Analysis

  • max time kernel
    12s
  • max time network
    13s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-11-2024 08:12

General

  • Target

    Nurik.exe

  • Size

    1.9MB

  • MD5

    1d81f2dcae2cad16ad719a714414ccf6

  • SHA1

    57aaeab4ec3ba5d0738684256d4ec2416ed85981

  • SHA256

    104a911945f430c05ed156633a3fb316634218cb5510dc6df373a23ff073238c

  • SHA512

    13cff621392ef6a69ca88e42ec36f64391ea58145e8851535a6b41ee120c59d3842cd05325c844280925a751b8ed10143f3efff9c378d975bc78d89fb6416b8b

  • SSDEEP

    24576:h2G/nvxW3Wd0qOQqfjhiF+eSmd57d2lDPRGy+UddyFqVg+BI/uG4AKkLkhu0:hbA3LuqO+Fm8RUvtFqueI/ckLkR

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Nurik.exe
    "C:\Users\Admin\AppData\Local\Temp\Nurik.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\reviewwinSessionhostcommon\Txzzu7tsLbyOTjIrlPW5YR22FQ.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:640
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\reviewwinSessionhostcommon\JS95NsahAYHQx.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\reviewwinSessionhostcommon\SurrogateCommon.exe
          "C:\reviewwinSessionhostcommon\SurrogateCommon.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\reviewwinSessionhostcommon\JS95NsahAYHQx.bat

    Filesize

    51B

    MD5

    9c99f272c55f24c38a3d732b84ee715e

    SHA1

    36bb0afdeec66024499b72208280fb01228f18e8

    SHA256

    3d4a917d49a46a40bb4d22b101c01c390f9ee1a1ecca0dd59b726df6e9dc9867

    SHA512

    8ce75d5f3ecabfb493a47a71a76ac9b4d7c39fc04160c87fb60e2453f02104da9ef7f26b0c78ea55beea11240e2c47c0cc61326ce71a14dac98c02b5fc88b072

  • C:\reviewwinSessionhostcommon\SurrogateCommon.exe

    Filesize

    1.4MB

    MD5

    ea71569b0e51e03231229d19a6b8199b

    SHA1

    d46bf331915a0dea8512c6616bedee508a1496a7

    SHA256

    89f2f11a0e44dfd721f5994912632a028e4e628df4a8df305695d473f0d042a4

    SHA512

    859255b77861b65682e2668ebbd3536b7b2dcb5c26b699017330c701531e2dbb35ba4eb5b001a8c87143257f94ea5a1beddf49184136372f304811d7ab3f1e87

  • C:\reviewwinSessionhostcommon\Txzzu7tsLbyOTjIrlPW5YR22FQ.vbe

    Filesize

    216B

    MD5

    377212779c8949d887a9c98109692f94

    SHA1

    a219371560cefee4bce8beb28edba33e832c048e

    SHA256

    1bcc22a387d65049c14dac5288fd9afbe6d677393551e181e53c7c4a4a5c4a03

    SHA512

    c2b24c446f9b0f01fee1d5aa7304df9c0bb19e22190c38626740cdcf1d417f23bcc3ffb49f9c71bd7de5529427a031640bc2de48c5d1de772d86956cbfafba4c

  • memory/4296-12-0x00007FFFAB133000-0x00007FFFAB135000-memory.dmp

    Filesize

    8KB

  • memory/4296-13-0x0000000000900000-0x0000000000A6A000-memory.dmp

    Filesize

    1.4MB

  • memory/4296-14-0x0000000001230000-0x000000000123E000-memory.dmp

    Filesize

    56KB