Analysis

  • max time kernel
    143s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 01:33

General

  • Target

    858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe

  • Size

    1.6MB

  • MD5

    8c6e4c86c216b898f24ff14b417c4369

  • SHA1

    266e7d01ba11cd7914451c798199596f4d2f7b53

  • SHA256

    858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f

  • SHA512

    3f6416bf0b7989b522d399e151cc755783b9b7afe9cde559f8207fad6c043e24f85b22c3a583329e1620e862c7824249c536209b6be5e093a2b580c2fc52f660

  • SSDEEP

    24576:o2a0H/WPj+rsO6AOhaDxL/aySUYj79FcPX6t1:va0SKsOP1L/KzEP

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • DCRat payload 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe
    "C:\Users\Admin\AppData\Local\Temp\858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bPccflFcj7.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2896
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2768
        • C:\Users\Admin\AppData\Local\staticfile.exe
          "C:\Users\Admin\AppData\Local\staticfile.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2640
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OIDGZ3sVBM.bat"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2404
            • C:\Windows\system32\chcp.com
              chcp 65001
              5⤵
                PID:1684
              • C:\Windows\system32\PING.EXE
                ping -n 10 localhost
                5⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:1784
              • C:\Users\Admin\AppData\Local\staticfile.exe
                "C:\Users\Admin\AppData\Local\staticfile.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1744
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rfQPUbaSjc.bat"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1672
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    7⤵
                      PID:2596
                    • C:\Windows\system32\PING.EXE
                      ping -n 10 localhost
                      7⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Runs ping.exe
                      PID:2460
                    • C:\Users\Admin\AppData\Local\staticfile.exe
                      "C:\Users\Admin\AppData\Local\staticfile.exe"
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1820
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\MGTgtuIFSm.bat"
                        8⤵
                        • Suspicious use of WriteProcessMemory
                        PID:568
                        • C:\Windows\system32\chcp.com
                          chcp 65001
                          9⤵
                            PID:2296
                          • C:\Windows\system32\PING.EXE
                            ping -n 10 localhost
                            9⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Runs ping.exe
                            PID:2344
                          • C:\Users\Admin\AppData\Local\staticfile.exe
                            "C:\Users\Admin\AppData\Local\staticfile.exe"
                            9⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:2100
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\e4kjvfRyFL.bat"
                              10⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2584
                              • C:\Windows\system32\chcp.com
                                chcp 65001
                                11⤵
                                  PID:2068
                                • C:\Windows\system32\PING.EXE
                                  ping -n 10 localhost
                                  11⤵
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  • Runs ping.exe
                                  PID:2212

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\MGTgtuIFSm.bat

              Filesize

              171B

              MD5

              e368f48b9202d43d013d00b918f1a766

              SHA1

              1db6eecf9b0c58064c0365628adca4664465be40

              SHA256

              57abb89c6851438c49bc052744d15931b4e3e89a6b961431d89adf5b73263e27

              SHA512

              f97ba5cb446e18c2b5c32451293380c949ca1c392012de21a8a8fd1ef36361017602f6ad7f1e0876843768b78ae8d70bf0026d537711cbdd1e9f10fd24e920b5

            • C:\Users\Admin\AppData\Local\Temp\OIDGZ3sVBM.bat

              Filesize

              171B

              MD5

              9875536295f2c4ec44058c9850ba398d

              SHA1

              f8a7ea12ff8cedb821aa7b8e67e7a88fa5f3197f

              SHA256

              077657d91ad28fbd214605272e65f4d849f96d804cf6fe06dac2377d30c218dc

              SHA512

              3c7db3f0ae61f423b28344d4cf8ed26b8928f52e57f86d5526435753f2f5d49e606b95d8d3176d0036829a80abe0d9e76a2fde9386d8b224bea731ce1809a102

            • C:\Users\Admin\AppData\Local\Temp\bPccflFcj7.bat

              Filesize

              171B

              MD5

              a3c5dc97c31733ab9e0ef5c3f3b5d38b

              SHA1

              4878b4653a8de11df374e47f45b000402fb330f3

              SHA256

              e2e08fe22886b42dfebeaa48aa73c9264fe34a3b571ae8e09addf661d957eda6

              SHA512

              7a056b311bbf8f1e998859adaf5c36c3294e4b10f7db17f818916a1cd8f2833c575398b62feb0c56a43c08eb06104f027ec915c3dcac2a82e6458efb886c7e8f

            • C:\Users\Admin\AppData\Local\Temp\e4kjvfRyFL.bat

              Filesize

              171B

              MD5

              84b4ff2bd0f9b2941135c1d5d43d210e

              SHA1

              317404e2a72ba46ae456eb2aae2e1b483721ac0b

              SHA256

              39388c1fb712e18b299f4d697f7dfe291cbc2bee8edea5850a7df63a0107090b

              SHA512

              dc5fea1cba999ad24291a664341d45938f0367622702fbc5e30305da067e5bcf2f736c684077fd74ecd0d31231b4c1171cd60a315ada689a03b55d6ebf81f578

            • C:\Users\Admin\AppData\Local\Temp\rfQPUbaSjc.bat

              Filesize

              171B

              MD5

              da199d356b70617bd153bf5e1cbd0e45

              SHA1

              e5db74ef1b559b919b824623d3fc5faecc0717b2

              SHA256

              10bb3058396c934a546c8e05a6f5f356555fd5f358e1fd6019c6dfd8fc149afc

              SHA512

              b7781da54e23a03b6f6c0768eccf8fcfd41aca4bddb8e5faa459a3ff158efcb052d683445bab58ac620e5f9eb20f26b97cbb8667be8103e8adb534331b837aa6

            • C:\Users\Admin\AppData\Local\staticfile.exe

              Filesize

              1.6MB

              MD5

              8c6e4c86c216b898f24ff14b417c4369

              SHA1

              266e7d01ba11cd7914451c798199596f4d2f7b53

              SHA256

              858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f

              SHA512

              3f6416bf0b7989b522d399e151cc755783b9b7afe9cde559f8207fad6c043e24f85b22c3a583329e1620e862c7824249c536209b6be5e093a2b580c2fc52f660

            • memory/1744-49-0x0000000000BC0000-0x0000000000D5C000-memory.dmp

              Filesize

              1.6MB

            • memory/1820-63-0x0000000000D40000-0x0000000000EDC000-memory.dmp

              Filesize

              1.6MB

            • memory/2584-17-0x000000001A8B0000-0x000000001A90A000-memory.dmp

              Filesize

              360KB

            • memory/2584-24-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

              Filesize

              9.9MB

            • memory/2584-14-0x0000000002060000-0x0000000002072000-memory.dmp

              Filesize

              72KB

            • memory/2584-15-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

              Filesize

              9.9MB

            • memory/2584-18-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

              Filesize

              9.9MB

            • memory/2584-19-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

              Filesize

              9.9MB

            • memory/2584-0-0x000007FEF5523000-0x000007FEF5524000-memory.dmp

              Filesize

              4KB

            • memory/2584-21-0x00000000001A0000-0x00000000001AE000-memory.dmp

              Filesize

              56KB

            • memory/2584-23-0x0000000002150000-0x000000000219E000-memory.dmp

              Filesize

              312KB

            • memory/2584-12-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

              Filesize

              9.9MB

            • memory/2584-8-0x0000000000600000-0x0000000000618000-memory.dmp

              Filesize

              96KB

            • memory/2584-32-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

              Filesize

              9.9MB

            • memory/2584-10-0x0000000002040000-0x0000000002056000-memory.dmp

              Filesize

              88KB

            • memory/2584-1-0x0000000000360000-0x00000000004FC000-memory.dmp

              Filesize

              1.6MB

            • memory/2584-11-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

              Filesize

              9.9MB

            • memory/2584-6-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

              Filesize

              9.9MB

            • memory/2584-5-0x0000000000180000-0x000000000019C000-memory.dmp

              Filesize

              112KB

            • memory/2584-4-0x0000000000340000-0x000000000035C000-memory.dmp

              Filesize

              112KB

            • memory/2584-2-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

              Filesize

              9.9MB

            • memory/2640-35-0x0000000000960000-0x0000000000AFC000-memory.dmp

              Filesize

              1.6MB