Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 12:31
Static task
static1
Behavioral task
behavioral1
Sample
7a2a16cd9673a747cce1246193609d566e610beead345dbc838e5ebda15a318a.exe
Resource
win7-20240903-en
General
-
Target
7a2a16cd9673a747cce1246193609d566e610beead345dbc838e5ebda15a318a.exe
-
Size
3.8MB
-
MD5
c9e9ee7477dd04ce2017fc1402f5461c
-
SHA1
22154f137d253bfe5e135859c9a26778a64391fc
-
SHA256
7a2a16cd9673a747cce1246193609d566e610beead345dbc838e5ebda15a318a
-
SHA512
67339aea037be21b8f043d0ff84bbb6013de59bd435a9945837a983001d44a804ae864fbf68695d52829681634d4a903debc5ebbb8b8e6f7770ee6ab923616b8
-
SSDEEP
98304:ytU7z9qNUzrsxu3CFZZK8USGlV8ajG1SN6QSi:y0zgQyFavJlQ1ScQf
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 7a2a16cd9673a747cce1246193609d566e610beead345dbc838e5ebda15a318a.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BridgeproviderComponentFontcrt.exe -
Executes dropped EXE 2 IoCs
pid Process 4532 BridgeproviderComponentFontcrt.exe 3592 TextInputHost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Media Player\Visualizations\66fc9ff0ee96c2 BridgeproviderComponentFontcrt.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\cmd.exe BridgeproviderComponentFontcrt.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\ebf1f9fa8afd6d BridgeproviderComponentFontcrt.exe File created C:\Program Files (x86)\Windows Photo Viewer\de-DE\sihost.exe BridgeproviderComponentFontcrt.exe File created C:\Program Files (x86)\Windows Photo Viewer\de-DE\66fc9ff0ee96c2 BridgeproviderComponentFontcrt.exe File created C:\Program Files (x86)\Windows Media Player\Visualizations\sihost.exe BridgeproviderComponentFontcrt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a2a16cd9673a747cce1246193609d566e610beead345dbc838e5ebda15a318a.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings BridgeproviderComponentFontcrt.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 7a2a16cd9673a747cce1246193609d566e610beead345dbc838e5ebda15a318a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe 4532 BridgeproviderComponentFontcrt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4532 BridgeproviderComponentFontcrt.exe Token: SeDebugPrivilege 3592 TextInputHost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2848 2284 7a2a16cd9673a747cce1246193609d566e610beead345dbc838e5ebda15a318a.exe 83 PID 2284 wrote to memory of 2848 2284 7a2a16cd9673a747cce1246193609d566e610beead345dbc838e5ebda15a318a.exe 83 PID 2284 wrote to memory of 2848 2284 7a2a16cd9673a747cce1246193609d566e610beead345dbc838e5ebda15a318a.exe 83 PID 2848 wrote to memory of 2556 2848 WScript.exe 97 PID 2848 wrote to memory of 2556 2848 WScript.exe 97 PID 2848 wrote to memory of 2556 2848 WScript.exe 97 PID 2556 wrote to memory of 4532 2556 cmd.exe 99 PID 2556 wrote to memory of 4532 2556 cmd.exe 99 PID 4532 wrote to memory of 3000 4532 BridgeproviderComponentFontcrt.exe 101 PID 4532 wrote to memory of 3000 4532 BridgeproviderComponentFontcrt.exe 101 PID 3000 wrote to memory of 2432 3000 cmd.exe 104 PID 3000 wrote to memory of 2432 3000 cmd.exe 104 PID 3000 wrote to memory of 4972 3000 cmd.exe 105 PID 3000 wrote to memory of 4972 3000 cmd.exe 105 PID 3000 wrote to memory of 3592 3000 cmd.exe 108 PID 3000 wrote to memory of 3592 3000 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a2a16cd9673a747cce1246193609d566e610beead345dbc838e5ebda15a318a.exe"C:\Users\Admin\AppData\Local\Temp\7a2a16cd9673a747cce1246193609d566e610beead345dbc838e5ebda15a318a.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\mscomContaineragent\1ggcrtMDOIpDj6NMU6zi0PNdec8GZE6fRcycTIRnqa8yg5np31k.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\mscomContaineragent\K4TsmH6x0L8c7gsd2xa978PfuccU.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\mscomContaineragent\BridgeproviderComponentFontcrt.exe"C:\mscomContaineragent/BridgeproviderComponentFontcrt.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5Ggl00lYGF.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:2432
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:4972
-
-
C:\Users\Default User\TextInputHost.exe"C:\Users\Default User\TextInputHost.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3592
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215B
MD5a46da38b7384faff2c0b07ac7f90ff4b
SHA100969b5ef7b7013cc29047e1211633e2c583e19b
SHA2568accd7e490b40cae7f85c5e3a4a7955a078bd87a12b50b6903ad817e9c41032c
SHA5126982ea0777a6ca15f889a014303c86ac037c08b5dfa5f0f1698273632e0ea67c76934dd54cd7c42e6fea519c7249ed648495bfe82bf67cef201161501574547f
-
Filesize
226B
MD5b2082877b156a0ca794cffb107e5ecc7
SHA14bb42e5b58e22dcfca31a5472b7b37c8e65aa10e
SHA256ae25630353f248e39628b3907ac7c04963d8845b91b89407220a43c937b9940e
SHA512921d0d0a86fddedddc808d0857d93865f945c8223bf383488b448d4c8a16458115f4cba79458200b869e7509a4b479884b5737a43dbe7ac4e5d78c6122a37e29
-
Filesize
3.5MB
MD5929a6474e168c22b27c44a6c5bafb212
SHA15dc664e00f4cee7846f32452c7d0dbbca928b827
SHA2565526fe46db69e08ceee75db8b8890f584dd44416586e13f57c57995407e74430
SHA5120edd7b848d664fa99c16ea4b549460eca75c43602c73eef07efa8169b68451e1b68cd7c1c3dce3bab12adda555184d1e24e13b7961f6f08fbbb42b1b84e55dfe
-
Filesize
96B
MD535ba19fb2b11c866b8d4773346a37893
SHA1615381c6049330cf8f95ca448aa2392975e6fd7a
SHA256a346464ac38f295ad906b30b7580d3327ae07177d9adf69d526d1cca86a12d74
SHA512dbd66630d9c40c0cb4aa366c9dc2f2b414eb4de06a703ff1c597d71aa30bdc17070ebca68d560833c87463f1324e2e384f25ed1ea4ea18ce0fee4a0c18286365