Analysis
-
max time kernel
11s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
Verify_advanced_encrypted.exe
Resource
win10v2004-20241007-en
General
-
Target
Verify_advanced_encrypted.exe
-
Size
25KB
-
MD5
937c41f1b4d53bca113f2aaf35985939
-
SHA1
422a01bf2701ac7c9f7dcbfc51b974544daadde3
-
SHA256
7f3ab101faf2bdfa164b1884ede53aface5c1ae6c28f4464b9750f9d31c43fcd
-
SHA512
9473795303b12419640783069bfe876d1dced371aedd632f8ff2f732acce06efa99df880e7aeaec29c20526f41b2193d671b9e0a2560d3503e66d9dccf78a8ac
-
SSDEEP
384:NaBkyPgdGJ3Ja7PXGcgGjsxxX5Hs0JxlA/1yBmDpTOOze3jFaJGiK2nLi7joK3MC:JYgg0ULM0K9SOzMWGrGi7joK3v
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Processes:
resource yara_rule behavioral1/files/0x0007000000023cb0-19.dat dcrat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
RarExtPackage.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RarExtPackage.exe -
Executes dropped EXE 2 IoCs
Processes:
RarExtPackage.exeDiscord.exepid Process 1460 RarExtPackage.exe 1440 Discord.exe -
Modifies WinLogon 2 TTPs 1 IoCs
Processes:
Verify_advanced_encrypted.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SystemConfig = "C:\\Program Files\\WinRAR\\RarExtPackage.exe" Verify_advanced_encrypted.exe -
Drops file in Program Files directory 1 IoCs
Processes:
Verify_advanced_encrypted.exedescription ioc Process File created C:\Program Files\WinRAR\RarExtPackage.exe Verify_advanced_encrypted.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
RarExtPackage.exeWScript.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RarExtPackage.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 1 IoCs
Processes:
RarExtPackage.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings RarExtPackage.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
Discord.exepid Process 1440 Discord.exe 1440 Discord.exe 1440 Discord.exe 1440 Discord.exe 1440 Discord.exe 1440 Discord.exe 1440 Discord.exe 1440 Discord.exe 1440 Discord.exe 1440 Discord.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Discord.exedescription pid Process Token: SeDebugPrivilege 1440 Discord.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Verify_advanced_encrypted.exeRarExtPackage.exedescription pid Process procid_target PID 4704 wrote to memory of 1460 4704 Verify_advanced_encrypted.exe 86 PID 4704 wrote to memory of 1460 4704 Verify_advanced_encrypted.exe 86 PID 4704 wrote to memory of 1460 4704 Verify_advanced_encrypted.exe 86 PID 1460 wrote to memory of 2992 1460 RarExtPackage.exe 90 PID 1460 wrote to memory of 2992 1460 RarExtPackage.exe 90 PID 1460 wrote to memory of 2992 1460 RarExtPackage.exe 90 PID 4704 wrote to memory of 1440 4704 Verify_advanced_encrypted.exe 92 PID 4704 wrote to memory of 1440 4704 Verify_advanced_encrypted.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Verify_advanced_encrypted.exe"C:\Users\Admin\AppData\Local\Temp\Verify_advanced_encrypted.exe"1⤵
- Modifies WinLogon
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Program Files\WinRAR\RarExtPackage.exe"C:\Program Files\WinRAR\RarExtPackage.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Chrome\9gF866gX.vbe"3⤵
- System Location Discovery: System Language Discovery
PID:2992
-
-
-
C:\Users\Admin\AppData\Local\Temp\Discord.exeC:\Users\Admin\AppData\Local\Temp\Discord.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5ec88bc94b1144c2c56d0a2d629856c05
SHA141abf0acfdd3e70bbd34e808ef576e3a8ca7351a
SHA256fcf21eb97245661c8cb307a80f499c78b427b930c4c39066a9ab4113ab17ce07
SHA512ce0639f732e4c17224be5a656164e0e04ab05a07578893ff92b3d9d487970d710c936a0c3d72efe6869e8783cd53b433bcdff9e24dace514940b0417f5e0697b
-
Filesize
270KB
MD5daef03c6a3b69a0a7bd267625950e6fe
SHA1d12b3ac41906d0e24eff0f79da4777af632f5d97
SHA2562f4f6f07426c34632ead288850bc2255e4d920dd18d28ced9a776830bacdf931
SHA512d891b4b63c097cdd6f8b93478e64fe7b4d86ba509136223bc45d4b588d75da642347911084d0725c3436acb65b68b0ae5f987449d672fe3ddd8b09b625de494f
-
Filesize
219B
MD56efb47109d1485e1b27493aee6f3384d
SHA168c95e99965433916c008fd64f33ddb10c0e9b2c
SHA2569796ee42ab68884385418febb48d0268e717c40c0b095df89b991c1ee5974f40
SHA5124827993024bb3e0406b55098180b94239bc098182c12991f541cec3d8e512870eb0407671f7dbc28f5d36d0a55a48e673618efc1b2196b8547f6d5e7b38f4dd9