Analysis
-
max time kernel
121s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 17:59
Static task
static1
Behavioral task
behavioral1
Sample
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe
Resource
win10v2004-20241007-en
General
-
Target
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe
-
Size
4.2MB
-
MD5
2608e3e0677de70d9e1eb6b108f7bdfd
-
SHA1
c7d42a6abb29fcbde1cdc13f681d449ced6b8a50
-
SHA256
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205
-
SHA512
e1664a02f3e0b101ada2ef5af8fdebc4b75aecc795c1fa04cab36e7b478c11516d8daba1f65159ad7d8c2b9680dd771fac5ba24218b861807851042f1ba82c9d
-
SSDEEP
49152:2chlG/HMHyN4pAEx/7dvDhzETOIntW9y3yP2QAuxQzxEzwYjiwVTkO2kZBtk8hJq:
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/files/0x00450000000120f4-8.dat Nirsoft -
Executes dropped EXE 4 IoCs
pid Process 2068 sqls102.exe 1656 drivEn102.exe 2692 surrogateProviderRuntime.exe 1708 taskhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2860 cmd.exe 2860 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Uninstall Information\sppsvc.exe surrogateProviderRuntime.exe File opened for modification C:\Program Files (x86)\Uninstall Information\sppsvc.exe surrogateProviderRuntime.exe File created C:\Program Files (x86)\Uninstall Information\0a1fd5f707cd16 surrogateProviderRuntime.exe File created C:\Program Files (x86)\Uninstall Information\taskhost.exe surrogateProviderRuntime.exe File created C:\Program Files (x86)\Uninstall Information\b75386f1303e64 surrogateProviderRuntime.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Workflow.Run#\462293b97f4b8f084192a7fbae47269f\dwm.exe surrogateProviderRuntime.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Workflow.Run#\462293b97f4b8f084192a7fbae47269f\6cb0b6c459d5d3 surrogateProviderRuntime.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sqls102.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drivEn102.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2792 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2792 PING.EXE -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 2692 surrogateProviderRuntime.exe 1708 taskhost.exe 1708 taskhost.exe 1708 taskhost.exe 1708 taskhost.exe 1708 taskhost.exe 1708 taskhost.exe 1708 taskhost.exe 1708 taskhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2068 sqls102.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeBackupPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeBackupPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe Token: SeSecurityPrivilege 2068 sqls102.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2068 2156 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 30 PID 2156 wrote to memory of 2068 2156 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 30 PID 2156 wrote to memory of 2068 2156 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 30 PID 2156 wrote to memory of 2068 2156 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 30 PID 2156 wrote to memory of 1656 2156 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 31 PID 2156 wrote to memory of 1656 2156 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 31 PID 2156 wrote to memory of 1656 2156 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 31 PID 2156 wrote to memory of 1656 2156 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 31 PID 1656 wrote to memory of 2820 1656 drivEn102.exe 32 PID 1656 wrote to memory of 2820 1656 drivEn102.exe 32 PID 1656 wrote to memory of 2820 1656 drivEn102.exe 32 PID 1656 wrote to memory of 2820 1656 drivEn102.exe 32 PID 2820 wrote to memory of 2860 2820 WScript.exe 34 PID 2820 wrote to memory of 2860 2820 WScript.exe 34 PID 2820 wrote to memory of 2860 2820 WScript.exe 34 PID 2820 wrote to memory of 2860 2820 WScript.exe 34 PID 2860 wrote to memory of 2692 2860 cmd.exe 36 PID 2860 wrote to memory of 2692 2860 cmd.exe 36 PID 2860 wrote to memory of 2692 2860 cmd.exe 36 PID 2860 wrote to memory of 2692 2860 cmd.exe 36 PID 2692 wrote to memory of 1808 2692 surrogateProviderRuntime.exe 37 PID 2692 wrote to memory of 1808 2692 surrogateProviderRuntime.exe 37 PID 2692 wrote to memory of 1808 2692 surrogateProviderRuntime.exe 37 PID 1808 wrote to memory of 2876 1808 cmd.exe 39 PID 1808 wrote to memory of 2876 1808 cmd.exe 39 PID 1808 wrote to memory of 2876 1808 cmd.exe 39 PID 1808 wrote to memory of 2792 1808 cmd.exe 40 PID 1808 wrote to memory of 2792 1808 cmd.exe 40 PID 1808 wrote to memory of 2792 1808 cmd.exe 40 PID 1808 wrote to memory of 1708 1808 cmd.exe 41 PID 1808 wrote to memory of 1708 1808 cmd.exe 41 PID 1808 wrote to memory of 1708 1808 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe"C:\Users\Admin\AppData\Local\Temp\b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\sqls102.exe"C:\Users\Admin\AppData\Local\Temp\sqls102.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\drivEn102.exe"C:\Users\Admin\AppData\Local\Temp\drivEn102.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\browserFont\TGs0Esj.vbe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\browserFont\mb1tDxvM2A2eBj7RCoqZN.bat" "4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\browserFont\surrogateProviderRuntime.exe"C:\browserFont/surrogateProviderRuntime.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5GcyhGFLdh.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:2876
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2792
-
-
C:\Program Files (x86)\Uninstall Information\taskhost.exe"C:\Program Files (x86)\Uninstall Information\taskhost.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185B
MD5e996356ecf8f0dfc02050400ac94b9c4
SHA13cda80b91166fc3c8f0397b68bb20bf436193f7b
SHA2561e01a1a18c8cc9255e83afa66da32c24ba1dfe719a87f6e60d5cb6006729eca8
SHA5121976c52f57900ad8649504a824b3400caf4dbb7dca030d8a7e938a865e8e387467a1e8c43386151b5ffe82d2d9f5ed8278ee0cee42c50aa3ee6489f3e0edd6d9
-
Filesize
1.4MB
MD5c04481d4d848f2edb537085ffdef01c5
SHA1d0c1d5c2efdc1460b577720eb633c23876ada172
SHA256a9cefa666264302fae07664e374cc1cf3b29a956f1da1219013853c66b4b0c46
SHA512f3edf74e3ee0438999a64496cafa5a6485efae74f54674d73a2b4979de0483c896e28fab2376c40399d9cd6d627c56fefe5c652ed00671487250dacb7a05833c
-
Filesize
130KB
MD5f27a284ef9b018cdd2a98a7b78ccdcb3
SHA167e260b11e6227c18cae8925b4f6899103c607f2
SHA256af86dc3f76d39b67b967a3b714e9e70ed43eec8d3871e9691cb45d84372b53fb
SHA5129a8811f13517748539308a70933b126a3348407f397bf30f903019379f927532c64015853b94acf21bdbc554d638a0265d4394d026e289103db06fe93fe5524b
-
Filesize
211B
MD5fc357bcdbf37df98247d511ccd38d22d
SHA10c4678b855b654c4a7182acec115482f3c7e4c5c
SHA25641e73fcfa7fda29c62dd424e2eef794ba21c69239a1d0e4f92f29257162d4dc1
SHA512d5370ef435382cd3192cd2b79374b270cf107b3f87132c8b09ce159603062c7f331f8b155a90789a68eaae85908bb9a3a1593247594f215412018ad0b061879d
-
Filesize
85B
MD56bf7667bb9a6e818187ce67416332560
SHA157ebd093a1349a374aa13851cd1ff437b0c8fe14
SHA2568ca638a3493bfef0418b1abc231eeac08d86f64853cbbf0ba8ad0d3d0d400d76
SHA5121105eb7d88058d4a646a4cc0937c813ecbb36a988ce66e739a8b24147f2038860ed9f2ca4486ed7233d79692bdc2ee9ca933b3b00d8233d91fc3f9447f93a0be
-
Filesize
1.6MB
MD5418fcd513c372d02a740a87d9c4d0d5f
SHA132180f6394d72e1f5ca2cfebbe683b6fbcb8da34
SHA25667c96692f7eff8187ab7a8d54cb15cfa9ae91732c72a6bac093982d1b4838411
SHA5126eb8ebc542e8653e4ef8133c23c3618cd12203adbc6761fb7871b0c1df65609182fec13536cf28687db618b7c9a21dd06f90f77018c4cc3e778cc7136cc07458