Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2024 14:53

General

  • Target

    DCRatBuild.exe

  • Size

    2.2MB

  • MD5

    42bebbc9ea503be1c3c78ac680e660bd

  • SHA1

    ba7e6e6bdd1ff3fdbd66a6c25a180eaca08cb774

  • SHA256

    d3a100c67a0ab27b0628df13e53b36999059981ffec20422b61a2801fc1f020a

  • SHA512

    acf711b01b8fa27e487d6009644a7640197b44ff5efe6161670b4109b03c629c466c9411e56a51280b100494fd228123738320199cfe9763737dd98fadd13a4c

  • SSDEEP

    49152:IBJo0KE3fGUa/34OEOnhHLe7kSb+e39EP9Xee:yC0KIGUaPh5ySP9Xee

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe
    "C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3288
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\HyperreviewWincommon\0APkIItdJuTMwiSED3qMQuncpJddgwxYvhrJ.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4120
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\HyperreviewWincommon\G389UpYDqsyTn8FeSKOfwJ022GejG1.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1968
        • C:\HyperreviewWincommon\portreviewCommon.exe
          "C:\HyperreviewWincommon/portreviewCommon.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4284
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\I4Jy7rL30l.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4312
            • C:\Windows\system32\chcp.com
              chcp 65001
              6⤵
                PID:3120
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                6⤵
                  PID:2344
                • C:\HyperreviewWincommon\portreviewCommon.exe
                  "C:\HyperreviewWincommon\portreviewCommon.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5112
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:708

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\HyperreviewWincommon\0APkIItdJuTMwiSED3qMQuncpJddgwxYvhrJ.vbe

          Filesize

          229B

          MD5

          7c1d3d422cc4568c9a4325d2409a748b

          SHA1

          a8079bf0f981b9f9936a2547a8807bdb27f9c9fe

          SHA256

          1cc02cd69855ad9f85fbf3c7b47d33687c0565ba65b845653bb449693a179b8e

          SHA512

          82adf7ecb692bc6a5a58eac8b0233a637b819c7623eebb1654336304b3f90cf28ab667b70e9d21b54663a521e2cd5fc4dd2d93234df40fe19bd3356d4be8d553

        • C:\HyperreviewWincommon\G389UpYDqsyTn8FeSKOfwJ022GejG1.bat

          Filesize

          109B

          MD5

          e7cad9e2e20d4e5ecf20c2001a0efa17

          SHA1

          b334bb6e63edfaf0641a13c4af036ee3da98306d

          SHA256

          cb179ab0ce771d571669600c2007065f4ee6921467294c02a213a9177efc4c44

          SHA512

          83329d1641230cb2fd2f056dc721b226869ab9c4ac305efb5dd3ff2e462b9be1a85d855593478405e7da36d141b312f4ebd35e2f741e2eb4e6bbb9e07932e88d

        • C:\HyperreviewWincommon\portreviewCommon.exe

          Filesize

          1.9MB

          MD5

          e28077697ca723b6f179b20f3827d0b8

          SHA1

          9d4aa3c95498559b9f56eacdf75312e9c1202c9f

          SHA256

          f266a8f40e42999a2c3d502b27af5d2872e672258e36d97da643730667794d55

          SHA512

          b085d8c27c11f89213b4b9b337705c2d2020e2885f3d466bcc666fb3ebd24e8d34c9bd323c398178423eecea3a9f7de2cc030b0b79989a8660d7b2a0e5b3ee44

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\portreviewCommon.exe.log

          Filesize

          1KB

          MD5

          b9d0eb17ffb07da0a237d58c5f1c3933

          SHA1

          f2250d0f7deecb8d3e3a4a6bb5635aaeaa4d51d5

          SHA256

          e3601554efac51beb23c75dd8de6ed30cb3ddfcb1de508070dd7984f06d5ca05

          SHA512

          81b1d0aa1a269497943e79eabfc26b1165c2768a3b40f62e5e90f7d69fa4b7baa907e39ab18d8230222cd8e1248590918502b510ed94a89cb766d2d1cd25283a

        • C:\Users\Admin\AppData\Local\Temp\I4Jy7rL30l.bat

          Filesize

          220B

          MD5

          0d1aa10fb904bef5ff80b1165dd15b58

          SHA1

          e1eeb17b023c25a14f16c3a5591e3e889bd9d65d

          SHA256

          7b5c3ec3ea1f0442121a0f0c9bbfc741f7b1cea23c59ecca1904f55211c94737

          SHA512

          ec2c2cdc024744496df6dccf10c94551b27dfe2551e4832f9e98af23504d0cb53c30671091a02e124e73e6a7f2bf0eb5627533075a1a6b8206f2c7c9b6116458

        • memory/4284-13-0x0000000000F00000-0x00000000010F0000-memory.dmp

          Filesize

          1.9MB

        • memory/4284-17-0x0000000003350000-0x000000000336C000-memory.dmp

          Filesize

          112KB

        • memory/4284-18-0x000000001C110000-0x000000001C160000-memory.dmp

          Filesize

          320KB

        • memory/4284-20-0x0000000003370000-0x0000000003388000-memory.dmp

          Filesize

          96KB

        • memory/4284-22-0x0000000003390000-0x00000000033A8000-memory.dmp

          Filesize

          96KB

        • memory/4284-24-0x00000000018E0000-0x00000000018EC000-memory.dmp

          Filesize

          48KB

        • memory/4284-41-0x000000001C2A0000-0x000000001C349000-memory.dmp

          Filesize

          676KB

        • memory/4284-15-0x00000000018C0000-0x00000000018CE000-memory.dmp

          Filesize

          56KB

        • memory/4284-12-0x00007FFA0FAD3000-0x00007FFA0FAD5000-memory.dmp

          Filesize

          8KB

        • memory/5112-50-0x000000001B960000-0x000000001BA09000-memory.dmp

          Filesize

          676KB

        • memory/5112-58-0x000000001BD00000-0x000000001BD5A000-memory.dmp

          Filesize

          360KB