General
-
Target
Temp Spoofer.exe
-
Size
80KB
-
Sample
241124-bn4xgswqav
-
MD5
5374b62745b86ac86e6a4c89921182cd
-
SHA1
921a4a2d5c6489bc5a0b5697bf19678495dfadbf
-
SHA256
550b6cbdefab0c183b41f9fa96c8ed0797efaf13081fd6ca745f30670d8725f0
-
SHA512
e56cb7ebd3be67e94776043f885412e5f42cfc0c258fe9a2f2fe3dd79f115b0416f64df5cfc82fa275ada0787224ece1400a86bd9567f6e014361ef87082461f
-
SSDEEP
1536:brvp14xgT6UellETcCMUlzLCYzha6a2UWwZyeMcxV6MFae:bbVjnTcCMUZLZBUWwZhMcCMFa
Static task
static1
Malware Config
Targets
-
-
Target
Temp Spoofer.exe
-
Size
80KB
-
MD5
5374b62745b86ac86e6a4c89921182cd
-
SHA1
921a4a2d5c6489bc5a0b5697bf19678495dfadbf
-
SHA256
550b6cbdefab0c183b41f9fa96c8ed0797efaf13081fd6ca745f30670d8725f0
-
SHA512
e56cb7ebd3be67e94776043f885412e5f42cfc0c258fe9a2f2fe3dd79f115b0416f64df5cfc82fa275ada0787224ece1400a86bd9567f6e014361ef87082461f
-
SSDEEP
1536:brvp14xgT6UellETcCMUlzLCYzha6a2UWwZyeMcxV6MFae:bbVjnTcCMUZLZBUWwZhMcCMFa
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1