Analysis
-
max time kernel
84s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-06-2023 01:23
Static task
static1
Behavioral task
behavioral1
Sample
2ab209c8b13fc820c0f2cd15de422053e94e2ca02b939ff97eeb2abceb5bb810.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2ab209c8b13fc820c0f2cd15de422053e94e2ca02b939ff97eeb2abceb5bb810.exe
Resource
win10v2004-20230220-en
General
-
Target
2ab209c8b13fc820c0f2cd15de422053e94e2ca02b939ff97eeb2abceb5bb810.exe
-
Size
897KB
-
MD5
3a68a2cbeb827588f3749568b121a79b
-
SHA1
a40fc3b0c547826353088baf247b379f1e10f25d
-
SHA256
2ab209c8b13fc820c0f2cd15de422053e94e2ca02b939ff97eeb2abceb5bb810
-
SHA512
7ab8bb1605cfed214d05c6dac5dc05df0b66c90e7abe67629e8c879483d5f2784edae832f48acfc92c968a3da1f13e76e5db699890ed85b0c00bb551e0e70b7d
-
SSDEEP
12288:x7Gmaojeh4hLyhLk9el5ih7XrIqEMbs0qFvPrVc8Ml1T5J4rNl99uF04r4hZZ1v6:MTMYP2tP4CKdKh
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
resource yara_rule behavioral1/memory/928-55-0x0000000000400000-0x00000000004CE000-memory.dmp dcrat behavioral1/memory/928-62-0x0000000000400000-0x00000000004CE000-memory.dmp dcrat behavioral1/memory/928-61-0x0000000000400000-0x00000000004CE000-memory.dmp dcrat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1700 set thread context of 928 1700 2ab209c8b13fc820c0f2cd15de422053e94e2ca02b939ff97eeb2abceb5bb810.exe 28 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 928 AppLaunch.exe 928 AppLaunch.exe 928 AppLaunch.exe 928 AppLaunch.exe 928 AppLaunch.exe 928 AppLaunch.exe 928 AppLaunch.exe 928 AppLaunch.exe 928 AppLaunch.exe 928 AppLaunch.exe 928 AppLaunch.exe 928 AppLaunch.exe 928 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 928 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1700 wrote to memory of 928 1700 2ab209c8b13fc820c0f2cd15de422053e94e2ca02b939ff97eeb2abceb5bb810.exe 28 PID 1700 wrote to memory of 928 1700 2ab209c8b13fc820c0f2cd15de422053e94e2ca02b939ff97eeb2abceb5bb810.exe 28 PID 1700 wrote to memory of 928 1700 2ab209c8b13fc820c0f2cd15de422053e94e2ca02b939ff97eeb2abceb5bb810.exe 28 PID 1700 wrote to memory of 928 1700 2ab209c8b13fc820c0f2cd15de422053e94e2ca02b939ff97eeb2abceb5bb810.exe 28 PID 1700 wrote to memory of 928 1700 2ab209c8b13fc820c0f2cd15de422053e94e2ca02b939ff97eeb2abceb5bb810.exe 28 PID 1700 wrote to memory of 928 1700 2ab209c8b13fc820c0f2cd15de422053e94e2ca02b939ff97eeb2abceb5bb810.exe 28 PID 1700 wrote to memory of 928 1700 2ab209c8b13fc820c0f2cd15de422053e94e2ca02b939ff97eeb2abceb5bb810.exe 28 PID 1700 wrote to memory of 928 1700 2ab209c8b13fc820c0f2cd15de422053e94e2ca02b939ff97eeb2abceb5bb810.exe 28 PID 1700 wrote to memory of 928 1700 2ab209c8b13fc820c0f2cd15de422053e94e2ca02b939ff97eeb2abceb5bb810.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ab209c8b13fc820c0f2cd15de422053e94e2ca02b939ff97eeb2abceb5bb810.exe"C:\Users\Admin\AppData\Local\Temp\2ab209c8b13fc820c0f2cd15de422053e94e2ca02b939ff97eeb2abceb5bb810.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:928
-