Analysis

  • max time kernel
    57s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    20-05-2023 21:14

General

  • Target

    ChatGPT-4 Online.exe

  • Size

    1.2MB

  • MD5

    88f8bb1fa6bdda82ff9e4150e5084533

  • SHA1

    daa56b740fde8da38580c1f053e4511d20a5b733

  • SHA256

    8a6672b8b7165db85a63750a12a89f8c0d55f7f2a98042f25be8740324469ecc

  • SHA512

    8add946ceee5e3b8440b1be7ce2eedb84c70fa72eaaecacfa00e214660743bebec22a72056313ea66c287ab5fe9b36a53593cc8d7567bafb11db40dfa2c1912b

  • SSDEEP

    24576:lgZXoZUTVdt7KP1r0tNH7zaWHXw6uyRZ3gVb1s7qagNqT083VxMa:Q6CNb2W4hO7j083Vxv

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • .NET Reactor proctector 14 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ChatGPT-4 Online.exe
    "C:\Users\Admin\AppData\Local\Temp\ChatGPT-4 Online.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:432
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\JCnMdX7E06.bat"
          4⤵
            PID:1188
            • C:\Windows\SysWOW64\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1352
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                6⤵
                  PID:476
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                5⤵
                  PID:1092
          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe"
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1668
            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe
              "C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe"
              3⤵
              • Executes dropped EXE
              PID:584
            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe
              "C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe"
              3⤵
              • Drops startup file
              • Executes dropped EXE
              PID:440
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          1⤵
            PID:1512
          • C:\Windows\system32\AUDIODG.EXE
            C:\Windows\system32\AUDIODG.EXE 0x478
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1928

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Discovery

          System Information Discovery

          1
          T1082

          Command and Control

          Web Service

          1
          T1102

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exe
            Filesize

            793KB

            MD5

            3522d7d178bf7e584590a2e91b322c9b

            SHA1

            2300feb56b604e59b68089e08b58cb36a1e40049

            SHA256

            7f1db40aeb5d489f740bfda8303d4be39d47269bd0b0b3b0a6bef847fda9cdeb

            SHA512

            b7441e645f140ebb50c08f653a86446717c64c451711cd70595a6f57bfa4551cf329958d67e83c8da0bbe19958b353bde8bf79ca6f7eef8593360536eed344b5

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exe
            Filesize

            793KB

            MD5

            3522d7d178bf7e584590a2e91b322c9b

            SHA1

            2300feb56b604e59b68089e08b58cb36a1e40049

            SHA256

            7f1db40aeb5d489f740bfda8303d4be39d47269bd0b0b3b0a6bef847fda9cdeb

            SHA512

            b7441e645f140ebb50c08f653a86446717c64c451711cd70595a6f57bfa4551cf329958d67e83c8da0bbe19958b353bde8bf79ca6f7eef8593360536eed344b5

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exe
            Filesize

            793KB

            MD5

            3522d7d178bf7e584590a2e91b322c9b

            SHA1

            2300feb56b604e59b68089e08b58cb36a1e40049

            SHA256

            7f1db40aeb5d489f740bfda8303d4be39d47269bd0b0b3b0a6bef847fda9cdeb

            SHA512

            b7441e645f140ebb50c08f653a86446717c64c451711cd70595a6f57bfa4551cf329958d67e83c8da0bbe19958b353bde8bf79ca6f7eef8593360536eed344b5

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe
            Filesize

            86KB

            MD5

            e1e5c813becf6216ea98a713202b74fa

            SHA1

            20ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5

            SHA256

            4ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400

            SHA512

            3a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe
            Filesize

            86KB

            MD5

            e1e5c813becf6216ea98a713202b74fa

            SHA1

            20ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5

            SHA256

            4ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400

            SHA512

            3a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe
            Filesize

            86KB

            MD5

            e1e5c813becf6216ea98a713202b74fa

            SHA1

            20ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5

            SHA256

            4ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400

            SHA512

            3a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe
            Filesize

            86KB

            MD5

            e1e5c813becf6216ea98a713202b74fa

            SHA1

            20ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5

            SHA256

            4ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400

            SHA512

            3a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe
            Filesize

            86KB

            MD5

            e1e5c813becf6216ea98a713202b74fa

            SHA1

            20ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5

            SHA256

            4ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400

            SHA512

            3a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1

          • \Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exe
            Filesize

            793KB

            MD5

            3522d7d178bf7e584590a2e91b322c9b

            SHA1

            2300feb56b604e59b68089e08b58cb36a1e40049

            SHA256

            7f1db40aeb5d489f740bfda8303d4be39d47269bd0b0b3b0a6bef847fda9cdeb

            SHA512

            b7441e645f140ebb50c08f653a86446717c64c451711cd70595a6f57bfa4551cf329958d67e83c8da0bbe19958b353bde8bf79ca6f7eef8593360536eed344b5

          • \Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exe
            Filesize

            793KB

            MD5

            3522d7d178bf7e584590a2e91b322c9b

            SHA1

            2300feb56b604e59b68089e08b58cb36a1e40049

            SHA256

            7f1db40aeb5d489f740bfda8303d4be39d47269bd0b0b3b0a6bef847fda9cdeb

            SHA512

            b7441e645f140ebb50c08f653a86446717c64c451711cd70595a6f57bfa4551cf329958d67e83c8da0bbe19958b353bde8bf79ca6f7eef8593360536eed344b5

          • \Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exe
            Filesize

            793KB

            MD5

            3522d7d178bf7e584590a2e91b322c9b

            SHA1

            2300feb56b604e59b68089e08b58cb36a1e40049

            SHA256

            7f1db40aeb5d489f740bfda8303d4be39d47269bd0b0b3b0a6bef847fda9cdeb

            SHA512

            b7441e645f140ebb50c08f653a86446717c64c451711cd70595a6f57bfa4551cf329958d67e83c8da0bbe19958b353bde8bf79ca6f7eef8593360536eed344b5

          • \Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exe
            Filesize

            793KB

            MD5

            3522d7d178bf7e584590a2e91b322c9b

            SHA1

            2300feb56b604e59b68089e08b58cb36a1e40049

            SHA256

            7f1db40aeb5d489f740bfda8303d4be39d47269bd0b0b3b0a6bef847fda9cdeb

            SHA512

            b7441e645f140ebb50c08f653a86446717c64c451711cd70595a6f57bfa4551cf329958d67e83c8da0bbe19958b353bde8bf79ca6f7eef8593360536eed344b5

          • \Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe
            Filesize

            86KB

            MD5

            e1e5c813becf6216ea98a713202b74fa

            SHA1

            20ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5

            SHA256

            4ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400

            SHA512

            3a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1

          • \Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe
            Filesize

            86KB

            MD5

            e1e5c813becf6216ea98a713202b74fa

            SHA1

            20ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5

            SHA256

            4ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400

            SHA512

            3a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1

          • \Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe
            Filesize

            86KB

            MD5

            e1e5c813becf6216ea98a713202b74fa

            SHA1

            20ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5

            SHA256

            4ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400

            SHA512

            3a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1

          • \Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe
            Filesize

            86KB

            MD5

            e1e5c813becf6216ea98a713202b74fa

            SHA1

            20ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5

            SHA256

            4ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400

            SHA512

            3a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1

          • \Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe
            Filesize

            86KB

            MD5

            e1e5c813becf6216ea98a713202b74fa

            SHA1

            20ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5

            SHA256

            4ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400

            SHA512

            3a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1

          • \Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe
            Filesize

            86KB

            MD5

            e1e5c813becf6216ea98a713202b74fa

            SHA1

            20ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5

            SHA256

            4ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400

            SHA512

            3a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1

          • memory/432-103-0x0000000000520000-0x000000000053C000-memory.dmp
            Filesize

            112KB

          • memory/432-76-0x0000000000400000-0x00000000004C8000-memory.dmp
            Filesize

            800KB

          • memory/432-78-0x0000000000400000-0x00000000004C8000-memory.dmp
            Filesize

            800KB

          • memory/432-83-0x0000000000400000-0x00000000004C8000-memory.dmp
            Filesize

            800KB

          • memory/432-81-0x0000000000400000-0x00000000004C8000-memory.dmp
            Filesize

            800KB

          • memory/432-80-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
            Filesize

            4KB

          • memory/432-77-0x0000000000400000-0x00000000004C8000-memory.dmp
            Filesize

            800KB

          • memory/432-79-0x0000000000400000-0x00000000004C8000-memory.dmp
            Filesize

            800KB

          • memory/432-85-0x0000000000400000-0x00000000004C8000-memory.dmp
            Filesize

            800KB

          • memory/432-106-0x00000000007D0000-0x00000000007DC000-memory.dmp
            Filesize

            48KB

          • memory/432-102-0x0000000004D50000-0x0000000004D90000-memory.dmp
            Filesize

            256KB

          • memory/432-105-0x0000000000540000-0x0000000000550000-memory.dmp
            Filesize

            64KB

          • memory/432-104-0x0000000000740000-0x0000000000756000-memory.dmp
            Filesize

            88KB

          • memory/440-121-0x0000000000400000-0x0000000000408000-memory.dmp
            Filesize

            32KB

          • memory/440-128-0x0000000000400000-0x0000000000408000-memory.dmp
            Filesize

            32KB

          • memory/440-125-0x0000000000400000-0x0000000000408000-memory.dmp
            Filesize

            32KB

          • memory/440-123-0x0000000000400000-0x0000000000408000-memory.dmp
            Filesize

            32KB

          • memory/440-124-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
            Filesize

            4KB

          • memory/440-122-0x0000000000400000-0x0000000000408000-memory.dmp
            Filesize

            32KB

          • memory/440-130-0x0000000000400000-0x0000000000408000-memory.dmp
            Filesize

            32KB

          • memory/440-120-0x0000000000400000-0x0000000000408000-memory.dmp
            Filesize

            32KB

          • memory/1092-115-0x0000000000CC0000-0x0000000000CD2000-memory.dmp
            Filesize

            72KB

          • memory/1668-100-0x0000000001050000-0x000000000106C000-memory.dmp
            Filesize

            112KB

          • memory/1668-116-0x00000000003D0000-0x00000000003DC000-memory.dmp
            Filesize

            48KB

          • memory/1668-111-0x0000000004B90000-0x0000000004BD0000-memory.dmp
            Filesize

            256KB

          • memory/1668-101-0x0000000004B90000-0x0000000004BD0000-memory.dmp
            Filesize

            256KB

          • memory/1736-73-0x0000000004E30000-0x0000000004E70000-memory.dmp
            Filesize

            256KB

          • memory/1736-74-0x0000000004E30000-0x0000000004E70000-memory.dmp
            Filesize

            256KB

          • memory/1736-72-0x0000000001390000-0x000000000145C000-memory.dmp
            Filesize

            816KB

          • memory/1736-75-0x0000000004860000-0x000000000492A000-memory.dmp
            Filesize

            808KB