9e71e449e759dc6ccc837e9bea29e855
SHA256e7241b783082b38d106cb72da8fb5b23ae52de969482cdcc2bce9dcc949476c5
SHA512fbb0ad8edf5e1c67b07b76f484824235d5ca9833f7bde6efe93138a71aca52ef278c914598233b70a7640450ab76fbec517475f46193a2b02805e696209e0764
-
C:\Users\Admin\AppData\Local\Temp\063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f.exe
Filesize952KB
MD57146d0c354a5ffc4f39db58415c14022
SHA12aa91a6ae46fd1fb956e6c8efda7251025b6a90e
SHA256063f0ebe162695ca595299a607634b1a4678527542053d73a85106d0de5f329f
SHA512b1b799f42e04443097b7f94ee4273377fcad228cfde8e1a0ffbc2e28427a8ebd4e804be0bdafc3e40122dee2a19ac2f4baccd054dbe90b5609b1c945f2719fcf
-
Filesize
216B
MD52ab82d533d0d096b63ba8339d85c8c7e
SHA1f2206d5521090295ae96917f0879ef8ac40c66c7
SHA256f72ed94934a6dd87629897f93a187343f4d363c64969fee8f4e9e0b0526637dc
SHA5121c5b66da6db9f70bf05280f0456f4f69980e737a7764f6af066610dccd50aab07f0b855930abfeee38470ff99f35f80b3310b083ab0865fa97f5e53b1ac11981
-
Filesize
952KB
MD52441dd3f0b62cd42f120a14c333cb3f0
SHA177cf4605fddd9e854039648c028810a04c43427b
SHA256fe78f6e2b4e88176dab282d4b56de4d8038f497a11f2ffcc49c3d33149309707
SHA5124ab200a53e2b58b2ee95ba9808f720683ec55d8b9449f21a044bd804925653dde29019c91f64178f91b9caec5ef5bbf0ebf8a35ab2a937780da7e6af2d9a4b48
-
Filesize
266B
MD5539e38247f556699d0d06093b08551c8
SHA163851505f1aa2eed8329cd4c585bdc6ca57731e0
SHA25655b0fe9908260d32e4d7349c82c599fc3450707fc937a3ee0b98a5fd7a35bcb4
SHA512ab47a51f5e8143f6fcf29047a882b2c08dfe7e5b9ac3883f16e949b768182c0c595adbb7f169f634a79143aed663a1a57dcfbe4aedd722a0bb3e852a4f9dfe5e