Analysis
-
max time kernel
447s -
max time network
451s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 04:52
Behavioral task
behavioral1
Sample
Neles Skinchanger 0.28.4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Neles Skinchanger 0.28.4.exe
Resource
win10v2004-20240412-en
General
-
Target
Neles Skinchanger 0.28.4.exe
-
Size
5.6MB
-
MD5
a13bcc8067d988bdf67c04cbd394213a
-
SHA1
d32d82f56b632f74381caff663a363e5f30e22f7
-
SHA256
3b6c50997c6575d2c7a3300b6afaf16b2440874c0540ee415b842d649d104f44
-
SHA512
b49f9f27f5b1b9e505d13777477f7d05e42b2455ee336e2d2aba0e595cb600f1de7da5a18a78acbd28a4512fe63faa539b960a4f7977f2bc5b32a06637bb17e8
-
SSDEEP
98304:jNXGluIWpVgaDIz6Sjozu+bk1Ct6hvCzWlcdiuN4bupuwJ2PuGnXhzVb+yl:jNXGlNF6irKu3C+vQWls48anXVVKI
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1448-19-0x0000000000400000-0x00000000009A5000-memory.dmp family_zgrat_v1 -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe dcrat behavioral2/memory/1448-19-0x0000000000400000-0x00000000009A5000-memory.dmp dcrat C:\Serverfontinto\browserPerf.exe dcrat behavioral2/memory/4176-37-0x0000000000F30000-0x00000000010D2000-memory.dmp dcrat -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral2/memory/1448-19-0x0000000000400000-0x00000000009A5000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Neles Skinchanger 0.28.4.exeDCRatBuild.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation Neles Skinchanger 0.28.4.exe Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation DCRatBuild.exe Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 3 IoCs
Processes:
Neles Skinchanger 0.28.1.exeDCRatBuild.exebrowserPerf.exepid process 1772 Neles Skinchanger 0.28.1.exe 1616 DCRatBuild.exe 4176 browserPerf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
DCRatBuild.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings DCRatBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
browserPerf.exedescription pid process Token: SeDebugPrivilege 4176 browserPerf.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Neles Skinchanger 0.28.4.exeDCRatBuild.exeWScript.execmd.exedescription pid process target process PID 1448 wrote to memory of 1772 1448 Neles Skinchanger 0.28.4.exe Neles Skinchanger 0.28.1.exe PID 1448 wrote to memory of 1772 1448 Neles Skinchanger 0.28.4.exe Neles Skinchanger 0.28.1.exe PID 1448 wrote to memory of 1616 1448 Neles Skinchanger 0.28.4.exe DCRatBuild.exe PID 1448 wrote to memory of 1616 1448 Neles Skinchanger 0.28.4.exe DCRatBuild.exe PID 1448 wrote to memory of 1616 1448 Neles Skinchanger 0.28.4.exe DCRatBuild.exe PID 1616 wrote to memory of 1028 1616 DCRatBuild.exe WScript.exe PID 1616 wrote to memory of 1028 1616 DCRatBuild.exe WScript.exe PID 1616 wrote to memory of 1028 1616 DCRatBuild.exe WScript.exe PID 1028 wrote to memory of 3480 1028 WScript.exe cmd.exe PID 1028 wrote to memory of 3480 1028 WScript.exe cmd.exe PID 1028 wrote to memory of 3480 1028 WScript.exe cmd.exe PID 3480 wrote to memory of 4176 3480 cmd.exe browserPerf.exe PID 3480 wrote to memory of 4176 3480 cmd.exe browserPerf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Neles Skinchanger 0.28.4.exe"C:\Users\Admin\AppData\Local\Temp\Neles Skinchanger 0.28.4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Neles Skinchanger 0.28.1.exe"C:\Users\Admin\AppData\Local\Temp\Neles Skinchanger 0.28.1.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Serverfontinto\ggA79gEQWMtGyHjPedBsT7q1K2zClm.vbe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Serverfontinto\WPi5TAxlEJbkHM8pJVgb.bat" "4⤵
- Suspicious use of WriteProcessMemory
-
C:\Serverfontinto\browserPerf.exe"C:\Serverfontinto\browserPerf.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Serverfontinto\WPi5TAxlEJbkHM8pJVgb.batFilesize
35B
MD5451549d6be4bec74f0c7465c96933b2e
SHA154eb5f78e836026b7064e02bea465e26a3be0cb9
SHA256617f222b74ca141960f06cdab493d4725a4d543b3484f88a904fa3513bfe983d
SHA5124b97d143cf95146dd84619dee9337b1fa2e938dd41520564211a728f52b3bc77d108810fd84465f11e91af20a833bcb2cc54c3f11a23e94b7cfa3c6d35e988f0
-
C:\Serverfontinto\browserPerf.exeFilesize
1.6MB
MD52daf8639d999ab8aa57f810bdac02e00
SHA18163641a538bc90f4bd1f91770f5f91cc397f5e5
SHA256eabd6c9c27a5c7586447d9c1f287b188fd863967e205985ce8e9ad6344e62a6f
SHA5120d4f5f21c3dfb7a5e0c7980bfe0f2137c1e7c821043544ec0b46af704dce341e45bbc0f5827fbf960783b45243438aee09a39ae8d14e93d6290eedc59ae56562
-
C:\Serverfontinto\ggA79gEQWMtGyHjPedBsT7q1K2zClm.vbeFilesize
211B
MD5e9805e10ff10bc14a2b68c21fe567874
SHA1221d710ef76eca3765d1a7961a1fc92b2ff5aca1
SHA256737c8f15685ceb1999e652907a3fc061bad3d73a2c9708552eab430aa4013afa
SHA5127e41c63e6bef29de6681958d71f5aff88e25746998562e566bcab8e0032423efb31219a41fa1466d0d120485ba05fa1e4747f1072be3db3500c6e6ca903221dd
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exeFilesize
1.9MB
MD5ddd2bfdbf333b9733bf0aef118755436
SHA1f95de679c80387ca9d7fecd5852207a19faca134
SHA25601d541dd10443cb6a162528ce488fd10f9423d8cab3b266d83744e95e421b493
SHA512e1fa7109085bbb267bf6f7dee1933455dba6e8f468a849d973e6a45701d944c3b10a326c2f06ae7f76f65aec5f16893764aaee6064ad8c5abe5f9e5845e95c20
-
C:\Users\Admin\AppData\Local\Temp\Neles Skinchanger 0.28.1.exeFilesize
3.4MB
MD5d71856077c8268fdd17a3fe06b85c6ca
SHA103c938a15ff8a729a125e038c935302cd7cca6bd
SHA2565bf415b23817d70fd384d1fcd9634c7a9301341083fb3ed48c57c477f58cef9e
SHA512f1f1d03059b3a2553b253f69f8a5540876e75ed8460e5ef5e6c7ec808ce1b47f930684e90bb774ea1d239bcab39950a75430e4dc9746ea03d44d33d4b37806da
-
memory/1448-19-0x0000000000400000-0x00000000009A5000-memory.dmpFilesize
5.6MB
-
memory/1772-30-0x00007FF9A1350000-0x00007FF9A1E11000-memory.dmpFilesize
10.8MB
-
memory/1772-21-0x0000018D696C0000-0x0000018D696D0000-memory.dmpFilesize
64KB
-
memory/1772-20-0x00007FF9A1350000-0x00007FF9A1E11000-memory.dmpFilesize
10.8MB
-
memory/1772-18-0x0000018D66BA0000-0x0000018D66F18000-memory.dmpFilesize
3.5MB
-
memory/4176-36-0x00007FF9A0250000-0x00007FF9A0D11000-memory.dmpFilesize
10.8MB
-
memory/4176-37-0x0000000000F30000-0x00000000010D2000-memory.dmpFilesize
1.6MB
-
memory/4176-38-0x000000001BEF0000-0x000000001BF00000-memory.dmpFilesize
64KB
-
memory/4176-39-0x00000000031F0000-0x00000000031FE000-memory.dmpFilesize
56KB
-
memory/4176-41-0x00007FF9A0250000-0x00007FF9A0D11000-memory.dmpFilesize
10.8MB