Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2024 15:29

General

  • Target

    Zoraraclear.exe

  • Size

    3.0MB

  • MD5

    2bbcb2eb310ae73cd05c024afee324fb

  • SHA1

    4d477371119a135e2c9e65ada34547afe65347a5

  • SHA256

    628e668b234ae912b337b5ed8a9edb0baf44c6f2f0a297c1e6fc354262a37bad

  • SHA512

    704a49e72fe03db76ec71e68b8309d3ad2c1c5e4b2042c68dbb383dc5502ebc5e96eb12b83c79cdcfbf1a8ebb04ffb11670628a1cb0bb49ebc617044ca5679be

  • SSDEEP

    49152:SBJo0KE3fGUa/34OEOnhHLe7kSb+e39EP9Xe7inp7xLXzslyoDs:EC0KIGUaPh5ySP9Xe7qRxLjslFA

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Zoraraclear.exe
    "C:\Users\Admin\AppData\Local\Temp\Zoraraclear.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4428
    • C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe
      "C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1460
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\HyperreviewWincommon\0APkIItdJuTMwiSED3qMQuncpJddgwxYvhrJ.vbe"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3716
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\HyperreviewWincommon\G389UpYDqsyTn8FeSKOfwJ022GejG1.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5096
          • C:\HyperreviewWincommon\portreviewCommon.exe
            "C:\HyperreviewWincommon/portreviewCommon.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4336
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5tLSdyahJi.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4512
              • C:\Windows\system32\chcp.com
                chcp 65001
                7⤵
                  PID:3180
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  7⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:4928
                • C:\HyperreviewWincommon\smss.exe
                  "C:\HyperreviewWincommon\smss.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1444
      • C:\Users\Admin\AppData\Local\Temp\Zorara.exe
        "C:\Users\Admin\AppData\Local\Temp\Zorara.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:4508

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\HyperreviewWincommon\0APkIItdJuTMwiSED3qMQuncpJddgwxYvhrJ.vbe

      Filesize

      229B

      MD5

      7c1d3d422cc4568c9a4325d2409a748b

      SHA1

      a8079bf0f981b9f9936a2547a8807bdb27f9c9fe

      SHA256

      1cc02cd69855ad9f85fbf3c7b47d33687c0565ba65b845653bb449693a179b8e

      SHA512

      82adf7ecb692bc6a5a58eac8b0233a637b819c7623eebb1654336304b3f90cf28ab667b70e9d21b54663a521e2cd5fc4dd2d93234df40fe19bd3356d4be8d553

    • C:\HyperreviewWincommon\G389UpYDqsyTn8FeSKOfwJ022GejG1.bat

      Filesize

      109B

      MD5

      e7cad9e2e20d4e5ecf20c2001a0efa17

      SHA1

      b334bb6e63edfaf0641a13c4af036ee3da98306d

      SHA256

      cb179ab0ce771d571669600c2007065f4ee6921467294c02a213a9177efc4c44

      SHA512

      83329d1641230cb2fd2f056dc721b226869ab9c4ac305efb5dd3ff2e462b9be1a85d855593478405e7da36d141b312f4ebd35e2f741e2eb4e6bbb9e07932e88d

    • C:\HyperreviewWincommon\portreviewCommon.exe

      Filesize

      1.9MB

      MD5

      e28077697ca723b6f179b20f3827d0b8

      SHA1

      9d4aa3c95498559b9f56eacdf75312e9c1202c9f

      SHA256

      f266a8f40e42999a2c3d502b27af5d2872e672258e36d97da643730667794d55

      SHA512

      b085d8c27c11f89213b4b9b337705c2d2020e2885f3d466bcc666fb3ebd24e8d34c9bd323c398178423eecea3a9f7de2cc030b0b79989a8660d7b2a0e5b3ee44

    • C:\Users\Admin\AppData\Local\Temp\5tLSdyahJi.bat

      Filesize

      160B

      MD5

      e9297cdcba624e332c5146955e857bb2

      SHA1

      b699b2cbb66721933e0845e3db43d19903aeeacb

      SHA256

      d32f5d02ad6ce41533547b6affa38745938c350b6fe8b8d7e756c1cc9916ae7e

      SHA512

      0fdacd4fda7c38c1a06273f4d4ed2e0cbdcbe5803bfbe8d9d379bae8d00f7f82cfe863520193ae68d61b3cb023f7aa9b4a791ea1242fa2ab4a4566d3676585ae

    • C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe

      Filesize

      2.2MB

      MD5

      42bebbc9ea503be1c3c78ac680e660bd

      SHA1

      ba7e6e6bdd1ff3fdbd66a6c25a180eaca08cb774

      SHA256

      d3a100c67a0ab27b0628df13e53b36999059981ffec20422b61a2801fc1f020a

      SHA512

      acf711b01b8fa27e487d6009644a7640197b44ff5efe6161670b4109b03c629c466c9411e56a51280b100494fd228123738320199cfe9763737dd98fadd13a4c

    • C:\Users\Admin\AppData\Local\Temp\Zorara.exe

      Filesize

      803KB

      MD5

      e63395b9021c27266554fff6b4ed8fab

      SHA1

      340e1bf4ebabcfda652882fa3789c5d4ab197bc9

      SHA256

      ff6ca0a62dd38a42391334d1e813b3c5ae223ca580c212d95ba6b80f30a0fac7

      SHA512

      aaa1f2b379644c619bb4619071e3102ddc23f6b5d810f922c5d159dae5da447785d9e178077b5cd79f9d8823bd49843587e0a8848d2149bb594b276e825784df

    • memory/1444-74-0x000000001EBF0000-0x000000001ECBD000-memory.dmp

      Filesize

      820KB

    • memory/4336-41-0x000000001BB90000-0x000000001BBE0000-memory.dmp

      Filesize

      320KB

    • memory/4336-36-0x0000000000BA0000-0x0000000000D90000-memory.dmp

      Filesize

      1.9MB

    • memory/4336-38-0x00000000016B0000-0x00000000016BE000-memory.dmp

      Filesize

      56KB

    • memory/4336-40-0x0000000002FE0000-0x0000000002FFC000-memory.dmp

      Filesize

      112KB

    • memory/4336-43-0x0000000003020000-0x0000000003038000-memory.dmp

      Filesize

      96KB

    • memory/4336-45-0x0000000003040000-0x0000000003058000-memory.dmp

      Filesize

      96KB

    • memory/4336-47-0x0000000002F60000-0x0000000002F6C000-memory.dmp

      Filesize

      48KB

    • memory/4336-64-0x000000001C060000-0x000000001C12D000-memory.dmp

      Filesize

      820KB

    • memory/4428-19-0x0000000000400000-0x000000000070B000-memory.dmp

      Filesize

      3.0MB

    • memory/4508-22-0x0000027E9E0F0000-0x0000027E9E0F1000-memory.dmp

      Filesize

      4KB

    • memory/4508-21-0x0000027E9DC00000-0x0000027E9DD52000-memory.dmp

      Filesize

      1.3MB

    • memory/4508-18-0x00007FFFAEA13000-0x00007FFFAEA15000-memory.dmp

      Filesize

      8KB