Analysis

  • max time kernel
    109s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2023 15:21

General

  • Target

    c1d0b2c516e0ccd591338611ec76efb6c26ba1731de37c50c7c443bdb027c2a2.exe

  • Size

    5.7MB

  • MD5

    9ca968e7fe7c40a6324e047ccca6a7d6

  • SHA1

    c48a0f1bbcf242e50b5239c72bfcd32dd64eaad7

  • SHA256

    c1d0b2c516e0ccd591338611ec76efb6c26ba1731de37c50c7c443bdb027c2a2

  • SHA512

    9e33e3584dacc531516bb98ead6a151c250c82f3518d2b3c44347ed2fee2f99285457f9a1d8752bc06ea48dfee267a07a4ce834d7155766352930bcc65c34b98

  • SSDEEP

    98304:ZTEWU8jUj8sS/MZIZPP0G/tY1QWDIJbjRH5ux9fgAfBmRGUU3CF/5NCDNxX5EGVE:pUlIsGMZEP8G/tmQGyjRUx9hBmUeIFC1

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1d0b2c516e0ccd591338611ec76efb6c26ba1731de37c50c7c443bdb027c2a2.exe
    "C:\Users\Admin\AppData\Local\Temp\c1d0b2c516e0ccd591338611ec76efb6c26ba1731de37c50c7c443bdb027c2a2.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=c1d0b2c516e0ccd591338611ec76efb6c26ba1731de37c50c7c443bdb027c2a2.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1076 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0X1KZSGR.txt

    Filesize

    607B

    MD5

    6aaf0e437c9dcb8b4a951b720777534e

    SHA1

    770429bb6d016a7f94cb712184287b64c75acb0c

    SHA256

    5a76e19c0a9180da924142213f772bc21c66cdad5df6f35bbfec9926dea1b91f

    SHA512

    443d220dd9a7f16b9e2ca11f77206ae468aacaac4699349cbafc717d59a097b526d23ba566b6ac0037bc5770baf5999fef4ec714691554f9701e103675a023a5

  • memory/1788-54-0x0000000076321000-0x0000000076323000-memory.dmp

    Filesize

    8KB

  • memory/1788-55-0x00000000011F0000-0x0000000001E3C000-memory.dmp

    Filesize

    12.3MB

  • memory/1788-56-0x0000000077660000-0x00000000777E0000-memory.dmp

    Filesize

    1.5MB

  • memory/1788-59-0x00000000011F0000-0x0000000001E3C000-memory.dmp

    Filesize

    12.3MB

  • memory/1788-60-0x0000000077660000-0x00000000777E0000-memory.dmp

    Filesize

    1.5MB