Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 09:16
Static task
static1
Behavioral task
behavioral1
Sample
D1E1AE8DCED915651E8F1DB114C073EA.exe
Resource
win7-20240903-en
General
-
Target
D1E1AE8DCED915651E8F1DB114C073EA.exe
-
Size
2.8MB
-
MD5
d1e1ae8dced915651e8f1db114c073ea
-
SHA1
ae0f6cd564fd95889eb166c54bee37567f27add4
-
SHA256
bca73c47a374e5afe3a2ffbb42c1692fd096ebfe0af45ad5c5e12a9e37cd0e2e
-
SHA512
e0ff5e949117808d631680a27d27483679f174a6cedcdf16f0e2c1bb479144c6c59c7754ef7eb8aa65a0562c624ed06864dc8ad9d0e2c53428bbcc0b6cd6c2ad
-
SSDEEP
49152:qR5omlL3SICIhCj3q4Hdliu/syu/m4cq1Inf6ZkYU6wUd9D9+tho51N009:qR5oiiICy8HTiuPiR1If6iYUMmy51yO
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 3 IoCs
resource yara_rule behavioral1/files/0x000500000001878c-63.dat family_dcrat_v2 behavioral1/memory/2172-66-0x0000000000290000-0x000000000035A000-memory.dmp family_dcrat_v2 behavioral1/memory/1952-94-0x0000000001140000-0x000000000120A000-memory.dmp family_dcrat_v2 -
Executes dropped EXE 8 IoCs
pid Process 2284 7z.exe 2816 7z.exe 2736 7z.exe 1920 7z.exe 2640 7z.exe 2656 7z.exe 2172 Installer.exe 1952 lsass.exe -
Loads dropped DLL 12 IoCs
pid Process 2120 cmd.exe 2284 7z.exe 2120 cmd.exe 2816 7z.exe 2120 cmd.exe 2736 7z.exe 2120 cmd.exe 1920 7z.exe 2120 cmd.exe 2640 7z.exe 2120 cmd.exe 2656 7z.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\wininit.exe Installer.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\56085415360792 Installer.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Installer.exe Installer.exe File created C:\Program Files (x86)\Microsoft Office\Office14\d963b2d1f922ee Installer.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\ja-JP\services.exe Installer.exe File created C:\Windows\ja-JP\c5b4cb5e9653cc Installer.exe File created C:\Windows\ja-JP\services.exe Installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D1E1AE8DCED915651E8F1DB114C073EA.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe 2172 Installer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1952 lsass.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeRestorePrivilege 2284 7z.exe Token: 35 2284 7z.exe Token: SeSecurityPrivilege 2284 7z.exe Token: SeSecurityPrivilege 2284 7z.exe Token: SeRestorePrivilege 2816 7z.exe Token: 35 2816 7z.exe Token: SeSecurityPrivilege 2816 7z.exe Token: SeSecurityPrivilege 2816 7z.exe Token: SeRestorePrivilege 2736 7z.exe Token: 35 2736 7z.exe Token: SeSecurityPrivilege 2736 7z.exe Token: SeSecurityPrivilege 2736 7z.exe Token: SeRestorePrivilege 1920 7z.exe Token: 35 1920 7z.exe Token: SeSecurityPrivilege 1920 7z.exe Token: SeSecurityPrivilege 1920 7z.exe Token: SeRestorePrivilege 2640 7z.exe Token: 35 2640 7z.exe Token: SeSecurityPrivilege 2640 7z.exe Token: SeSecurityPrivilege 2640 7z.exe Token: SeRestorePrivilege 2656 7z.exe Token: 35 2656 7z.exe Token: SeSecurityPrivilege 2656 7z.exe Token: SeSecurityPrivilege 2656 7z.exe Token: SeDebugPrivilege 2172 Installer.exe Token: SeDebugPrivilege 1952 lsass.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2120 2360 D1E1AE8DCED915651E8F1DB114C073EA.exe 30 PID 2360 wrote to memory of 2120 2360 D1E1AE8DCED915651E8F1DB114C073EA.exe 30 PID 2360 wrote to memory of 2120 2360 D1E1AE8DCED915651E8F1DB114C073EA.exe 30 PID 2360 wrote to memory of 2120 2360 D1E1AE8DCED915651E8F1DB114C073EA.exe 30 PID 2120 wrote to memory of 2752 2120 cmd.exe 32 PID 2120 wrote to memory of 2752 2120 cmd.exe 32 PID 2120 wrote to memory of 2752 2120 cmd.exe 32 PID 2120 wrote to memory of 2284 2120 cmd.exe 33 PID 2120 wrote to memory of 2284 2120 cmd.exe 33 PID 2120 wrote to memory of 2284 2120 cmd.exe 33 PID 2120 wrote to memory of 2816 2120 cmd.exe 34 PID 2120 wrote to memory of 2816 2120 cmd.exe 34 PID 2120 wrote to memory of 2816 2120 cmd.exe 34 PID 2120 wrote to memory of 2736 2120 cmd.exe 35 PID 2120 wrote to memory of 2736 2120 cmd.exe 35 PID 2120 wrote to memory of 2736 2120 cmd.exe 35 PID 2120 wrote to memory of 1920 2120 cmd.exe 36 PID 2120 wrote to memory of 1920 2120 cmd.exe 36 PID 2120 wrote to memory of 1920 2120 cmd.exe 36 PID 2120 wrote to memory of 2640 2120 cmd.exe 37 PID 2120 wrote to memory of 2640 2120 cmd.exe 37 PID 2120 wrote to memory of 2640 2120 cmd.exe 37 PID 2120 wrote to memory of 2656 2120 cmd.exe 38 PID 2120 wrote to memory of 2656 2120 cmd.exe 38 PID 2120 wrote to memory of 2656 2120 cmd.exe 38 PID 2120 wrote to memory of 2732 2120 cmd.exe 39 PID 2120 wrote to memory of 2732 2120 cmd.exe 39 PID 2120 wrote to memory of 2732 2120 cmd.exe 39 PID 2120 wrote to memory of 2172 2120 cmd.exe 40 PID 2120 wrote to memory of 2172 2120 cmd.exe 40 PID 2120 wrote to memory of 2172 2120 cmd.exe 40 PID 2172 wrote to memory of 1992 2172 Installer.exe 41 PID 2172 wrote to memory of 1992 2172 Installer.exe 41 PID 2172 wrote to memory of 1992 2172 Installer.exe 41 PID 1992 wrote to memory of 536 1992 cmd.exe 43 PID 1992 wrote to memory of 536 1992 cmd.exe 43 PID 1992 wrote to memory of 536 1992 cmd.exe 43 PID 1992 wrote to memory of 596 1992 cmd.exe 44 PID 1992 wrote to memory of 596 1992 cmd.exe 44 PID 1992 wrote to memory of 596 1992 cmd.exe 44 PID 1992 wrote to memory of 1952 1992 cmd.exe 45 PID 1992 wrote to memory of 1952 1992 cmd.exe 45 PID 1992 wrote to memory of 1952 1992 cmd.exe 45 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2732 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\D1E1AE8DCED915651E8F1DB114C073EA.exe"C:\Users\Admin\AppData\Local\Temp\D1E1AE8DCED915651E8F1DB114C073EA.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\system32\mode.commode 65,103⤵PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p237578392143213652313078912 -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\system32\attrib.exeattrib +H "Installer.exe"3⤵
- Views/modifies file attributes
PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\main\Installer.exe"Installer.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HSOpHse4vt.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:536
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵PID:596
-
-
C:\Users\Default User\lsass.exe"C:\Users\Default User\lsass.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD574ffffd7b1fb0e87b98e51d83ea8f0b9
SHA10d3a1d0636c00c1423499c09938d73ec61ce6411
SHA2569cb751ccff40061a3d735c54bbe875ce0314b0785c0c767db59580ab4f86d724
SHA5121f66b469730c971fb45374e74d9cf5ed57becdfc9c760be66c90f03a5905ac1643155cbaa512ea8ea88fa4ca61e48cfb6fbde7af764eb527c6802952a055b509
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
2.2MB
MD57e703968b4e13722892cf227f37b392d
SHA14eba1cbed7b31cdb2ffc9ee7c200bd977af068b0
SHA256965d0ba59eb90d3b89212ab5d7d02ecd5712feb91eee7bf9e82303d872341953
SHA51274099ed995ce1b92a95243cebfefbcb32e660468032d12c65437e412ebfb2d23efdf6a6ea7158e06e2574775258862307143efd9ff662b1587e97383f87e299b
-
Filesize
785KB
MD5acdd5f8a230ebcf456977ac3d1ea6eca
SHA1e0a985b5c9e99d3b1e1141938afeecdc02811946
SHA25645fc98c0fe74f360e57e80e42142c4d5745652c198b298ca7f8ecf4dba560c21
SHA5125372fc4ed4ff8cb54f2139e552c7710f2ad8b4f59bc5743d02a1830a98f2c45553bf807545bf6c93952ae786bc1bd9eb480b98ddf5c924dcc0f5aef9abee2f3d
-
Filesize
315KB
MD555a752087f41b97f460d16cd084c1e5d
SHA19b1379a8d2fba0322e4ca6274b609d032d703efc
SHA25647b472974b1d440f6754b09fb0f053d11deb10734cb60a69d2c7bcbdb9ddd4f6
SHA51222d00f24358854bb79dfe244e9033e14969fe1181a9adff9f4be56864af401da821b2087ef0e9c03419f097d4d21451b290bc5243a015f95844094c6bcb913e2
-
Filesize
315KB
MD599941e921b39fbdbbad43c87f518488a
SHA16413ddd612ba05a330761c6d0ecec67e6f08b557
SHA256d521a8feb747997745848003e56981246828cc02f2534c7620442886c38d30a3
SHA512502b30672bc20713e3a0e8d28c1d649b24301f067367fd41e086deb55daf90da86665771ca0fedb07ed637deb10f789717c3377261ec96d6f6d4c4d88ce504a6
-
Filesize
315KB
MD56a9bd1c18b86241e8752bd9d1a9fcdc5
SHA177cc56608cc38c8e1295299af82eb661ae8b41bf
SHA2560285293c2c4829281fdc81ce4e1755425ed884364883008b608dca0d0421914b
SHA512a1f2ed6c9e63ddfc8897b494593f8188a91b217e92509caca8f92f47184b1212bc1ec5e8885aa8f4e8076e081ff85278107101b45d476fbc3d12494082735807
-
Filesize
316KB
MD545b44488f58e268aee145714065d01b1
SHA157d788efaa8e83d909a2bfd54fe735925818c574
SHA256fae5dc0c1e2965b4e1f156e27ebfae84a5a392a9c1d238c023f4635c520815e0
SHA51254c2144629f75d4e1d563270cc206ec568bf844ff66634626153797c1ea47224928301defc13823b2d79de861302e2b69b753e88b99b7c852fbb85f736cdbc9a
-
Filesize
1.9MB
MD51b7169f7136811025acefcbd57c4c3aa
SHA16b0ce940277dc6573248ee817a17101d0c8e8d82
SHA256b02e6aa68ee324b379a371f1f28960fabad6a7d3aef1bb7ca9e47e96f86ee55e
SHA512aed911a939ea65f2700ecb9493cb53ca2966538ff343c0145961ba5d343f1a94e136d70bac0b25cc21e6c22d51ecd6edd7177c96e751c417c317c3f967488b0b
-
Filesize
1.9MB
MD53ca63b69b8fecf3105fe03db79fe485e
SHA1299b02bc2ea3534300304afdc2fcdede1c50aaae
SHA256143aedd2b9be4342531a716d6c06e57ed02cd3e6fd0e61a5f0b810754b3d8931
SHA512185f0c807b895da4a46e06f540fbca3d93a38d42d7c5667925ca012cd67852fff5d2de0aa8eb75a29ac8f069fd7d6d7349ac3d81174c2d61495eac99985c5024
-
Filesize
473B
MD5888d8edcc3b71e613ea61ea10c012783
SHA1a5985a3a80b00287e7987262c5d452c4c5e92cfe
SHA2564a0ebfb38b6023319aee0249a2616a9153db091dcb8abb5189c165c0b3f47c3e
SHA5125d49219c24df5e88d66e704a9315e2015787a68f085bb6f2cf548abb96137e329ef5d551e9b2417df04392102824e0ac0e024809ed6088d8e429557a43e2b554