Analysis
-
max time kernel
120s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 18:03
Static task
static1
Behavioral task
behavioral1
Sample
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe
Resource
win10v2004-20241007-en
General
-
Target
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe
-
Size
4.2MB
-
MD5
2608e3e0677de70d9e1eb6b108f7bdfd
-
SHA1
c7d42a6abb29fcbde1cdc13f681d449ced6b8a50
-
SHA256
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205
-
SHA512
e1664a02f3e0b101ada2ef5af8fdebc4b75aecc795c1fa04cab36e7b478c11516d8daba1f65159ad7d8c2b9680dd771fac5ba24218b861807851042f1ba82c9d
-
SSDEEP
49152:2chlG/HMHyN4pAEx/7dvDhzETOIntW9y3yP2QAuxQzxEzwYjiwVTkO2kZBtk8hJq:
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
Processes:
resource yara_rule behavioral1/files/0x00080000000120f9-9.dat Nirsoft -
Executes dropped EXE 4 IoCs
Processes:
sqls306.exedrivEn306.exesurrogateProviderRuntime.exedllhost.exepid Process 2524 sqls306.exe 2340 drivEn306.exe 2684 surrogateProviderRuntime.exe 1348 dllhost.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid Process 2616 cmd.exe 2616 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 2 IoCs
Processes:
surrogateProviderRuntime.exedescription ioc Process File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\spoolsv.exe surrogateProviderRuntime.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\f3b6ecef712a24 surrogateProviderRuntime.exe -
Drops file in Windows directory 2 IoCs
Processes:
surrogateProviderRuntime.exedescription ioc Process File created C:\Windows\PolicyDefinitions\en-US\dllhost.exe surrogateProviderRuntime.exe File created C:\Windows\PolicyDefinitions\en-US\5940a34987c991 surrogateProviderRuntime.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
sqls306.exedrivEn306.exeWScript.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sqls306.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drivEn306.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
surrogateProviderRuntime.exedllhost.exepid Process 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 2684 surrogateProviderRuntime.exe 1348 dllhost.exe 1348 dllhost.exe 1348 dllhost.exe 1348 dllhost.exe 1348 dllhost.exe 1348 dllhost.exe 1348 dllhost.exe 1348 dllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
sqls306.exepid Process 2524 sqls306.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
sqls306.exedescription pid Process Token: SeBackupPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeBackupPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeBackupPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe Token: SeSecurityPrivilege 2524 sqls306.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exedrivEn306.exeWScript.execmd.exesurrogateProviderRuntime.execmd.exedescription pid Process procid_target PID 3048 wrote to memory of 2524 3048 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 30 PID 3048 wrote to memory of 2524 3048 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 30 PID 3048 wrote to memory of 2524 3048 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 30 PID 3048 wrote to memory of 2524 3048 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 30 PID 3048 wrote to memory of 2340 3048 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 31 PID 3048 wrote to memory of 2340 3048 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 31 PID 3048 wrote to memory of 2340 3048 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 31 PID 3048 wrote to memory of 2340 3048 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 31 PID 2340 wrote to memory of 2880 2340 drivEn306.exe 32 PID 2340 wrote to memory of 2880 2340 drivEn306.exe 32 PID 2340 wrote to memory of 2880 2340 drivEn306.exe 32 PID 2340 wrote to memory of 2880 2340 drivEn306.exe 32 PID 2880 wrote to memory of 2616 2880 WScript.exe 34 PID 2880 wrote to memory of 2616 2880 WScript.exe 34 PID 2880 wrote to memory of 2616 2880 WScript.exe 34 PID 2880 wrote to memory of 2616 2880 WScript.exe 34 PID 2616 wrote to memory of 2684 2616 cmd.exe 36 PID 2616 wrote to memory of 2684 2616 cmd.exe 36 PID 2616 wrote to memory of 2684 2616 cmd.exe 36 PID 2616 wrote to memory of 2684 2616 cmd.exe 36 PID 2684 wrote to memory of 876 2684 surrogateProviderRuntime.exe 37 PID 2684 wrote to memory of 876 2684 surrogateProviderRuntime.exe 37 PID 2684 wrote to memory of 876 2684 surrogateProviderRuntime.exe 37 PID 876 wrote to memory of 592 876 cmd.exe 39 PID 876 wrote to memory of 592 876 cmd.exe 39 PID 876 wrote to memory of 592 876 cmd.exe 39 PID 876 wrote to memory of 600 876 cmd.exe 40 PID 876 wrote to memory of 600 876 cmd.exe 40 PID 876 wrote to memory of 600 876 cmd.exe 40 PID 876 wrote to memory of 1348 876 cmd.exe 41 PID 876 wrote to memory of 1348 876 cmd.exe 41 PID 876 wrote to memory of 1348 876 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe"C:\Users\Admin\AppData\Local\Temp\b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\sqls306.exe"C:\Users\Admin\AppData\Local\Temp\sqls306.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\drivEn306.exe"C:\Users\Admin\AppData\Local\Temp\drivEn306.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\browserFont\TGs0Esj.vbe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\browserFont\mb1tDxvM2A2eBj7RCoqZN.bat" "4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\browserFont\surrogateProviderRuntime.exe"C:\browserFont/surrogateProviderRuntime.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vrKwwupZpr.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:592
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:600
-
-
C:\Windows\PolicyDefinitions\en-US\dllhost.exe"C:\Windows\PolicyDefinitions\en-US\dllhost.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5c04481d4d848f2edb537085ffdef01c5
SHA1d0c1d5c2efdc1460b577720eb633c23876ada172
SHA256a9cefa666264302fae07664e374cc1cf3b29a956f1da1219013853c66b4b0c46
SHA512f3edf74e3ee0438999a64496cafa5a6485efae74f54674d73a2b4979de0483c896e28fab2376c40399d9cd6d627c56fefe5c652ed00671487250dacb7a05833c
-
Filesize
130KB
MD5f27a284ef9b018cdd2a98a7b78ccdcb3
SHA167e260b11e6227c18cae8925b4f6899103c607f2
SHA256af86dc3f76d39b67b967a3b714e9e70ed43eec8d3871e9691cb45d84372b53fb
SHA5129a8811f13517748539308a70933b126a3348407f397bf30f903019379f927532c64015853b94acf21bdbc554d638a0265d4394d026e289103db06fe93fe5524b
-
Filesize
222B
MD5fe8c9c64948fe8c195759ae882f3759b
SHA11fa18ac432430ec948af5582a45ae23c5c6a8f08
SHA256a5b4945f9a39e7881e93e5acaf6244e2b53acf25346abad5b4bff07f84fb1933
SHA512577a4bb79e6e44b1edacb1da104de5b209f8627e34273b2343f26320140a874893fa2b122145a5c5b470679d57de1503b353d8e579d172b1a949b45ecff3a336
-
Filesize
211B
MD5fc357bcdbf37df98247d511ccd38d22d
SHA10c4678b855b654c4a7182acec115482f3c7e4c5c
SHA25641e73fcfa7fda29c62dd424e2eef794ba21c69239a1d0e4f92f29257162d4dc1
SHA512d5370ef435382cd3192cd2b79374b270cf107b3f87132c8b09ce159603062c7f331f8b155a90789a68eaae85908bb9a3a1593247594f215412018ad0b061879d
-
Filesize
85B
MD56bf7667bb9a6e818187ce67416332560
SHA157ebd093a1349a374aa13851cd1ff437b0c8fe14
SHA2568ca638a3493bfef0418b1abc231eeac08d86f64853cbbf0ba8ad0d3d0d400d76
SHA5121105eb7d88058d4a646a4cc0937c813ecbb36a988ce66e739a8b24147f2038860ed9f2ca4486ed7233d79692bdc2ee9ca933b3b00d8233d91fc3f9447f93a0be
-
Filesize
1.6MB
MD5418fcd513c372d02a740a87d9c4d0d5f
SHA132180f6394d72e1f5ca2cfebbe683b6fbcb8da34
SHA25667c96692f7eff8187ab7a8d54cb15cfa9ae91732c72a6bac093982d1b4838411
SHA5126eb8ebc542e8653e4ef8133c23c3618cd12203adbc6761fb7871b0c1df65609182fec13536cf28687db618b7c9a21dd06f90f77018c4cc3e778cc7136cc07458