Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-04-2024 01:06

General

  • Target

    1a3a78f874d806d86e4a781aa267d1a03ec959635011dbedbe5be2adca46b9c5.exe

  • Size

    1.3MB

  • MD5

    a496655d47395c366faf63221b9b0cc4

  • SHA1

    1abfa977804bf18315087adfac334d019221db07

  • SHA256

    1a3a78f874d806d86e4a781aa267d1a03ec959635011dbedbe5be2adca46b9c5

  • SHA512

    a5a0fded68772d46217f8515daccf556abc0af37112b70d36a2552805bba480e689c6d3d72b742214e474717d0be24e3324e287402de23aa31224026e1f4b101

  • SSDEEP

    24576:mpORKlEFLFVOvoOFniNL1nDS662lWiqqB2xT/KggOIJevr8/a0MnvBBm:CHl4pwvoOFKxY2l5qh2ggOHo/gnv7m

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • DCRat payload 16 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Detects executables containing bas64 encoded gzip files 16 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a3a78f874d806d86e4a781aa267d1a03ec959635011dbedbe5be2adca46b9c5.exe
    "C:\Users\Admin\AppData\Local\Temp\1a3a78f874d806d86e4a781aa267d1a03ec959635011dbedbe5be2adca46b9c5.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2600-0-0x0000000000060000-0x0000000000444000-memory.dmp

    Filesize

    3.9MB

  • memory/2600-2-0x0000000074840000-0x0000000074F2E000-memory.dmp

    Filesize

    6.9MB

  • memory/2600-1-0x0000000000060000-0x0000000000444000-memory.dmp

    Filesize

    3.9MB

  • memory/2600-3-0x0000000005900000-0x0000000005940000-memory.dmp

    Filesize

    256KB

  • memory/2600-4-0x0000000002650000-0x000000000265C000-memory.dmp

    Filesize

    48KB

  • memory/2600-5-0x0000000000060000-0x0000000000444000-memory.dmp

    Filesize

    3.9MB

  • memory/2600-6-0x0000000000060000-0x0000000000444000-memory.dmp

    Filesize

    3.9MB

  • memory/2600-7-0x0000000000060000-0x0000000000444000-memory.dmp

    Filesize

    3.9MB

  • memory/2600-8-0x0000000074840000-0x0000000074F2E000-memory.dmp

    Filesize

    6.9MB

  • memory/2600-9-0x0000000005900000-0x0000000005940000-memory.dmp

    Filesize

    256KB

  • memory/2600-10-0x0000000000060000-0x0000000000444000-memory.dmp

    Filesize

    3.9MB

  • memory/2600-11-0x0000000000060000-0x0000000000444000-memory.dmp

    Filesize

    3.9MB

  • memory/2600-12-0x0000000000060000-0x0000000000444000-memory.dmp

    Filesize

    3.9MB

  • memory/2600-13-0x0000000000060000-0x0000000000444000-memory.dmp

    Filesize

    3.9MB

  • memory/2600-14-0x0000000000060000-0x0000000000444000-memory.dmp

    Filesize

    3.9MB

  • memory/2600-15-0x0000000000060000-0x0000000000444000-memory.dmp

    Filesize

    3.9MB

  • memory/2600-16-0x0000000000060000-0x0000000000444000-memory.dmp

    Filesize

    3.9MB

  • memory/2600-17-0x0000000000060000-0x0000000000444000-memory.dmp

    Filesize

    3.9MB

  • memory/2600-18-0x0000000000060000-0x0000000000444000-memory.dmp

    Filesize

    3.9MB

  • memory/2600-19-0x0000000000060000-0x0000000000444000-memory.dmp

    Filesize

    3.9MB

  • memory/2600-20-0x0000000000060000-0x0000000000444000-memory.dmp

    Filesize

    3.9MB

  • memory/2600-21-0x0000000000060000-0x0000000000444000-memory.dmp

    Filesize

    3.9MB