Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 01:43

General

  • Target

    fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe

  • Size

    736KB

  • MD5

    8dd93bb163b1658947ad6c63b79ad36f

  • SHA1

    1d0ac0d640c7fcdf5f8641b8598777a42b9fecff

  • SHA256

    fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c

  • SHA512

    62956e65d74fc82c053314e6c9d2bde8efd036b0be8f5591161bde951eb7bc346b195e59289ebd466c18e7c0227619d6bd5b0314e7ed3d7415beaae03d3d5670

  • SSDEEP

    12288:kATnF3pDw8Ji1OGaNeqALaJJMA+UiXPrQfkXmm1RhdLB9XGbHJnZ6:kATngKqqALEJMA+yEqX6

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • DCRat payload 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe
    "C:\Users\Admin\AppData\Local\Temp\fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:3964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3964-0-0x00007FF9CF463000-0x00007FF9CF465000-memory.dmp

    Filesize

    8KB

  • memory/3964-1-0x0000000000370000-0x000000000042E000-memory.dmp

    Filesize

    760KB

  • memory/3964-2-0x00007FF9CF460000-0x00007FF9CFF21000-memory.dmp

    Filesize

    10.8MB

  • memory/3964-4-0x00000000024B0000-0x00000000024CC000-memory.dmp

    Filesize

    112KB

  • memory/3964-5-0x00007FF9CF460000-0x00007FF9CFF21000-memory.dmp

    Filesize

    10.8MB

  • memory/3964-6-0x00000000025A0000-0x00000000025F0000-memory.dmp

    Filesize

    320KB

  • memory/3964-8-0x00000000024D0000-0x00000000024E8000-memory.dmp

    Filesize

    96KB

  • memory/3964-10-0x0000000000CE0000-0x0000000000CEE000-memory.dmp

    Filesize

    56KB

  • memory/3964-11-0x00007FF9CF460000-0x00007FF9CFF21000-memory.dmp

    Filesize

    10.8MB

  • memory/3964-12-0x00007FF9CF460000-0x00007FF9CFF21000-memory.dmp

    Filesize

    10.8MB

  • memory/3964-13-0x00007FF9CF463000-0x00007FF9CF465000-memory.dmp

    Filesize

    8KB

  • memory/3964-14-0x00007FF9CF460000-0x00007FF9CFF21000-memory.dmp

    Filesize

    10.8MB

  • memory/3964-15-0x00007FF9CF460000-0x00007FF9CFF21000-memory.dmp

    Filesize

    10.8MB

  • memory/3964-16-0x00007FF9CF460000-0x00007FF9CFF21000-memory.dmp

    Filesize

    10.8MB

  • memory/3964-52-0x00007FF9CF460000-0x00007FF9CFF21000-memory.dmp

    Filesize

    10.8MB

  • memory/3964-53-0x00007FF9CF460000-0x00007FF9CFF21000-memory.dmp

    Filesize

    10.8MB