Analysis

  • max time kernel
    121s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2024 15:29

General

  • Target

    Zoraraclear.exe

  • Size

    3.0MB

  • MD5

    2bbcb2eb310ae73cd05c024afee324fb

  • SHA1

    4d477371119a135e2c9e65ada34547afe65347a5

  • SHA256

    628e668b234ae912b337b5ed8a9edb0baf44c6f2f0a297c1e6fc354262a37bad

  • SHA512

    704a49e72fe03db76ec71e68b8309d3ad2c1c5e4b2042c68dbb383dc5502ebc5e96eb12b83c79cdcfbf1a8ebb04ffb11670628a1cb0bb49ebc617044ca5679be

  • SSDEEP

    49152:SBJo0KE3fGUa/34OEOnhHLe7kSb+e39EP9Xe7inp7xLXzslyoDs:EC0KIGUaPh5ySP9Xe7qRxLjslFA

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Zoraraclear.exe
    "C:\Users\Admin\AppData\Local\Temp\Zoraraclear.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe
      "C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\HyperreviewWincommon\0APkIItdJuTMwiSED3qMQuncpJddgwxYvhrJ.vbe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\HyperreviewWincommon\G389UpYDqsyTn8FeSKOfwJ022GejG1.bat" "
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2212
          • C:\HyperreviewWincommon\portreviewCommon.exe
            "C:\HyperreviewWincommon/portreviewCommon.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1952
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WfqYV5pTgG.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2164
              • C:\Windows\system32\chcp.com
                chcp 65001
                7⤵
                  PID:356
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  7⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:1168
                • C:\Windows\IME\portreviewCommon.exe
                  "C:\Windows\IME\portreviewCommon.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:556
      • C:\Users\Admin\AppData\Local\Temp\Zorara.exe
        "C:\Users\Admin\AppData\Local\Temp\Zorara.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:2912

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\HyperreviewWincommon\0APkIItdJuTMwiSED3qMQuncpJddgwxYvhrJ.vbe

      Filesize

      229B

      MD5

      7c1d3d422cc4568c9a4325d2409a748b

      SHA1

      a8079bf0f981b9f9936a2547a8807bdb27f9c9fe

      SHA256

      1cc02cd69855ad9f85fbf3c7b47d33687c0565ba65b845653bb449693a179b8e

      SHA512

      82adf7ecb692bc6a5a58eac8b0233a637b819c7623eebb1654336304b3f90cf28ab667b70e9d21b54663a521e2cd5fc4dd2d93234df40fe19bd3356d4be8d553

    • C:\HyperreviewWincommon\G389UpYDqsyTn8FeSKOfwJ022GejG1.bat

      Filesize

      109B

      MD5

      e7cad9e2e20d4e5ecf20c2001a0efa17

      SHA1

      b334bb6e63edfaf0641a13c4af036ee3da98306d

      SHA256

      cb179ab0ce771d571669600c2007065f4ee6921467294c02a213a9177efc4c44

      SHA512

      83329d1641230cb2fd2f056dc721b226869ab9c4ac305efb5dd3ff2e462b9be1a85d855593478405e7da36d141b312f4ebd35e2f741e2eb4e6bbb9e07932e88d

    • C:\HyperreviewWincommon\portreviewCommon.exe

      Filesize

      1.9MB

      MD5

      e28077697ca723b6f179b20f3827d0b8

      SHA1

      9d4aa3c95498559b9f56eacdf75312e9c1202c9f

      SHA256

      f266a8f40e42999a2c3d502b27af5d2872e672258e36d97da643730667794d55

      SHA512

      b085d8c27c11f89213b4b9b337705c2d2020e2885f3d466bcc666fb3ebd24e8d34c9bd323c398178423eecea3a9f7de2cc030b0b79989a8660d7b2a0e5b3ee44

    • C:\Users\Admin\AppData\Local\Temp\WfqYV5pTgG.bat

      Filesize

      163B

      MD5

      7d0c338a3d4ea953b05c56280d3a5906

      SHA1

      be923f9a903bc0adad6a1b1af39dc2e1ca46e3ad

      SHA256

      d8ff657c3776bca518269b3d853393c55fa60508e7847597c2f21095b8063817

      SHA512

      7628e961564683a8204f5c6186145b3b517fea6d6ab06d2ff58bc20a1da4c5d03d5a54d000705d4ef5d1c4ea2b549ca10dc504f80522326d0202a0dfdbb3e4a4

    • C:\Users\Admin\AppData\Local\Temp\Zorara.exe

      Filesize

      803KB

      MD5

      e63395b9021c27266554fff6b4ed8fab

      SHA1

      340e1bf4ebabcfda652882fa3789c5d4ab197bc9

      SHA256

      ff6ca0a62dd38a42391334d1e813b3c5ae223ca580c212d95ba6b80f30a0fac7

      SHA512

      aaa1f2b379644c619bb4619071e3102ddc23f6b5d810f922c5d159dae5da447785d9e178077b5cd79f9d8823bd49843587e0a8848d2149bb594b276e825784df

    • \Users\Admin\AppData\Local\Temp\DCRatBuild.exe

      Filesize

      2.2MB

      MD5

      42bebbc9ea503be1c3c78ac680e660bd

      SHA1

      ba7e6e6bdd1ff3fdbd66a6c25a180eaca08cb774

      SHA256

      d3a100c67a0ab27b0628df13e53b36999059981ffec20422b61a2801fc1f020a

      SHA512

      acf711b01b8fa27e487d6009644a7640197b44ff5efe6161670b4109b03c629c466c9411e56a51280b100494fd228123738320199cfe9763737dd98fadd13a4c

    • memory/556-58-0x0000000000A00000-0x0000000000BF0000-memory.dmp

      Filesize

      1.9MB

    • memory/1952-29-0x00000000003E0000-0x00000000005D0000-memory.dmp

      Filesize

      1.9MB

    • memory/1952-31-0x0000000000670000-0x000000000067E000-memory.dmp

      Filesize

      56KB

    • memory/1952-33-0x0000000002210000-0x000000000222C000-memory.dmp

      Filesize

      112KB

    • memory/1952-35-0x0000000002230000-0x0000000002248000-memory.dmp

      Filesize

      96KB

    • memory/1952-37-0x0000000002360000-0x0000000002378000-memory.dmp

      Filesize

      96KB

    • memory/1952-39-0x0000000000680000-0x000000000068C000-memory.dmp

      Filesize

      48KB

    • memory/2224-10-0x0000000000400000-0x000000000070B000-memory.dmp

      Filesize

      3.0MB

    • memory/2912-23-0x0000000000740000-0x0000000000741000-memory.dmp

      Filesize

      4KB

    • memory/2912-14-0x000000013F3E0000-0x000000013F532000-memory.dmp

      Filesize

      1.3MB