Analysis

  • max time kernel
    93s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2024 02:11

General

  • Target

    6697A39548B61FCFCF800B206BDBD696.exe

  • Size

    1.7MB

  • MD5

    6697a39548b61fcfcf800b206bdbd696

  • SHA1

    85229cee44c412c1f0f6a17562272a1296072815

  • SHA256

    ff3ec61937bba7d0b4fd993698f3d2a8ba77e4630ed293e4a3e3d0254dc1de50

  • SHA512

    6d0a4dc554e9df2fac49edbf8589e50e891481f6601c1a1e537d0c1243a8d7d873e54f84ccce04edd5346b50857f7601fafeb8856fc3e75d4283581071521572

  • SSDEEP

    49152:IBJMrYgX9QdEa4gVH+pPnyBS8V6HU5NtvAWn2/x:yO3X9QVbIpavZ5NX8x

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6697A39548B61FCFCF800B206BDBD696.exe
    "C:\Users\Admin\AppData\Local\Temp\6697A39548B61FCFCF800B206BDBD696.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3788
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\webCrt\gSYhm1mlqujwdrrg55.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3844
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\webCrt\bGFjXvZl1lSOMhHdLYZAxlDgwJSuyymnPovMq1RpYbZnEgpXBO1nwlMonY.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3828
        • C:\webCrt\Surrogatedll.exe
          "C:\webCrt/Surrogatedll.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:212
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7QczDLU4jF.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3200
            • C:\Windows\system32\chcp.com
              chcp 65001
              6⤵
                PID:4788
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                6⤵
                  PID:4052
                • C:\Users\Admin\Favorites\Links\lsass.exe
                  "C:\Users\Admin\Favorites\Links\lsass.exe"
                  6⤵
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3024

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7QczDLU4jF.bat

        Filesize

        216B

        MD5

        5a03dd9adbe4eac361dc9f03fb58713d

        SHA1

        6723d55e3628cafe827eb508347aaf63da279967

        SHA256

        48608589e67a5753539baaa87666d14233c1fd624181f86c33dafb66a9bc1460

        SHA512

        81f8762553935a5ce763d787b09a0d076d5c21909d7369ac2188f8fc3a67574a863b8d3a472f8dc75e430571c332a0f915c5a2a162cc954bcb4cc082406d5ba5

      • C:\webCrt\Surrogatedll.exe

        Filesize

        1.8MB

        MD5

        9fc3ab56804d6ba50e840846783e8ac1

        SHA1

        ed6d70605ebe68934004c571a7f503b1432feb77

        SHA256

        13e5168099ca33f17c96a1f842ded5e99555d0aefed8e4f8efef96fbdcac7bba

        SHA512

        593bbd2ac3d0ac8a445d7cc7214e5f1a8aed2120ab098cbea2e3120a901480e707b45300a81e0e699a82342e516aff31c70026406b48d428d1a82e4d25db5de9

      • C:\webCrt\bGFjXvZl1lSOMhHdLYZAxlDgwJSuyymnPovMq1RpYbZnEgpXBO1nwlMonY.bat

        Filesize

        86B

        MD5

        94c4e83cdeb3852269278ef44dc2f811

        SHA1

        93f3f8aa1d9ebe13989beb442e06bfe708a6e375

        SHA256

        2b24e9c2ddbbbf496644f38cd4ec9a90d980af7c773f9617e8632f08a0182a0d

        SHA512

        8fbb0ef6de20e68aa47e912fddeea4ee2559db978f15033d6e3f7d5881fed735680d6746df8494471436e3abc0b6e2b478b1290beb1e4c29a2c3602e67322c97

      • C:\webCrt\gSYhm1mlqujwdrrg55.vbe

        Filesize

        242B

        MD5

        474ab11abe2a295e033dbc94baab19b2

        SHA1

        fc07a5e2f7246d11b9a06d5656fed8a99e0ca24e

        SHA256

        4eba79e794eac54029a51c2b8ad5a012f316bdc92e7ce8ef5018ef8ab726ea2b

        SHA512

        890c9867d3eb6d36ec87a135d204de4a6168b9b3de21f2fda6abd1cff99518e90698870f0d5a78cb97d785125090ddf78543473245dfc2e16b83620147dde910

      • memory/212-17-0x000000001B100000-0x000000001B11C000-memory.dmp

        Filesize

        112KB

      • memory/212-15-0x000000001AFB0000-0x000000001AFBE000-memory.dmp

        Filesize

        56KB

      • memory/212-13-0x00000000001F0000-0x00000000003CA000-memory.dmp

        Filesize

        1.9MB

      • memory/212-18-0x000000001B3C0000-0x000000001B410000-memory.dmp

        Filesize

        320KB

      • memory/212-20-0x000000001B120000-0x000000001B138000-memory.dmp

        Filesize

        96KB

      • memory/212-22-0x000000001AFC0000-0x000000001AFCC000-memory.dmp

        Filesize

        48KB

      • memory/212-12-0x00007FFD992F3000-0x00007FFD992F5000-memory.dmp

        Filesize

        8KB

      • memory/3024-43-0x000000001AF10000-0x000000001AF1E000-memory.dmp

        Filesize

        56KB

      • memory/3024-44-0x000000001AF20000-0x000000001AF3C000-memory.dmp

        Filesize

        112KB

      • memory/3024-45-0x000000001AF40000-0x000000001AF58000-memory.dmp

        Filesize

        96KB

      • memory/3024-46-0x000000001AF60000-0x000000001AF6C000-memory.dmp

        Filesize

        48KB