Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 12:55
Behavioral task
behavioral1
Sample
Genshin Impact.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Genshin Impact.exe
Resource
win10v2004-20241007-en
General
-
Target
Genshin Impact.exe
-
Size
1.6MB
-
MD5
b4bb269011c062cb169969258ab0e1b9
-
SHA1
6f17b1266eabfad46eee405f8245c604468a52c5
-
SHA256
bd1d4e5e6380d4e4c398b3bd1f3bfc20ffa576c004773b1f637fd272b771c125
-
SHA512
e89088f16658ac3d5d69808080b47638a4f5d699ac3569cc88b07e3a8f4666e89e570cfb4512c161e8ccf9b5537e7ea281fc440b06b7484af33b94f55ecacd43
-
SSDEEP
24576:u2G/nvxW3WieC9LFgyTXNVqSwYFBQS3qojUYBo1wKrYUwBIlRicmIvvN9Zl:ubA3jNFguXDx3qoj9BqwenWIlIIvXX
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
resource yara_rule behavioral2/files/0x000a000000023b95-10.dat dcrat behavioral2/memory/4316-13-0x0000000000230000-0x000000000037C000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Genshin Impact.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 4316 PortwebSaves.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Genshin Impact.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings Genshin Impact.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4316 PortwebSaves.exe 4316 PortwebSaves.exe 4316 PortwebSaves.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4316 PortwebSaves.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 628 wrote to memory of 2180 628 Genshin Impact.exe 84 PID 628 wrote to memory of 2180 628 Genshin Impact.exe 84 PID 628 wrote to memory of 2180 628 Genshin Impact.exe 84 PID 2180 wrote to memory of 2972 2180 WScript.exe 96 PID 2180 wrote to memory of 2972 2180 WScript.exe 96 PID 2180 wrote to memory of 2972 2180 WScript.exe 96 PID 2972 wrote to memory of 4316 2972 cmd.exe 98 PID 2972 wrote to memory of 4316 2972 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Genshin Impact.exe"C:\Users\Admin\AppData\Local\Temp\Genshin Impact.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\winsessionnet\qmazbV2JlRldI.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\winsessionnet\kudjk2JZBqNfIbV0H.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\winsessionnet\PortwebSaves.exe"C:\winsessionnet\PortwebSaves.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5ad823965fda5d6901ab6a2bc0e153cee
SHA17ebaec14300ef03501785e9bc1637963ebbc49b0
SHA2562c9a19274f314a4f2f728c51dc117196f7c176c6952275e3ba58184a2d6a95d9
SHA5121c8897f5abbed300029c229b52c5fefd4ec1731cf71b1463f2a81ee085ea0190d766684b2c3057eb0fa6ddedfe97aae9c6c940bb8cdd90c226c02b406c42f9b9
-
Filesize
35B
MD5b57373910e83f55b01da9606c160d606
SHA1bdd2323421bf54c1ab2a40d2f21710c5ddf6b86e
SHA256eed136c4973c9c837ba407c3c8dc5d70b9ad30c213628ab93c29649731207065
SHA51232cd79677e54f51efa739b8b8d33e9834ccb7db05e0d3d56c21383968391007f54f05b92750c9dfc6b98bad362e3dca403f98b20a46e95a51ebdf3da70da1cbc
-
Filesize
207B
MD5c976abe88c50259f846e4a7f9219c0e4
SHA10b8221670e970136114bfa60e95226cdfeda740e
SHA256c912de4503819861b8f5053c4da777a73279aba052f9d4710cdb9facd62304d7
SHA512e0fe8084c80f37e57b86fc3110f72acaec2e81dedf6a90488960891c2bd8d30728ec7ad763b7e8be299e56becfdbce93c08004efbe9eab92f9808f6109675715