Analysis
-
max time kernel
132s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 15:26
Static task
static1
Behavioral task
behavioral1
Sample
96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe
Resource
win7-20240903-en
General
-
Target
96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe
-
Size
1.0MB
-
MD5
7b4ad4dbf6e4580b8f8c77b4cee261c3
-
SHA1
a0ec2acea793dda997a3dfa1c869c66a3122341f
-
SHA256
96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29
-
SHA512
3349cad638cf58a3c15b7a16df797b15dc528dc181d5133b654312d8155a3dcaa2b239abfb44d55b0d5ef11f932da15683275f36052ee7ade43c390b04a2bf00
-
SSDEEP
24576:a9yzNBe14PPPDj5pGSZb1iUyJxuxqH1jznDyLyF8pb5RG846Eg4Pi9:he1UPpp/1iVJxuxk1neLyQOp6ErPM
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 4 IoCs
resource yara_rule behavioral1/files/0x0008000000016c73-30.dat family_dcrat_v2 behavioral1/memory/2448-32-0x0000000000FD0000-0x0000000001080000-memory.dmp family_dcrat_v2 behavioral1/memory/2568-28-0x0000000000400000-0x00000000004E6000-memory.dmp family_dcrat_v2 behavioral1/memory/2324-56-0x0000000000B10000-0x0000000000BC0000-memory.dmp family_dcrat_v2 -
Executes dropped EXE 3 IoCs
pid Process 336 Yn5N0ejU23.exe 2448 zgWUToSpXG.exe 2324 spoolsv.exe -
Loads dropped DLL 2 IoCs
pid Process 2568 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 2568 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 340 set thread context of 2568 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 34 -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Mail\it-IT\spoolsv.exe zgWUToSpXG.exe File opened for modification C:\Program Files (x86)\Windows Mail\it-IT\spoolsv.exe zgWUToSpXG.exe File created C:\Program Files (x86)\Windows Mail\it-IT\f3b6ecef712a24 zgWUToSpXG.exe File created C:\Program Files\Common Files\Services\wininit.exe zgWUToSpXG.exe File created C:\Program Files\Common Files\Services\56085415360792 zgWUToSpXG.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\security\templates\101b941d020240 zgWUToSpXG.exe File created C:\Windows\security\templates\lsm.exe zgWUToSpXG.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2808 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2808 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2448 zgWUToSpXG.exe 2324 spoolsv.exe 2324 spoolsv.exe 2324 spoolsv.exe 2324 spoolsv.exe 2324 spoolsv.exe 2324 spoolsv.exe 2324 spoolsv.exe 2324 spoolsv.exe 2324 spoolsv.exe 2324 spoolsv.exe 2324 spoolsv.exe 2324 spoolsv.exe 2324 spoolsv.exe 2324 spoolsv.exe 2324 spoolsv.exe 2324 spoolsv.exe 2324 spoolsv.exe 2324 spoolsv.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2324 spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2448 zgWUToSpXG.exe Token: SeDebugPrivilege 2324 spoolsv.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 340 wrote to memory of 2176 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 31 PID 340 wrote to memory of 2176 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 31 PID 340 wrote to memory of 2176 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 31 PID 340 wrote to memory of 2176 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 31 PID 340 wrote to memory of 2304 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 32 PID 340 wrote to memory of 2304 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 32 PID 340 wrote to memory of 2304 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 32 PID 340 wrote to memory of 2304 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 32 PID 340 wrote to memory of 532 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 33 PID 340 wrote to memory of 532 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 33 PID 340 wrote to memory of 532 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 33 PID 340 wrote to memory of 532 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 33 PID 340 wrote to memory of 2568 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 34 PID 340 wrote to memory of 2568 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 34 PID 340 wrote to memory of 2568 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 34 PID 340 wrote to memory of 2568 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 34 PID 340 wrote to memory of 2568 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 34 PID 340 wrote to memory of 2568 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 34 PID 340 wrote to memory of 2568 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 34 PID 340 wrote to memory of 2568 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 34 PID 340 wrote to memory of 2568 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 34 PID 340 wrote to memory of 2568 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 34 PID 340 wrote to memory of 2568 340 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 34 PID 2568 wrote to memory of 2448 2568 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 36 PID 2568 wrote to memory of 2448 2568 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 36 PID 2568 wrote to memory of 2448 2568 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 36 PID 2568 wrote to memory of 2448 2568 96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe 36 PID 2448 wrote to memory of 2780 2448 zgWUToSpXG.exe 37 PID 2448 wrote to memory of 2780 2448 zgWUToSpXG.exe 37 PID 2448 wrote to memory of 2780 2448 zgWUToSpXG.exe 37 PID 2780 wrote to memory of 2644 2780 cmd.exe 39 PID 2780 wrote to memory of 2644 2780 cmd.exe 39 PID 2780 wrote to memory of 2644 2780 cmd.exe 39 PID 2780 wrote to memory of 2808 2780 cmd.exe 40 PID 2780 wrote to memory of 2808 2780 cmd.exe 40 PID 2780 wrote to memory of 2808 2780 cmd.exe 40 PID 2780 wrote to memory of 2324 2780 cmd.exe 42 PID 2780 wrote to memory of 2324 2780 cmd.exe 42 PID 2780 wrote to memory of 2324 2780 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe"C:\Users\Admin\AppData\Local\Temp\96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe"C:\Users\Admin\AppData\Local\Temp\96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe"2⤵PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe"C:\Users\Admin\AppData\Local\Temp\96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe"2⤵PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe"C:\Users\Admin\AppData\Local\Temp\96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe"2⤵PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe"C:\Users\Admin\AppData\Local\Temp\96a676b5a46cd2272459d16c6ba3bacb0c8d3f47059aeb08a94cefd2c9fa3f29.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Roaming\Yn5N0ejU23.exe"C:\Users\Admin\AppData\Roaming\Yn5N0ejU23.exe"3⤵
- Executes dropped EXE
PID:336
-
-
C:\Users\Admin\AppData\Roaming\zgWUToSpXG.exe"C:\Users\Admin\AppData\Roaming\zgWUToSpXG.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mDw5KalQvL.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:2644
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2808
-
-
C:\Program Files (x86)\Windows Mail\it-IT\spoolsv.exe"C:\Program Files (x86)\Windows Mail\it-IT\spoolsv.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181B
MD5409b5a029555748226dc739a87abc8d6
SHA1c6ee08ee2e767b16a5ad33926ac6a5ce6af86407
SHA25678d0850fb846c9b398da431e8ba65ded5750951e85ef7e8eea298b6333cbe8c2
SHA512f3e59127f6a8145d109ac1afcbe996b0d7353cf5411609af5e63ef8e081e7bedec22318439e65bd5593a2ff79ced3f544f619bb954fdfd4d8abe0c199e8d67d0
-
Filesize
18KB
MD5f3edff85de5fd002692d54a04bcb1c09
SHA14c844c5b0ee7cb230c9c28290d079143e00cb216
SHA256caf29650446db3842e1c1e8e5e1bafadaf90fc82c5c37b9e2c75a089b7476131
SHA512531d920e2567f58e8169afc786637c1a0f7b9b5c27b27b5f0eddbfc3e00cecd7bea597e34061d836647c5f8c7757f2fe02952a9793344e21b39ddd4bf7985f9d
-
Filesize
675KB
MD5314420bac969bcfb9510a0e8cc3686d6
SHA166f1d0a60a2727970476a105c88883f37270e30f
SHA25638b9cc3ccae02c270e3d62e62e3b3b40e90ad7f898372b8a5035445ba32f4b26
SHA512debf908add95aa0849451aef830e5e71724247d352dcb5dad6b02dca0d54e4e915a9430de80d970a4e7ef3749eb2fc7c6fa7839348d84f546d5934d713e7569c