Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 17:59
Static task
static1
Behavioral task
behavioral1
Sample
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe
Resource
win10v2004-20241007-en
General
-
Target
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe
-
Size
4.2MB
-
MD5
2608e3e0677de70d9e1eb6b108f7bdfd
-
SHA1
c7d42a6abb29fcbde1cdc13f681d449ced6b8a50
-
SHA256
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205
-
SHA512
e1664a02f3e0b101ada2ef5af8fdebc4b75aecc795c1fa04cab36e7b478c11516d8daba1f65159ad7d8c2b9680dd771fac5ba24218b861807851042f1ba82c9d
-
SSDEEP
49152:2chlG/HMHyN4pAEx/7dvDhzETOIntW9y3yP2QAuxQzxEzwYjiwVTkO2kZBtk8hJq:
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
Processes:
resource yara_rule behavioral2/files/0x000c000000023b88-8.dat Nirsoft -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exedrivEn380.exeWScript.exesurrogateProviderRuntime.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation drivEn380.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation surrogateProviderRuntime.exe -
Executes dropped EXE 4 IoCs
Processes:
sqls380.exedrivEn380.exesurrogateProviderRuntime.exeIdle.exepid Process 2256 sqls380.exe 4496 drivEn380.exe 3036 surrogateProviderRuntime.exe 1408 Idle.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 2 IoCs
Processes:
surrogateProviderRuntime.exedescription ioc Process File created C:\Windows\L2Schemas\smss.exe surrogateProviderRuntime.exe File created C:\Windows\L2Schemas\69ddcba757bf72 surrogateProviderRuntime.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
sqls380.exedrivEn380.exeWScript.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sqls380.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drivEn380.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Modifies registry class 2 IoCs
Processes:
drivEn380.exesurrogateProviderRuntime.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings drivEn380.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings surrogateProviderRuntime.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
surrogateProviderRuntime.exeIdle.exepid Process 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 3036 surrogateProviderRuntime.exe 1408 Idle.exe 1408 Idle.exe 1408 Idle.exe 1408 Idle.exe 1408 Idle.exe 1408 Idle.exe 1408 Idle.exe 1408 Idle.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
sqls380.exedescription pid Process Token: SeBackupPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeBackupPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeBackupPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe Token: SeSecurityPrivilege 2256 sqls380.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exedrivEn380.exeWScript.execmd.exesurrogateProviderRuntime.execmd.exedescription pid Process procid_target PID 4004 wrote to memory of 2256 4004 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 83 PID 4004 wrote to memory of 2256 4004 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 83 PID 4004 wrote to memory of 2256 4004 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 83 PID 4004 wrote to memory of 4496 4004 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 84 PID 4004 wrote to memory of 4496 4004 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 84 PID 4004 wrote to memory of 4496 4004 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 84 PID 4496 wrote to memory of 980 4496 drivEn380.exe 85 PID 4496 wrote to memory of 980 4496 drivEn380.exe 85 PID 4496 wrote to memory of 980 4496 drivEn380.exe 85 PID 980 wrote to memory of 5028 980 WScript.exe 99 PID 980 wrote to memory of 5028 980 WScript.exe 99 PID 980 wrote to memory of 5028 980 WScript.exe 99 PID 5028 wrote to memory of 3036 5028 cmd.exe 101 PID 5028 wrote to memory of 3036 5028 cmd.exe 101 PID 3036 wrote to memory of 3628 3036 surrogateProviderRuntime.exe 102 PID 3036 wrote to memory of 3628 3036 surrogateProviderRuntime.exe 102 PID 3628 wrote to memory of 4716 3628 cmd.exe 104 PID 3628 wrote to memory of 4716 3628 cmd.exe 104 PID 3628 wrote to memory of 3392 3628 cmd.exe 105 PID 3628 wrote to memory of 3392 3628 cmd.exe 105 PID 3628 wrote to memory of 1408 3628 cmd.exe 110 PID 3628 wrote to memory of 1408 3628 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe"C:\Users\Admin\AppData\Local\Temp\b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\sqls380.exe"C:\Users\Admin\AppData\Local\Temp\sqls380.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Users\Admin\AppData\Local\Temp\drivEn380.exe"C:\Users\Admin\AppData\Local\Temp\drivEn380.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\browserFont\TGs0Esj.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\browserFont\mb1tDxvM2A2eBj7RCoqZN.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\browserFont\surrogateProviderRuntime.exe"C:\browserFont/surrogateProviderRuntime.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9rqSYpa1wW.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:4716
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3392
-
-
C:\Users\All Users\regid.1991-06.com.microsoft\Idle.exe"C:\Users\All Users\regid.1991-06.com.microsoft\Idle.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1408
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183B
MD5b353ad69cc4e2217218bea4b3cd8a891
SHA121257dcc297f5beb856ba7e49a8937adaf8623de
SHA25655d7ca5c46285c3501252ef93e2dbc4c180b450d79754fa5a5a2a58a5369b143
SHA51264cd14f962ed469218c2d2da1c0fc121afcaaa5afd9f9dc36636687d2c36cd910c49cbfe57616c895139964303a2fb777518b818dd027fb5f6bda4b22ea043f3
-
Filesize
1.4MB
MD5c04481d4d848f2edb537085ffdef01c5
SHA1d0c1d5c2efdc1460b577720eb633c23876ada172
SHA256a9cefa666264302fae07664e374cc1cf3b29a956f1da1219013853c66b4b0c46
SHA512f3edf74e3ee0438999a64496cafa5a6485efae74f54674d73a2b4979de0483c896e28fab2376c40399d9cd6d627c56fefe5c652ed00671487250dacb7a05833c
-
Filesize
130KB
MD5f27a284ef9b018cdd2a98a7b78ccdcb3
SHA167e260b11e6227c18cae8925b4f6899103c607f2
SHA256af86dc3f76d39b67b967a3b714e9e70ed43eec8d3871e9691cb45d84372b53fb
SHA5129a8811f13517748539308a70933b126a3348407f397bf30f903019379f927532c64015853b94acf21bdbc554d638a0265d4394d026e289103db06fe93fe5524b
-
Filesize
211B
MD5fc357bcdbf37df98247d511ccd38d22d
SHA10c4678b855b654c4a7182acec115482f3c7e4c5c
SHA25641e73fcfa7fda29c62dd424e2eef794ba21c69239a1d0e4f92f29257162d4dc1
SHA512d5370ef435382cd3192cd2b79374b270cf107b3f87132c8b09ce159603062c7f331f8b155a90789a68eaae85908bb9a3a1593247594f215412018ad0b061879d
-
Filesize
85B
MD56bf7667bb9a6e818187ce67416332560
SHA157ebd093a1349a374aa13851cd1ff437b0c8fe14
SHA2568ca638a3493bfef0418b1abc231eeac08d86f64853cbbf0ba8ad0d3d0d400d76
SHA5121105eb7d88058d4a646a4cc0937c813ecbb36a988ce66e739a8b24147f2038860ed9f2ca4486ed7233d79692bdc2ee9ca933b3b00d8233d91fc3f9447f93a0be
-
Filesize
1.6MB
MD5418fcd513c372d02a740a87d9c4d0d5f
SHA132180f6394d72e1f5ca2cfebbe683b6fbcb8da34
SHA25667c96692f7eff8187ab7a8d54cb15cfa9ae91732c72a6bac093982d1b4838411
SHA5126eb8ebc542e8653e4ef8133c23c3618cd12203adbc6761fb7871b0c1df65609182fec13536cf28687db618b7c9a21dd06f90f77018c4cc3e778cc7136cc07458