Analysis
-
max time kernel
125s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe
Resource
win7-20241023-en
General
-
Target
8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe
-
Size
3.9MB
-
MD5
5db95c4de9b6e98c653ac3dec5dce83d
-
SHA1
c3e1cb98b5450d21c8e9e975148c282afcf4ccae
-
SHA256
8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7
-
SHA512
42e5504904f0db4e62d56c03c8e7e302df0eba488a966259aa686e7d952db8a25eb56b5ac72731400cfd2541b6429d82e95e3bb8e87565bdf0cbe2b488c47368
-
SSDEEP
98304:1VtCpBXG8uKobY22R0pbuov/BXG8uKobY22R0pbuovJ:2ghSRaCo3ghSRaCoR
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023caf-22.dat family_dcrat_v2 behavioral2/memory/656-27-0x0000000000400000-0x00000000005DF000-memory.dmp family_dcrat_v2 behavioral2/memory/1580-30-0x0000000000240000-0x00000000003E8000-memory.dmp family_dcrat_v2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation L5NekKdnpJ.exe -
Executes dropped EXE 3 IoCs
pid Process 5020 TCAuymFYVI.exe 1580 L5NekKdnpJ.exe 1164 backgroundTaskHost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 824 set thread context of 656 824 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe 84 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Uninstall Information\e6c9b481da804f L5NekKdnpJ.exe File created C:\Program Files (x86)\Windows Portable Devices\L5NekKdnpJ.exe L5NekKdnpJ.exe File created C:\Program Files (x86)\Windows Portable Devices\5988c48611cfd2 L5NekKdnpJ.exe File created C:\Program Files\Uninstall Information\OfficeClickToRun.exe L5NekKdnpJ.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\System\Speech\explorer.exe L5NekKdnpJ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings L5NekKdnpJ.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe 1580 L5NekKdnpJ.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1164 backgroundTaskHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1580 L5NekKdnpJ.exe Token: SeDebugPrivilege 1164 backgroundTaskHost.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 824 wrote to memory of 656 824 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe 84 PID 824 wrote to memory of 656 824 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe 84 PID 824 wrote to memory of 656 824 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe 84 PID 824 wrote to memory of 656 824 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe 84 PID 824 wrote to memory of 656 824 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe 84 PID 824 wrote to memory of 656 824 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe 84 PID 824 wrote to memory of 656 824 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe 84 PID 824 wrote to memory of 656 824 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe 84 PID 824 wrote to memory of 656 824 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe 84 PID 824 wrote to memory of 656 824 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe 84 PID 656 wrote to memory of 5020 656 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe 85 PID 656 wrote to memory of 5020 656 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe 85 PID 656 wrote to memory of 1580 656 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe 87 PID 656 wrote to memory of 1580 656 8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe 87 PID 1580 wrote to memory of 2200 1580 L5NekKdnpJ.exe 88 PID 1580 wrote to memory of 2200 1580 L5NekKdnpJ.exe 88 PID 2200 wrote to memory of 2404 2200 cmd.exe 90 PID 2200 wrote to memory of 2404 2200 cmd.exe 90 PID 2200 wrote to memory of 4832 2200 cmd.exe 91 PID 2200 wrote to memory of 4832 2200 cmd.exe 91 PID 2200 wrote to memory of 1164 2200 cmd.exe 99 PID 2200 wrote to memory of 1164 2200 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe"C:\Users\Admin\AppData\Local\Temp\8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe"C:\Users\Admin\AppData\Local\Temp\8ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Roaming\TCAuymFYVI.exe"C:\Users\Admin\AppData\Roaming\TCAuymFYVI.exe"3⤵
- Executes dropped EXE
PID:5020
-
-
C:\Users\Admin\AppData\Roaming\L5NekKdnpJ.exe"C:\Users\Admin\AppData\Roaming\L5NekKdnpJ.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kMS9V8c0aB.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:2404
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵PID:4832
-
-
C:\Recovery\WindowsRE\backgroundTaskHost.exe"C:\Recovery\WindowsRE\backgroundTaskHost.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220B
MD562205ddefd2449eca2495d95a8b182a3
SHA1cce80aeeecab6ce307cdd168f0c974bd1bb03bcc
SHA256c6170b80af36e17529f002502ad4c1faba04a031d9514e1eb46e499618a42a96
SHA512657f94a3dd868564953725f800f2a1cbc7cca0ad18b4206ada7c344e13ce992b0305a679d60fc3f7215c608e6f7ef48e15ee4ef9e9d941a75591ce5dff20750a
-
Filesize
1.6MB
MD5579fd24f4cacc972f63f47214f9c3c34
SHA120be9c6e9aa29d57b670d6809ffad1786a8508e5
SHA256f80bd8eb42194df565e3152d35bad6a40fdae70e221e9e66873587bffb73d64b
SHA5121a8f7918b931fa10cbc4b47a88405c0b28255360ac27e1d44ba00554186ed20139fbaaa278a362c34a20083f4fff30dc83876c3f382397f831f781fb6a9aab91
-
Filesize
18KB
MD5f3edff85de5fd002692d54a04bcb1c09
SHA14c844c5b0ee7cb230c9c28290d079143e00cb216
SHA256caf29650446db3842e1c1e8e5e1bafadaf90fc82c5c37b9e2c75a089b7476131
SHA512531d920e2567f58e8169afc786637c1a0f7b9b5c27b27b5f0eddbfc3e00cecd7bea597e34061d836647c5f8c7757f2fe02952a9793344e21b39ddd4bf7985f9d