Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 02:42
Behavioral task
behavioral1
Sample
858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe
Resource
win10v2004-20241007-en
General
-
Target
858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe
-
Size
1.6MB
-
MD5
8c6e4c86c216b898f24ff14b417c4369
-
SHA1
266e7d01ba11cd7914451c798199596f4d2f7b53
-
SHA256
858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f
-
SHA512
3f6416bf0b7989b522d399e151cc755783b9b7afe9cde559f8207fad6c043e24f85b22c3a583329e1620e862c7824249c536209b6be5e093a2b580c2fc52f660
-
SSDEEP
24576:o2a0H/WPj+rsO6AOhaDxL/aySUYj79FcPX6t1:va0SKsOP1L/KzEP
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 3 IoCs
resource yara_rule behavioral1/memory/2248-1-0x00000000002A0000-0x000000000043C000-memory.dmp family_dcrat_v2 behavioral1/files/0x000a000000011c28-30.dat family_dcrat_v2 behavioral1/memory/2572-32-0x0000000000C10000-0x0000000000DAC000-memory.dmp family_dcrat_v2 -
Executes dropped EXE 1 IoCs
pid Process 2572 staticfile.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe Token: SeDebugPrivilege 2572 staticfile.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2572 staticfile.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2356 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 30 PID 2248 wrote to memory of 2356 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 30 PID 2248 wrote to memory of 2356 2248 858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe 30 PID 2356 wrote to memory of 2680 2356 cmd.exe 32 PID 2356 wrote to memory of 2680 2356 cmd.exe 32 PID 2356 wrote to memory of 2680 2356 cmd.exe 32 PID 2356 wrote to memory of 2716 2356 cmd.exe 33 PID 2356 wrote to memory of 2716 2356 cmd.exe 33 PID 2356 wrote to memory of 2716 2356 cmd.exe 33 PID 2356 wrote to memory of 2572 2356 cmd.exe 34 PID 2356 wrote to memory of 2572 2356 cmd.exe 34 PID 2356 wrote to memory of 2572 2356 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe"C:\Users\Admin\AppData\Local\Temp\858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5mRcay16p8.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2680
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2716
-
-
C:\Users\Admin\AppData\Local\staticfile.exe"C:\Users\Admin\AppData\Local\staticfile.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219B
MD534c6fbd8fc938d6168d1d6780e5ad853
SHA138348976d1697ac0da6894ecba46fc12331dd2b0
SHA256eeb460170d4dab4278c1e5b4f743ade8359457ddbbe6d6b75e4d2a1c3803dc03
SHA5126e76175018b5d841396f56bf126a6d56d6b76c5f925b3481d6c215e0996260599b7c47c6bd01b049c3743acd16e722d54f03f9b2708b2e9cf6dbcb553ec225bb
-
Filesize
1.6MB
MD58c6e4c86c216b898f24ff14b417c4369
SHA1266e7d01ba11cd7914451c798199596f4d2f7b53
SHA256858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f
SHA5123f6416bf0b7989b522d399e151cc755783b9b7afe9cde559f8207fad6c043e24f85b22c3a583329e1620e862c7824249c536209b6be5e093a2b580c2fc52f660