Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2025 21:31
Static task
static1
Behavioral task
behavioral1
Sample
WmiPrvSE.exe
Resource
win7-20241010-en
General
-
Target
WmiPrvSE.exe
-
Size
1.8MB
-
MD5
b5c4fa68d74ab47092a46241d6b10a16
-
SHA1
e754f10c51933c1ef98782fbf695e8f21198fe7e
-
SHA256
20e9dafaa42a6b6122ecc150622cf8aabe7a324527df144561de5ba0b486ab2a
-
SHA512
3ab67cb936cab9eb89bb8275309cbc5f56d7f03e554b5cc7bd54305c282b6e8a0feb4af8c1ebc7073d63c371444751c522b030748b4d57c28a768fd6cfdb5293
-
SSDEEP
24576:xoGjZgFKRWhFSJVRNkiPmfqbvi5iqOlK565cvugnpQS2/DS7w0KksrSTkdu+vNph:xav+RxbvikJj4npQS2/DSs6YVz7sD
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3668 740 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4704 740 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 924 740 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4916 740 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4848 740 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4836 740 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3012 740 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1000 740 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4124 740 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3376 740 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3720 740 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4680 740 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3564 740 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 952 740 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4420 740 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3880 740 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3076 740 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4516 740 schtasks.exe 91 -
Downloads MZ/PE file 1 IoCs
flow pid Process 32 1204 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\Control Panel\International\Geo\Nation WmiPrvSE.exe -
Executes dropped EXE 1 IoCs
pid Process 3864 MicrosoftEdgeUpdate.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files\dotnet\SppExtComObj.exe WmiPrvSE.exe File created C:\Program Files\dotnet\e1ef82546f0b02 WmiPrvSE.exe File created C:\Program Files\WindowsPowerShell\ea9f0e6c9e2dcd WmiPrvSE.exe File opened for modification C:\Program Files\WindowsPowerShell\Configuration\Schema\upfc.exe WmiPrvSE.exe File created C:\Program Files\WindowsPowerShell\Configuration\Schema\ea1d8f6d871115 WmiPrvSE.exe File created C:\Program Files\WindowsPowerShell\taskhostw.exe WmiPrvSE.exe File created C:\Program Files (x86)\Windows Mail\MicrosoftEdgeUpdate.exe WmiPrvSE.exe File created C:\Program Files (x86)\Windows Mail\cab239ce0bfa3a WmiPrvSE.exe File created C:\Program Files\WindowsPowerShell\Configuration\Schema\upfc.exe WmiPrvSE.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\DiagTrack\Scenarios\MicrosoftEdgeUpdate.exe WmiPrvSE.exe File created C:\Windows\DiagTrack\Scenarios\cab239ce0bfa3a WmiPrvSE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3444 MicrosoftEdgeUpdate.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000_Classes\Local Settings WmiPrvSE.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3376 schtasks.exe 3564 schtasks.exe 4516 schtasks.exe 4916 schtasks.exe 3720 schtasks.exe 4420 schtasks.exe 3076 schtasks.exe 924 schtasks.exe 4848 schtasks.exe 4680 schtasks.exe 3880 schtasks.exe 4124 schtasks.exe 952 schtasks.exe 3668 schtasks.exe 4704 schtasks.exe 4836 schtasks.exe 3012 schtasks.exe 1000 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 2976 WmiPrvSE.exe 3864 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2976 WmiPrvSE.exe Token: SeDebugPrivilege 3864 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2976 wrote to memory of 5000 2976 WmiPrvSE.exe 110 PID 2976 wrote to memory of 5000 2976 WmiPrvSE.exe 110 PID 5000 wrote to memory of 2388 5000 cmd.exe 112 PID 5000 wrote to memory of 2388 5000 cmd.exe 112 PID 5000 wrote to memory of 3900 5000 cmd.exe 113 PID 5000 wrote to memory of 3900 5000 cmd.exe 113 PID 5000 wrote to memory of 3864 5000 cmd.exe 114 PID 5000 wrote to memory of 3864 5000 cmd.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\WmiPrvSE.exe"C:\Users\Admin\AppData\Local\Temp\WmiPrvSE.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FtYfu7TQyM.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2388
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3900
-
-
C:\Windows\DiagTrack\Scenarios\MicrosoftEdgeUpdate.exe"C:\Windows\DiagTrack\Scenarios\MicrosoftEdgeUpdate.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MicrosoftEdgeUpdateM" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Mail\MicrosoftEdgeUpdate.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MicrosoftEdgeUpdate" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\MicrosoftEdgeUpdate.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MicrosoftEdgeUpdateM" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Mail\MicrosoftEdgeUpdate.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\Program Files\WindowsPowerShell\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 11 /tr "'C:\Program Files\WindowsPowerShell\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MicrosoftEdgeUpdateM" /sc MINUTE /mo 8 /tr "'C:\Windows\DiagTrack\Scenarios\MicrosoftEdgeUpdate.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MicrosoftEdgeUpdate" /sc ONLOGON /tr "'C:\Windows\DiagTrack\Scenarios\MicrosoftEdgeUpdate.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MicrosoftEdgeUpdateM" /sc MINUTE /mo 8 /tr "'C:\Windows\DiagTrack\Scenarios\MicrosoftEdgeUpdate.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Program Files\dotnet\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files\dotnet\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Program Files\dotnet\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 7 /tr "'C:\Program Files\WindowsPowerShell\Configuration\Schema\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Configuration\Schema\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:\Program Files\WindowsPowerShell\Configuration\Schema\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\AppData\Local\Temp\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\AppData\Local\Temp\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4516
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4ODkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTM2NTgwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjAwMDExMTMyIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3444
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5b5c4fa68d74ab47092a46241d6b10a16
SHA1e754f10c51933c1ef98782fbf695e8f21198fe7e
SHA25620e9dafaa42a6b6122ecc150622cf8aabe7a324527df144561de5ba0b486ab2a
SHA5123ab67cb936cab9eb89bb8275309cbc5f56d7f03e554b5cc7bd54305c282b6e8a0feb4af8c1ebc7073d63c371444751c522b030748b4d57c28a768fd6cfdb5293
-
Filesize
230B
MD5e3b5de98cb38c10b1ab9116f2152e60d
SHA1f3fe7030a07ce89e33fbb833b258e7500b6613f0
SHA2560d77fddf9f1eaa37a0ccc86c686d6281d7386060835ae581bc9a9f1891ee4588
SHA5124e32900ec16002d76cbac41f61f6e48d9d53a29ea06fc0a0c6112ebb29508d84936bfa38d59a9d30ac6ace9c7ba1150767828d28626f5dc9757fac6676603940