Analysis

  • max time kernel
    142s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2024, 21:31

General

  • Target

    6C5F6433BAE4CBF3DC2D1FD40B716B08.exe

  • Size

    3.5MB

  • MD5

    6c5f6433bae4cbf3dc2d1fd40b716b08

  • SHA1

    0eba0dd22b3f5053798eba26e027ef7383602774

  • SHA256

    9bcfa4a19be080565caf27f4ea1bc691c124601bb120aac4ca55802593af400a

  • SHA512

    f82e07cce03b3bc2b661b1ce014cc4c9f4becbd695415b714c4c1a0fbf0f3bcafb59a1f550bbee687e7be927f54b20624d6fb017106ca16ee8c0ee126113e84d

  • SSDEEP

    98304:HCLp6aQhP2k4Xrn/kRCH9ldADNbkAiS5uSM:HK6P2k4XD/kRCd/8YTSm

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6C5F6433BAE4CBF3DC2D1FD40B716B08.exe
    "C:\Users\Admin\AppData\Local\Temp\6C5F6433BAE4CBF3DC2D1FD40B716B08.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2PofFscD1t.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2568
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2600
        • C:\Users\Admin\AppData\Local\Temp\6C5F6433BAE4CBF3DC2D1FD40B716B08.exe
          "C:\Users\Admin\AppData\Local\Temp\6C5F6433BAE4CBF3DC2D1FD40B716B08.exe"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1732
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jpLz1yvSlu.bat"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2368
            • C:\Windows\system32\chcp.com
              chcp 65001
              5⤵
                PID:1772
              • C:\Windows\system32\PING.EXE
                ping -n 10 localhost
                5⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:844
              • C:\Users\Admin\AppData\Local\Temp\6C5F6433BAE4CBF3DC2D1FD40B716B08.exe
                "C:\Users\Admin\AppData\Local\Temp\6C5F6433BAE4CBF3DC2D1FD40B716B08.exe"
                5⤵
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1952
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Qf9bALi5DQ.bat"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1752
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    7⤵
                      PID:980
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      7⤵
                        PID:2380
                      • C:\Users\Admin\AppData\Local\Temp\6C5F6433BAE4CBF3DC2D1FD40B716B08.exe
                        "C:\Users\Admin\AppData\Local\Temp\6C5F6433BAE4CBF3DC2D1FD40B716B08.exe"
                        7⤵
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2992
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\df0NLUfleM.bat"
                          8⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2464
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            9⤵
                              PID:2276
                            • C:\Windows\system32\PING.EXE
                              ping -n 10 localhost
                              9⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:2204
                            • C:\Users\Admin\AppData\Local\Temp\6C5F6433BAE4CBF3DC2D1FD40B716B08.exe
                              "C:\Users\Admin\AppData\Local\Temp\6C5F6433BAE4CBF3DC2D1FD40B716B08.exe"
                              9⤵
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:3000
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zxsEHcgshH.bat"
                                10⤵
                                • Suspicious use of WriteProcessMemory
                                PID:1840
                                • C:\Windows\system32\chcp.com
                                  chcp 65001
                                  11⤵
                                    PID:2744
                                  • C:\Windows\system32\PING.EXE
                                    ping -n 10 localhost
                                    11⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Runs ping.exe
                                    PID:2768
                                  • C:\Users\Admin\AppData\Local\Temp\6C5F6433BAE4CBF3DC2D1FD40B716B08.exe
                                    "C:\Users\Admin\AppData\Local\Temp\6C5F6433BAE4CBF3DC2D1FD40B716B08.exe"
                                    11⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:2956
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\r7mooz1sjZ.bat"
                                      12⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:844
                                      • C:\Windows\system32\chcp.com
                                        chcp 65001
                                        13⤵
                                          PID:576
                                        • C:\Windows\system32\w32tm.exe
                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                          13⤵
                                            PID:600
                                          • C:\Users\Admin\AppData\Local\Temp\6C5F6433BAE4CBF3DC2D1FD40B716B08.exe
                                            "C:\Users\Admin\AppData\Local\Temp\6C5F6433BAE4CBF3DC2D1FD40B716B08.exe"
                                            13⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1672
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\b9Anfm3pCF.bat"
                                              14⤵
                                                PID:1516
                                                • C:\Windows\system32\chcp.com
                                                  chcp 65001
                                                  15⤵
                                                    PID:2144
                                                  • C:\Windows\system32\PING.EXE
                                                    ping -n 10 localhost
                                                    15⤵
                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                    • Runs ping.exe
                                                    PID:2416

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\taskhost.exe

                              Filesize

                              3.5MB

                              MD5

                              6c5f6433bae4cbf3dc2d1fd40b716b08

                              SHA1

                              0eba0dd22b3f5053798eba26e027ef7383602774

                              SHA256

                              9bcfa4a19be080565caf27f4ea1bc691c124601bb120aac4ca55802593af400a

                              SHA512

                              f82e07cce03b3bc2b661b1ce014cc4c9f4becbd695415b714c4c1a0fbf0f3bcafb59a1f550bbee687e7be927f54b20624d6fb017106ca16ee8c0ee126113e84d

                            • C:\Users\Admin\AppData\Local\Temp\2PofFscD1t.bat

                              Filesize

                              198B

                              MD5

                              b9eba89c4f437b8c3660c8b314ab70ba

                              SHA1

                              a8286ca6277bae66946fc331e95e0586431a8ce0

                              SHA256

                              6d14edafa64a0d8d6c7d6bdc80e9d4a019fd714c1ac3ca5a992775c83af81138

                              SHA512

                              c3af170adf177d942c3bf3cd43453b191e7f61084b23ee7c60b04cfa71c03554f760d6ffb8892525f9d69da94dcad7493b33d7f922df9f4533f7e48d96df57b1

                            • C:\Users\Admin\AppData\Local\Temp\Qf9bALi5DQ.bat

                              Filesize

                              246B

                              MD5

                              2a475f2eea0f1ae3117342043d89a4f9

                              SHA1

                              c8796202fedc7a6b5b8dfcab878c564618365208

                              SHA256

                              c15eb42d5718a340396a5a6792c28c82ceca1ae9d384ab639733ef9e8a798c1f

                              SHA512

                              70cc4a7a2c19227862e71577b9554340d3daedafa800cf065d47f5053c8d76a9285194d7f96ff3ba8ef775c3a9cb8cd6e7afa963bf2bb6a8a451e9713514e3c7

                            • C:\Users\Admin\AppData\Local\Temp\b9Anfm3pCF.bat

                              Filesize

                              198B

                              MD5

                              cabe8b7b0d7aca0ac7690df1761d6b5d

                              SHA1

                              6b08f27ab978e028168d2a669d4fa97020af6531

                              SHA256

                              08b196f6aa063280abc3f66c8f98d744eb710dd99102de05d5b95efbee6cf964

                              SHA512

                              7cafca5090dcaa069102647a2d4f26dc67dc181c1c906ab51a442c2b4d29293b381f63a2eea575d41be87e0a2a963155a8faae6a2250d37597b7cb72852f6773

                            • C:\Users\Admin\AppData\Local\Temp\df0NLUfleM.bat

                              Filesize

                              198B

                              MD5

                              6dbac3ef377c2ada0010f8e9d0aeb10a

                              SHA1

                              9a7c55d37aba140b2b323cac04fe951fd26638b7

                              SHA256

                              ab01e36fcd3d0a45ef7d4edc3c0674c3df4cbeded4ac0e2547ddf295ad6e2ee8

                              SHA512

                              80267b38b6c4c6815b31e414d49bc9328317298c91925b1db45049badb05d5b0619736673687af1d290eeb328dd3c17a786a655a400aa7a91312a9ef0c88dec7

                            • C:\Users\Admin\AppData\Local\Temp\jpLz1yvSlu.bat

                              Filesize

                              198B

                              MD5

                              083093ea408df50ec4753bc305e11fcd

                              SHA1

                              334c778b0a9fd9139e4316fe24aab2ce7054d94f

                              SHA256

                              db934508a3033f8ceccfc5eaa2946ea44df64d0ee307c30344285fd31cb03e99

                              SHA512

                              71d1c4b95acab4b350fb84834f5ca33f183eba24823823ef65b247b381ae83952d1355ef8e1e09133f98f12eb1d4a48120e589af3e5ef65145be5ecdae62790a

                            • C:\Users\Admin\AppData\Local\Temp\r7mooz1sjZ.bat

                              Filesize

                              246B

                              MD5

                              f51c354614fe74a6d3e2a3291e00b75e

                              SHA1

                              773585da32f7141a6a0d97cec0adf544176c0fde

                              SHA256

                              8e14148cb11f5cf3ae2488b7670c32f333f854596db4f80c01f1c6be59caea6f

                              SHA512

                              a9bd9530d24d522a823703b55b3cb6ad0ec9a2a12d503ff5c62817eec97be9b096827679614cec1a6c808f110f40759ed8cfa524abced45c434cc5fcb720752f

                            • C:\Users\Admin\AppData\Local\Temp\zxsEHcgshH.bat

                              Filesize

                              198B

                              MD5

                              1fef13c5f6f64d16e674887e338f9388

                              SHA1

                              5daa595df960e0822bd16d9247f6e40c9ddcd9ae

                              SHA256

                              284a8149accdb5df5c7da32fb777dc2ce9bcf5e35c52dce423a17b62e864ed26

                              SHA512

                              150ef6efa6d0c3361cca1cffd91fbc5010003534a08fa5feda98e527716c5af023dcbf38236d97eae93bea3fc36b66f2056d191b1f45d9e4919b673bba3483fb

                            • memory/1672-208-0x0000000001360000-0x00000000016E6000-memory.dmp

                              Filesize

                              3.5MB

                            • memory/1732-74-0x0000000000DF0000-0x0000000001176000-memory.dmp

                              Filesize

                              3.5MB

                            • memory/2344-18-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2344-45-0x000000001B5B0000-0x000000001B60A000-memory.dmp

                              Filesize

                              360KB

                            • memory/2344-0-0x000007FEF57D3000-0x000007FEF57D4000-memory.dmp

                              Filesize

                              4KB

                            • memory/2344-17-0x0000000000AE0000-0x0000000000AF8000-memory.dmp

                              Filesize

                              96KB

                            • memory/2344-29-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2344-28-0x0000000000CC0000-0x0000000000CD2000-memory.dmp

                              Filesize

                              72KB

                            • memory/2344-26-0x0000000000A80000-0x0000000000A8E000-memory.dmp

                              Filesize

                              56KB

                            • memory/2344-24-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2344-23-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2344-22-0x0000000000A70000-0x0000000000A80000-memory.dmp

                              Filesize

                              64KB

                            • memory/2344-20-0x0000000000A60000-0x0000000000A70000-memory.dmp

                              Filesize

                              64KB

                            • memory/2344-31-0x0000000000B00000-0x0000000000B10000-memory.dmp

                              Filesize

                              64KB

                            • memory/2344-32-0x000007FEF57D3000-0x000007FEF57D4000-memory.dmp

                              Filesize

                              4KB

                            • memory/2344-35-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2344-34-0x0000000000CE0000-0x0000000000CF6000-memory.dmp

                              Filesize

                              88KB

                            • memory/2344-37-0x0000000000D00000-0x0000000000D12000-memory.dmp

                              Filesize

                              72KB

                            • memory/2344-39-0x0000000000B10000-0x0000000000B1E000-memory.dmp

                              Filesize

                              56KB

                            • memory/2344-41-0x0000000000B20000-0x0000000000B30000-memory.dmp

                              Filesize

                              64KB

                            • memory/2344-43-0x0000000000D20000-0x0000000000D30000-memory.dmp

                              Filesize

                              64KB

                            • memory/2344-15-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2344-47-0x0000000000D30000-0x0000000000D3E000-memory.dmp

                              Filesize

                              56KB

                            • memory/2344-49-0x0000000000D40000-0x0000000000D50000-memory.dmp

                              Filesize

                              64KB

                            • memory/2344-51-0x00000000024E0000-0x00000000024EE000-memory.dmp

                              Filesize

                              56KB

                            • memory/2344-53-0x0000000002510000-0x0000000002528000-memory.dmp

                              Filesize

                              96KB

                            • memory/2344-55-0x000000001AA00000-0x000000001AA4E000-memory.dmp

                              Filesize

                              312KB

                            • memory/2344-14-0x00000000004B0000-0x00000000004C0000-memory.dmp

                              Filesize

                              64KB

                            • memory/2344-71-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2344-12-0x0000000000AC0000-0x0000000000ADC000-memory.dmp

                              Filesize

                              112KB

                            • memory/2344-73-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2344-10-0x00000000004A0000-0x00000000004AE000-memory.dmp

                              Filesize

                              56KB

                            • memory/2344-8-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2344-6-0x0000000000A90000-0x0000000000AB6000-memory.dmp

                              Filesize

                              152KB

                            • memory/2344-1-0x0000000000D50000-0x00000000010D6000-memory.dmp

                              Filesize

                              3.5MB

                            • memory/2344-7-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2344-2-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2344-4-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2344-3-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2956-181-0x00000000002E0000-0x0000000000666000-memory.dmp

                              Filesize

                              3.5MB

                            • memory/2992-127-0x00000000003E0000-0x0000000000766000-memory.dmp

                              Filesize

                              3.5MB

                            • memory/3000-154-0x0000000000330000-0x00000000006B6000-memory.dmp

                              Filesize

                              3.5MB