Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 21:36
Behavioral task
behavioral1
Sample
lfcdgbuksf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lfcdgbuksf.exe
Resource
win10v2004-20241007-en
General
-
Target
lfcdgbuksf.exe
-
Size
1.6MB
-
MD5
8c6e4c86c216b898f24ff14b417c4369
-
SHA1
266e7d01ba11cd7914451c798199596f4d2f7b53
-
SHA256
858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f
-
SHA512
3f6416bf0b7989b522d399e151cc755783b9b7afe9cde559f8207fad6c043e24f85b22c3a583329e1620e862c7824249c536209b6be5e093a2b580c2fc52f660
-
SSDEEP
24576:o2a0H/WPj+rsO6AOhaDxL/aySUYj79FcPX6t1:va0SKsOP1L/KzEP
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 2 IoCs
resource yara_rule behavioral2/memory/4308-1-0x0000000000D40000-0x0000000000EDC000-memory.dmp family_dcrat_v2 behavioral2/files/0x000f000000023c8e-40.dat family_dcrat_v2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation lfcdgbuksf.exe -
Executes dropped EXE 1 IoCs
pid Process 1608 staticfile.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings lfcdgbuksf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe 4308 lfcdgbuksf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4308 lfcdgbuksf.exe Token: SeDebugPrivilege 1608 staticfile.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1608 staticfile.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4308 wrote to memory of 1416 4308 lfcdgbuksf.exe 83 PID 4308 wrote to memory of 1416 4308 lfcdgbuksf.exe 83 PID 1416 wrote to memory of 468 1416 cmd.exe 85 PID 1416 wrote to memory of 468 1416 cmd.exe 85 PID 1416 wrote to memory of 412 1416 cmd.exe 86 PID 1416 wrote to memory of 412 1416 cmd.exe 86 PID 1416 wrote to memory of 1608 1416 cmd.exe 88 PID 1416 wrote to memory of 1608 1416 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\lfcdgbuksf.exe"C:\Users\Admin\AppData\Local\Temp\lfcdgbuksf.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ArAzJktLiV.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:468
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:412
-
-
C:\Users\Admin\AppData\Local\staticfile.exe"C:\Users\Admin\AppData\Local\staticfile.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219B
MD5bf5906432f09272a57cf0a06eafd80ea
SHA1aa417cc9bc70b138e8450c5d1260bed785297aa8
SHA2562374a190184ff4fcf8cc2158dabd5f9c7ce047c4cb3b4c39e54a220ff6d9120f
SHA51244df0cb82014d54c486dde682d4032a076c372ffae340797da167ee1d88acef13bd89517c06ba8ecfb65a4d7ff855b2446494170b2ba82acabc99f99d370453b
-
Filesize
1.6MB
MD58c6e4c86c216b898f24ff14b417c4369
SHA1266e7d01ba11cd7914451c798199596f4d2f7b53
SHA256858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f
SHA5123f6416bf0b7989b522d399e151cc755783b9b7afe9cde559f8207fad6c043e24f85b22c3a583329e1620e862c7824249c536209b6be5e093a2b580c2fc52f660