Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
26/11/2023, 15:21
Behavioral task
behavioral1
Sample
a8369a27fbef07a1cc2c2f20e844b58f.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
a8369a27fbef07a1cc2c2f20e844b58f.exe
Resource
win10v2004-20231020-en
General
-
Target
a8369a27fbef07a1cc2c2f20e844b58f.exe
-
Size
2.9MB
-
MD5
a8369a27fbef07a1cc2c2f20e844b58f
-
SHA1
737828caef2cd22845b001d247b1597f73835f4a
-
SHA256
0c580f2f9f3e2c64e1a23ab9f81e37e47fee22704d46a7bf7741802694cae951
-
SHA512
8402756c6e51ac0aa93e40ae4e03339ff0886fd09b423b98dba4fdfc34caf1d3badfa7c386e06c8f29ba78d7e68c2021dcdc580e53c927265371c460f36fcb6a
-
SSDEEP
49152:UbA30KjqqxP86L9Vs419H1j0m7ulwYDOOtWOf/Th:UbeGqv2419H1j0mwHftrnTh
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
resource yara_rule behavioral1/files/0x002e000000015c88-10.dat dcrat behavioral1/files/0x002e000000015c88-9.dat dcrat behavioral1/files/0x002e000000015c88-12.dat dcrat behavioral1/files/0x002e000000015c88-11.dat dcrat behavioral1/memory/2748-13-0x0000000000080000-0x000000000031C000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2748 webintoCommon.exe -
Loads dropped DLL 2 IoCs
pid Process 2616 cmd.exe 2616 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2748 webintoCommon.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2208 2044 a8369a27fbef07a1cc2c2f20e844b58f.exe 28 PID 2044 wrote to memory of 2208 2044 a8369a27fbef07a1cc2c2f20e844b58f.exe 28 PID 2044 wrote to memory of 2208 2044 a8369a27fbef07a1cc2c2f20e844b58f.exe 28 PID 2044 wrote to memory of 2208 2044 a8369a27fbef07a1cc2c2f20e844b58f.exe 28 PID 2208 wrote to memory of 2616 2208 WScript.exe 30 PID 2208 wrote to memory of 2616 2208 WScript.exe 30 PID 2208 wrote to memory of 2616 2208 WScript.exe 30 PID 2208 wrote to memory of 2616 2208 WScript.exe 30 PID 2616 wrote to memory of 2748 2616 cmd.exe 31 PID 2616 wrote to memory of 2748 2616 cmd.exe 31 PID 2616 wrote to memory of 2748 2616 cmd.exe 31 PID 2616 wrote to memory of 2748 2616 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8369a27fbef07a1cc2c2f20e844b58f.exe"C:\Users\Admin\AppData\Local\Temp\a8369a27fbef07a1cc2c2f20e844b58f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\BridgeProviderwin\eEaD7.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\BridgeProviderwin\U6Zsw0Aqkq82JoPhuqU5pdZPOaHSN.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\BridgeProviderwin\webintoCommon.exe"C:\BridgeProviderwin\webintoCommon.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5142059a95ad64136b354b97c6f156495
SHA1cf1681862136a264591d588c1394f86f7b31c992
SHA256037fcdeaf49ec5ae65f84e63731f01685ea1fd53260dc66c126b3d479f33c5b9
SHA5122b7ec931dbd1b56485b0a79004bfdc14f6bfaa94c28d0582c20c4d55c1730ae0ebdc53e17893959cc9c4ed40be295231c9418ffcf381822ca9e71a9035fd2d70
-
Filesize
223B
MD57e1a81be7022bc7fe43697dfe5e8a7bf
SHA11a1bab88fa404e672c9fb084751647c3d83bb7f0
SHA2569196fb30d8d69933914872811a4f612378327282995dd1faf965b4d272f80092
SHA5126b869618393ce0530df1a2e4c37df9d34ff580c5ba7857fdada49862920a0a0eb2ca1724894e0534b131fe01d48cdd41d1bc00bb17a4d4f4b9f47386be828547
-
Filesize
2.6MB
MD580450d4eb4cbd9ef383deec037cde42d
SHA1595bea2ef33f9dd09bc5470aa9bbf90b84bd3e64
SHA256d06472783b12ccb66b78364ab66f7dae851f142fec6c94f4801ab494ea630cd4
SHA5125ad4010645c2f07460abe6ebf7ba0d07c3735f266da0fac1777d467250b0dd39244ee97a34bd9f24b2e89ebf75210e618a4bebc7e2454e6904c7784917d3c94d
-
Filesize
2.6MB
MD580450d4eb4cbd9ef383deec037cde42d
SHA1595bea2ef33f9dd09bc5470aa9bbf90b84bd3e64
SHA256d06472783b12ccb66b78364ab66f7dae851f142fec6c94f4801ab494ea630cd4
SHA5125ad4010645c2f07460abe6ebf7ba0d07c3735f266da0fac1777d467250b0dd39244ee97a34bd9f24b2e89ebf75210e618a4bebc7e2454e6904c7784917d3c94d
-
Filesize
2.6MB
MD580450d4eb4cbd9ef383deec037cde42d
SHA1595bea2ef33f9dd09bc5470aa9bbf90b84bd3e64
SHA256d06472783b12ccb66b78364ab66f7dae851f142fec6c94f4801ab494ea630cd4
SHA5125ad4010645c2f07460abe6ebf7ba0d07c3735f266da0fac1777d467250b0dd39244ee97a34bd9f24b2e89ebf75210e618a4bebc7e2454e6904c7784917d3c94d
-
Filesize
2.6MB
MD580450d4eb4cbd9ef383deec037cde42d
SHA1595bea2ef33f9dd09bc5470aa9bbf90b84bd3e64
SHA256d06472783b12ccb66b78364ab66f7dae851f142fec6c94f4801ab494ea630cd4
SHA5125ad4010645c2f07460abe6ebf7ba0d07c3735f266da0fac1777d467250b0dd39244ee97a34bd9f24b2e89ebf75210e618a4bebc7e2454e6904c7784917d3c94d