Analysis
-
max time kernel
121s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 14:56
Behavioral task
behavioral1
Sample
2c03dd0e127867ade0480bf34520df59.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2c03dd0e127867ade0480bf34520df59.exe
Resource
win10v2004-20240802-en
General
-
Target
2c03dd0e127867ade0480bf34520df59.exe
-
Size
1.1MB
-
MD5
2c03dd0e127867ade0480bf34520df59
-
SHA1
fb153921a2a82b46022745c37595347b6f6065e3
-
SHA256
fad9c2f147e0559c2f483f0643c01a0120710b07b15e9c9773d6eab00f15e289
-
SHA512
006431d94bebf6530fb1cf7b690feaecd090d4d4a9d731d92cca6089fd772ada727bfd7ebc3fc84c1f183d700dab1cb2aac8116a3a92f86c8260dfb06602307d
-
SSDEEP
24576:U2G/nvxW3Ww0tigSFVbkXLQA9lfyN7SrCGP:UbA30i1A8BWrCc
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
resource yara_rule behavioral1/files/0x0007000000018766-10.dat dcrat behavioral1/memory/2800-13-0x0000000000F60000-0x0000000001036000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2800 bridgeBlockcrt.exe -
Loads dropped DLL 2 IoCs
pid Process 2132 cmd.exe 2132 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 pastebin.com 3 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c03dd0e127867ade0480bf34520df59.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2800 bridgeBlockcrt.exe 2800 bridgeBlockcrt.exe 2800 bridgeBlockcrt.exe 2800 bridgeBlockcrt.exe 2800 bridgeBlockcrt.exe 2800 bridgeBlockcrt.exe 2800 bridgeBlockcrt.exe 2800 bridgeBlockcrt.exe 2800 bridgeBlockcrt.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2800 bridgeBlockcrt.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2800 bridgeBlockcrt.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2160 1760 2c03dd0e127867ade0480bf34520df59.exe 30 PID 1760 wrote to memory of 2160 1760 2c03dd0e127867ade0480bf34520df59.exe 30 PID 1760 wrote to memory of 2160 1760 2c03dd0e127867ade0480bf34520df59.exe 30 PID 1760 wrote to memory of 2160 1760 2c03dd0e127867ade0480bf34520df59.exe 30 PID 2160 wrote to memory of 2132 2160 WScript.exe 31 PID 2160 wrote to memory of 2132 2160 WScript.exe 31 PID 2160 wrote to memory of 2132 2160 WScript.exe 31 PID 2160 wrote to memory of 2132 2160 WScript.exe 31 PID 2132 wrote to memory of 2800 2132 cmd.exe 33 PID 2132 wrote to memory of 2800 2132 cmd.exe 33 PID 2132 wrote to memory of 2800 2132 cmd.exe 33 PID 2132 wrote to memory of 2800 2132 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c03dd0e127867ade0480bf34520df59.exe"C:\Users\Admin\AppData\Local\Temp\2c03dd0e127867ade0480bf34520df59.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\BridgeMssavesNet\BV6pkpwwN9itSlKcugIX54TBhptT.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\BridgeMssavesNet\5MlI9N3fzCQPyBJiYN9phAi6Wm.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\BridgeMssavesNet\bridgeBlockcrt.exe"C:\BridgeMssavesNet\bridgeBlockcrt.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5510ac9d3b66719b2b987361c96833cf2
SHA1e910552d71dd9d38002b8480b7f7b15134a9dec2
SHA256f9cbdfc9f2f6dd97d2d27c37f070e46ff6b97e316ba5dea9e8faada4ffbbbeed
SHA512516ed4ec0005a9ef27098b7e0b44162514244c689353f46b20ad5df049110576acbb76f540f251053683a2bb6f0083d585c01ef076dc94f945d1188b6a65654f
-
Filesize
219B
MD563ec9e6deaa6f93ac2b7019358f4c2ef
SHA1d0d45f71ff825edc8261d0a38ce8ca6bddcf68d1
SHA256690a093c3eb93b5198b62e551a3f11438f9fd94cd05a9cc7a5bd1a2e2d69f3e1
SHA51234b91eba2e1ab33ba78863f269b5a34fd29b018d0213598a7a0a431d88324b261d57ff55b1c7beed6ea168b5e614374b78295ec80399cf1f505cf51fd8c057c7
-
Filesize
828KB
MD5769fbb392481f2acbffbb4ab1af6689e
SHA19d4c5457197b9ed22077e096d945cb28b81bf1f3
SHA256e1f0f56259125ce4761d926d37b53d3a517828cf86b6ddb6728ec60086c7e38e
SHA5122e59d2553d300eba6874dd5fb222e282d3b448bf1b052814874970378f5207c9065a5080d6a8c6756c26c49b747e6f0e7abb8e9befd8a70b2293920d411c8801