Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26/04/2023, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
61d808a05018ab4e9a13e6d2e63c2bce.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
61d808a05018ab4e9a13e6d2e63c2bce.exe
Resource
win10v2004-20230220-en
General
-
Target
61d808a05018ab4e9a13e6d2e63c2bce.exe
-
Size
736KB
-
MD5
61d808a05018ab4e9a13e6d2e63c2bce
-
SHA1
b3a88a306df5dde704cb8517f2a68bd9db342e88
-
SHA256
976a67850c64de6af6be371497bc0fef9ab5071e551c4fdca555a7bea46e5025
-
SHA512
8aca17e5d47e7bbc5ef675d82d02d3ee015fbe1d1aa5aeade844f46728c9af8f2b04aef69aa85365601aee5035843f93729f1eafe00433ca1e55920208c55612
-
SSDEEP
12288:wGDhiziVs+7TTaJ7WD9GdYBlEkyVhAsYp7vz/zYEB1C2QzAiWOh:wGtgiC+7TTaMBlCgPYwA2QzAi/h
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
resource yara_rule behavioral1/memory/1208-56-0x0000000000400000-0x0000000000490000-memory.dmp dcrat behavioral1/memory/1208-62-0x0000000000400000-0x0000000000490000-memory.dmp dcrat behavioral1/memory/1208-63-0x0000000000400000-0x0000000000490000-memory.dmp dcrat -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1780 set thread context of 1208 1780 61d808a05018ab4e9a13e6d2e63c2bce.exe 27 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1208 AppLaunch.exe 1208 AppLaunch.exe 1208 AppLaunch.exe 1208 AppLaunch.exe 1208 AppLaunch.exe 1208 AppLaunch.exe 1208 AppLaunch.exe 1208 AppLaunch.exe 1208 AppLaunch.exe 1208 AppLaunch.exe 1208 AppLaunch.exe 1208 AppLaunch.exe 1208 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1208 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1780 wrote to memory of 1208 1780 61d808a05018ab4e9a13e6d2e63c2bce.exe 27 PID 1780 wrote to memory of 1208 1780 61d808a05018ab4e9a13e6d2e63c2bce.exe 27 PID 1780 wrote to memory of 1208 1780 61d808a05018ab4e9a13e6d2e63c2bce.exe 27 PID 1780 wrote to memory of 1208 1780 61d808a05018ab4e9a13e6d2e63c2bce.exe 27 PID 1780 wrote to memory of 1208 1780 61d808a05018ab4e9a13e6d2e63c2bce.exe 27 PID 1780 wrote to memory of 1208 1780 61d808a05018ab4e9a13e6d2e63c2bce.exe 27 PID 1780 wrote to memory of 1208 1780 61d808a05018ab4e9a13e6d2e63c2bce.exe 27 PID 1780 wrote to memory of 1208 1780 61d808a05018ab4e9a13e6d2e63c2bce.exe 27 PID 1780 wrote to memory of 1208 1780 61d808a05018ab4e9a13e6d2e63c2bce.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\61d808a05018ab4e9a13e6d2e63c2bce.exe"C:\Users\Admin\AppData\Local\Temp\61d808a05018ab4e9a13e6d2e63c2bce.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208
-