Analysis
-
max time kernel
129s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 02:15
Behavioral task
behavioral1
Sample
38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe
Resource
win7-20240903-en
General
-
Target
38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe
-
Size
675KB
-
MD5
314420bac969bcfb9510a0e8cc3686d6
-
SHA1
66f1d0a60a2727970476a105c88883f37270e30f
-
SHA256
38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26
-
SHA512
debf908add95aa0849451aef830e5e71724247d352dcb5dad6b02dca0d54e4e915a9430de80d970a4e7ef3749eb2fc7c6fa7839348d84f546d5934d713e7569c
-
SSDEEP
12288:C9X1yJ7/pZY7fiCI/YBfULiXPrQfkXmm1RhdLB9XFy+nM6D+:CVc7EaCQYBfcE1ZM6D+
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 3 IoCs
resource yara_rule behavioral1/memory/1780-1-0x0000000000250000-0x0000000000300000-memory.dmp family_dcrat_v2 behavioral1/files/0x00070000000187a2-16.dat family_dcrat_v2 behavioral1/memory/2412-27-0x00000000001B0000-0x0000000000260000-memory.dmp family_dcrat_v2 -
Executes dropped EXE 1 IoCs
pid Process 2412 dllhost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\smss.exe 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\69ddcba757bf72 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2448 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2448 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe 2412 dllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2412 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe Token: SeDebugPrivilege 2412 dllhost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1780 wrote to memory of 2420 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 29 PID 1780 wrote to memory of 2420 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 29 PID 1780 wrote to memory of 2420 1780 38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe 29 PID 2420 wrote to memory of 2580 2420 cmd.exe 31 PID 2420 wrote to memory of 2580 2420 cmd.exe 31 PID 2420 wrote to memory of 2580 2420 cmd.exe 31 PID 2420 wrote to memory of 2448 2420 cmd.exe 32 PID 2420 wrote to memory of 2448 2420 cmd.exe 32 PID 2420 wrote to memory of 2448 2420 cmd.exe 32 PID 2420 wrote to memory of 2412 2420 cmd.exe 33 PID 2420 wrote to memory of 2412 2420 cmd.exe 33 PID 2420 wrote to memory of 2412 2420 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe"C:\Users\Admin\AppData\Local\Temp\38b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\w30cntzK4R.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2580
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2448
-
-
C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\dllhost.exe"C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\dllhost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
675KB
MD5314420bac969bcfb9510a0e8cc3686d6
SHA166f1d0a60a2727970476a105c88883f37270e30f
SHA25638b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26
SHA512debf908add95aa0849451aef830e5e71724247d352dcb5dad6b02dca0d54e4e915a9430de80d970a4e7ef3749eb2fc7c6fa7839348d84f546d5934d713e7569c
-
Filesize
202B
MD53394ab91fd0a2dd7d7b99c4a652291c4
SHA14aaf4d5c06237cd0883d6c3fbf683c4f12d9f8b5
SHA25652daa1e2427b4d6688259cbf4d338482cc11553cba31c2387297c5a3d5bfc6c9
SHA5120a4af3d9f06b22f4f4434bcd323641450576710f24d2fa470e7b3626bfa66b583022cfb1bffd211c5f00223bed49a06852832ffdd4de61ec2cf91838e8298fb3