Analysis
-
max time kernel
95s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 18:03
Static task
static1
Behavioral task
behavioral1
Sample
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe
Resource
win10v2004-20241007-en
General
-
Target
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe
-
Size
4.2MB
-
MD5
2608e3e0677de70d9e1eb6b108f7bdfd
-
SHA1
c7d42a6abb29fcbde1cdc13f681d449ced6b8a50
-
SHA256
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205
-
SHA512
e1664a02f3e0b101ada2ef5af8fdebc4b75aecc795c1fa04cab36e7b478c11516d8daba1f65159ad7d8c2b9680dd771fac5ba24218b861807851042f1ba82c9d
-
SSDEEP
49152:2chlG/HMHyN4pAEx/7dvDhzETOIntW9y3yP2QAuxQzxEzwYjiwVTkO2kZBtk8hJq:
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
Processes:
resource yara_rule behavioral2/files/0x000c000000023b37-8.dat Nirsoft -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exedrivEn994.exeWScript.exesurrogateProviderRuntime.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation drivEn994.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation surrogateProviderRuntime.exe -
Executes dropped EXE 4 IoCs
Processes:
sqls639.exedrivEn994.exesurrogateProviderRuntime.execsrss.exepid Process 5044 sqls639.exe 2416 drivEn994.exe 4824 surrogateProviderRuntime.exe 1516 csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 5 IoCs
Processes:
surrogateProviderRuntime.exedescription ioc Process File opened for modification C:\Program Files\Windows Security\BrowserCore\dllhost.exe surrogateProviderRuntime.exe File created C:\Program Files\Windows Security\BrowserCore\5940a34987c991 surrogateProviderRuntime.exe File created C:\Program Files\Mozilla Firefox\dllhost.exe surrogateProviderRuntime.exe File created C:\Program Files\Mozilla Firefox\5940a34987c991 surrogateProviderRuntime.exe File created C:\Program Files\Windows Security\BrowserCore\dllhost.exe surrogateProviderRuntime.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
WScript.execmd.exesqls639.exedrivEn994.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sqls639.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drivEn994.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Modifies registry class 2 IoCs
Processes:
drivEn994.exesurrogateProviderRuntime.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings drivEn994.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings surrogateProviderRuntime.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
surrogateProviderRuntime.execsrss.exepid Process 4824 surrogateProviderRuntime.exe 4824 surrogateProviderRuntime.exe 4824 surrogateProviderRuntime.exe 4824 surrogateProviderRuntime.exe 4824 surrogateProviderRuntime.exe 4824 surrogateProviderRuntime.exe 4824 surrogateProviderRuntime.exe 4824 surrogateProviderRuntime.exe 4824 surrogateProviderRuntime.exe 4824 surrogateProviderRuntime.exe 4824 surrogateProviderRuntime.exe 4824 surrogateProviderRuntime.exe 1516 csrss.exe 1516 csrss.exe 1516 csrss.exe 1516 csrss.exe 1516 csrss.exe 1516 csrss.exe 1516 csrss.exe 1516 csrss.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
sqls639.exedescription pid Process Token: SeBackupPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeBackupPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeBackupPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe Token: SeSecurityPrivilege 5044 sqls639.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exedrivEn994.exeWScript.execmd.exesurrogateProviderRuntime.execmd.exedescription pid Process procid_target PID 4304 wrote to memory of 5044 4304 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 83 PID 4304 wrote to memory of 5044 4304 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 83 PID 4304 wrote to memory of 5044 4304 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 83 PID 4304 wrote to memory of 2416 4304 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 84 PID 4304 wrote to memory of 2416 4304 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 84 PID 4304 wrote to memory of 2416 4304 b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe 84 PID 2416 wrote to memory of 4508 2416 drivEn994.exe 85 PID 2416 wrote to memory of 4508 2416 drivEn994.exe 85 PID 2416 wrote to memory of 4508 2416 drivEn994.exe 85 PID 4508 wrote to memory of 440 4508 WScript.exe 99 PID 4508 wrote to memory of 440 4508 WScript.exe 99 PID 4508 wrote to memory of 440 4508 WScript.exe 99 PID 440 wrote to memory of 4824 440 cmd.exe 101 PID 440 wrote to memory of 4824 440 cmd.exe 101 PID 4824 wrote to memory of 1536 4824 surrogateProviderRuntime.exe 102 PID 4824 wrote to memory of 1536 4824 surrogateProviderRuntime.exe 102 PID 1536 wrote to memory of 4128 1536 cmd.exe 104 PID 1536 wrote to memory of 4128 1536 cmd.exe 104 PID 1536 wrote to memory of 4384 1536 cmd.exe 105 PID 1536 wrote to memory of 4384 1536 cmd.exe 105 PID 1536 wrote to memory of 1516 1536 cmd.exe 109 PID 1536 wrote to memory of 1516 1536 cmd.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe"C:\Users\Admin\AppData\Local\Temp\b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\sqls639.exe"C:\Users\Admin\AppData\Local\Temp\sqls639.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\drivEn994.exe"C:\Users\Admin\AppData\Local\Temp\drivEn994.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\browserFont\TGs0Esj.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\browserFont\mb1tDxvM2A2eBj7RCoqZN.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:440 -
C:\browserFont\surrogateProviderRuntime.exe"C:\browserFont/surrogateProviderRuntime.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\JTZ1mPKJeJ.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:4128
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4384
-
-
C:\Users\Default User\csrss.exe"C:\Users\Default User\csrss.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159B
MD56fffeb758c4951f6453633327ede126f
SHA11e6ff6de1582d1cb58fbcc67f72ef7d8834b7e59
SHA256b4055316ad54a4f5fd65e458f1c6001d8e292f567d09ed34b3a8829d9f588db2
SHA5125588f114b382c56f9e665616b732063f24700faf746402b6e1bf80a27b078440daabff427c0c1c809162881c55ce773aab9a2dcf17fda0f1166360986455d075
-
Filesize
1.4MB
MD5c04481d4d848f2edb537085ffdef01c5
SHA1d0c1d5c2efdc1460b577720eb633c23876ada172
SHA256a9cefa666264302fae07664e374cc1cf3b29a956f1da1219013853c66b4b0c46
SHA512f3edf74e3ee0438999a64496cafa5a6485efae74f54674d73a2b4979de0483c896e28fab2376c40399d9cd6d627c56fefe5c652ed00671487250dacb7a05833c
-
Filesize
130KB
MD5f27a284ef9b018cdd2a98a7b78ccdcb3
SHA167e260b11e6227c18cae8925b4f6899103c607f2
SHA256af86dc3f76d39b67b967a3b714e9e70ed43eec8d3871e9691cb45d84372b53fb
SHA5129a8811f13517748539308a70933b126a3348407f397bf30f903019379f927532c64015853b94acf21bdbc554d638a0265d4394d026e289103db06fe93fe5524b
-
Filesize
211B
MD5fc357bcdbf37df98247d511ccd38d22d
SHA10c4678b855b654c4a7182acec115482f3c7e4c5c
SHA25641e73fcfa7fda29c62dd424e2eef794ba21c69239a1d0e4f92f29257162d4dc1
SHA512d5370ef435382cd3192cd2b79374b270cf107b3f87132c8b09ce159603062c7f331f8b155a90789a68eaae85908bb9a3a1593247594f215412018ad0b061879d
-
Filesize
85B
MD56bf7667bb9a6e818187ce67416332560
SHA157ebd093a1349a374aa13851cd1ff437b0c8fe14
SHA2568ca638a3493bfef0418b1abc231eeac08d86f64853cbbf0ba8ad0d3d0d400d76
SHA5121105eb7d88058d4a646a4cc0937c813ecbb36a988ce66e739a8b24147f2038860ed9f2ca4486ed7233d79692bdc2ee9ca933b3b00d8233d91fc3f9447f93a0be
-
Filesize
1.6MB
MD5418fcd513c372d02a740a87d9c4d0d5f
SHA132180f6394d72e1f5ca2cfebbe683b6fbcb8da34
SHA25667c96692f7eff8187ab7a8d54cb15cfa9ae91732c72a6bac093982d1b4838411
SHA5126eb8ebc542e8653e4ef8133c23c3618cd12203adbc6761fb7871b0c1df65609182fec13536cf28687db618b7c9a21dd06f90f77018c4cc3e778cc7136cc07458