Analysis

  • max time kernel
    135s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2024 14:56

General

  • Target

    2c03dd0e127867ade0480bf34520df59.exe

  • Size

    1.1MB

  • MD5

    2c03dd0e127867ade0480bf34520df59

  • SHA1

    fb153921a2a82b46022745c37595347b6f6065e3

  • SHA256

    fad9c2f147e0559c2f483f0643c01a0120710b07b15e9c9773d6eab00f15e289

  • SHA512

    006431d94bebf6530fb1cf7b690feaecd090d4d4a9d731d92cca6089fd772ada727bfd7ebc3fc84c1f183d700dab1cb2aac8116a3a92f86c8260dfb06602307d

  • SSDEEP

    24576:U2G/nvxW3Ww0tigSFVbkXLQA9lfyN7SrCGP:UbA30i1A8BWrCc

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c03dd0e127867ade0480bf34520df59.exe
    "C:\Users\Admin\AppData\Local\Temp\2c03dd0e127867ade0480bf34520df59.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\BridgeMssavesNet\BV6pkpwwN9itSlKcugIX54TBhptT.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\BridgeMssavesNet\5MlI9N3fzCQPyBJiYN9phAi6Wm.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4588
        • C:\BridgeMssavesNet\bridgeBlockcrt.exe
          "C:\BridgeMssavesNet\bridgeBlockcrt.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:3812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\BridgeMssavesNet\5MlI9N3fzCQPyBJiYN9phAi6Wm.bat

    Filesize

    40B

    MD5

    510ac9d3b66719b2b987361c96833cf2

    SHA1

    e910552d71dd9d38002b8480b7f7b15134a9dec2

    SHA256

    f9cbdfc9f2f6dd97d2d27c37f070e46ff6b97e316ba5dea9e8faada4ffbbbeed

    SHA512

    516ed4ec0005a9ef27098b7e0b44162514244c689353f46b20ad5df049110576acbb76f540f251053683a2bb6f0083d585c01ef076dc94f945d1188b6a65654f

  • C:\BridgeMssavesNet\BV6pkpwwN9itSlKcugIX54TBhptT.vbe

    Filesize

    219B

    MD5

    63ec9e6deaa6f93ac2b7019358f4c2ef

    SHA1

    d0d45f71ff825edc8261d0a38ce8ca6bddcf68d1

    SHA256

    690a093c3eb93b5198b62e551a3f11438f9fd94cd05a9cc7a5bd1a2e2d69f3e1

    SHA512

    34b91eba2e1ab33ba78863f269b5a34fd29b018d0213598a7a0a431d88324b261d57ff55b1c7beed6ea168b5e614374b78295ec80399cf1f505cf51fd8c057c7

  • C:\BridgeMssavesNet\bridgeBlockcrt.exe

    Filesize

    828KB

    MD5

    769fbb392481f2acbffbb4ab1af6689e

    SHA1

    9d4c5457197b9ed22077e096d945cb28b81bf1f3

    SHA256

    e1f0f56259125ce4761d926d37b53d3a517828cf86b6ddb6728ec60086c7e38e

    SHA512

    2e59d2553d300eba6874dd5fb222e282d3b448bf1b052814874970378f5207c9065a5080d6a8c6756c26c49b747e6f0e7abb8e9befd8a70b2293920d411c8801

  • memory/3812-12-0x00007FF809483000-0x00007FF809485000-memory.dmp

    Filesize

    8KB

  • memory/3812-13-0x0000000000350000-0x0000000000426000-memory.dmp

    Filesize

    856KB

  • memory/3812-14-0x00007FF809483000-0x00007FF809485000-memory.dmp

    Filesize

    8KB