Analysis
-
max time kernel
119s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 03:16
Static task
static1
Behavioral task
behavioral1
Sample
8576F95A0E018025E8B46367AE311E83.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8576F95A0E018025E8B46367AE311E83.exe
Resource
win10v2004-20241007-en
General
-
Target
8576F95A0E018025E8B46367AE311E83.exe
-
Size
4.6MB
-
MD5
8576f95a0e018025e8b46367ae311e83
-
SHA1
0d1c5e913dcc60910e454416e3c149c9d05f02f5
-
SHA256
b8c9a273058d6214aeccc822fb5f304edc734bd57a4ac43450feeacef70fafb8
-
SHA512
ef30324c2f5afdfe3639e7322e8e1845e661d55cd4ffff6f7bf65c85e8ac23d5d7c5b92f39d1807c9524a5fb29b21b45249a617f63f0e35ecd3803edd6dc7f30
-
SSDEEP
98304:d++ALvAvoV3JDBQSBK5f7a6uBt9iofavIah:TmvvV5DpQ7a6ugoCvIw
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Executes dropped EXE 5 IoCs
pid Process 2404 Bootstrapper.exe 2508 DCRatBuild.exe 1184 Process not Found 2848 Mscrt.exe 2512 Mscrt.exe -
Loads dropped DLL 10 IoCs
pid Process 2532 8576F95A0E018025E8B46367AE311E83.exe 1724 Process not Found 2532 8576F95A0E018025E8B46367AE311E83.exe 2928 cmd.exe 2928 cmd.exe 2272 WerFault.exe 2272 WerFault.exe 2272 WerFault.exe 2272 WerFault.exe 2272 WerFault.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\TAPI\088424020bedd6 Mscrt.exe File created C:\Windows\TAPI\conhost.exe Mscrt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DCRatBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8576F95A0E018025E8B46367AE311E83.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2856 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe 2848 Mscrt.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 2848 Mscrt.exe Token: SeIncreaseQuotaPrivilege 2912 WMIC.exe Token: SeSecurityPrivilege 2912 WMIC.exe Token: SeTakeOwnershipPrivilege 2912 WMIC.exe Token: SeLoadDriverPrivilege 2912 WMIC.exe Token: SeSystemProfilePrivilege 2912 WMIC.exe Token: SeSystemtimePrivilege 2912 WMIC.exe Token: SeProfSingleProcessPrivilege 2912 WMIC.exe Token: SeIncBasePriorityPrivilege 2912 WMIC.exe Token: SeCreatePagefilePrivilege 2912 WMIC.exe Token: SeBackupPrivilege 2912 WMIC.exe Token: SeRestorePrivilege 2912 WMIC.exe Token: SeShutdownPrivilege 2912 WMIC.exe Token: SeDebugPrivilege 2912 WMIC.exe Token: SeSystemEnvironmentPrivilege 2912 WMIC.exe Token: SeRemoteShutdownPrivilege 2912 WMIC.exe Token: SeUndockPrivilege 2912 WMIC.exe Token: SeManageVolumePrivilege 2912 WMIC.exe Token: 33 2912 WMIC.exe Token: 34 2912 WMIC.exe Token: 35 2912 WMIC.exe Token: SeIncreaseQuotaPrivilege 2912 WMIC.exe Token: SeSecurityPrivilege 2912 WMIC.exe Token: SeTakeOwnershipPrivilege 2912 WMIC.exe Token: SeLoadDriverPrivilege 2912 WMIC.exe Token: SeSystemProfilePrivilege 2912 WMIC.exe Token: SeSystemtimePrivilege 2912 WMIC.exe Token: SeProfSingleProcessPrivilege 2912 WMIC.exe Token: SeIncBasePriorityPrivilege 2912 WMIC.exe Token: SeCreatePagefilePrivilege 2912 WMIC.exe Token: SeBackupPrivilege 2912 WMIC.exe Token: SeRestorePrivilege 2912 WMIC.exe Token: SeShutdownPrivilege 2912 WMIC.exe Token: SeDebugPrivilege 2912 WMIC.exe Token: SeSystemEnvironmentPrivilege 2912 WMIC.exe Token: SeRemoteShutdownPrivilege 2912 WMIC.exe Token: SeUndockPrivilege 2912 WMIC.exe Token: SeManageVolumePrivilege 2912 WMIC.exe Token: 33 2912 WMIC.exe Token: 34 2912 WMIC.exe Token: 35 2912 WMIC.exe Token: SeDebugPrivilege 2404 Bootstrapper.exe Token: SeDebugPrivilege 2512 Mscrt.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2404 2532 8576F95A0E018025E8B46367AE311E83.exe 30 PID 2532 wrote to memory of 2404 2532 8576F95A0E018025E8B46367AE311E83.exe 30 PID 2532 wrote to memory of 2404 2532 8576F95A0E018025E8B46367AE311E83.exe 30 PID 2532 wrote to memory of 2404 2532 8576F95A0E018025E8B46367AE311E83.exe 30 PID 2532 wrote to memory of 2508 2532 8576F95A0E018025E8B46367AE311E83.exe 32 PID 2532 wrote to memory of 2508 2532 8576F95A0E018025E8B46367AE311E83.exe 32 PID 2532 wrote to memory of 2508 2532 8576F95A0E018025E8B46367AE311E83.exe 32 PID 2532 wrote to memory of 2508 2532 8576F95A0E018025E8B46367AE311E83.exe 32 PID 2508 wrote to memory of 2376 2508 DCRatBuild.exe 33 PID 2508 wrote to memory of 2376 2508 DCRatBuild.exe 33 PID 2508 wrote to memory of 2376 2508 DCRatBuild.exe 33 PID 2508 wrote to memory of 2376 2508 DCRatBuild.exe 33 PID 2404 wrote to memory of 2808 2404 Bootstrapper.exe 34 PID 2404 wrote to memory of 2808 2404 Bootstrapper.exe 34 PID 2404 wrote to memory of 2808 2404 Bootstrapper.exe 34 PID 2808 wrote to memory of 2856 2808 cmd.exe 36 PID 2808 wrote to memory of 2856 2808 cmd.exe 36 PID 2808 wrote to memory of 2856 2808 cmd.exe 36 PID 2376 wrote to memory of 2928 2376 WScript.exe 37 PID 2376 wrote to memory of 2928 2376 WScript.exe 37 PID 2376 wrote to memory of 2928 2376 WScript.exe 37 PID 2376 wrote to memory of 2928 2376 WScript.exe 37 PID 2928 wrote to memory of 2848 2928 cmd.exe 39 PID 2928 wrote to memory of 2848 2928 cmd.exe 39 PID 2928 wrote to memory of 2848 2928 cmd.exe 39 PID 2928 wrote to memory of 2848 2928 cmd.exe 39 PID 2848 wrote to memory of 2976 2848 Mscrt.exe 40 PID 2848 wrote to memory of 2976 2848 Mscrt.exe 40 PID 2848 wrote to memory of 2976 2848 Mscrt.exe 40 PID 2976 wrote to memory of 1032 2976 cmd.exe 42 PID 2976 wrote to memory of 1032 2976 cmd.exe 42 PID 2976 wrote to memory of 1032 2976 cmd.exe 42 PID 2976 wrote to memory of 2004 2976 cmd.exe 43 PID 2976 wrote to memory of 2004 2976 cmd.exe 43 PID 2976 wrote to memory of 2004 2976 cmd.exe 43 PID 2404 wrote to memory of 2020 2404 Bootstrapper.exe 44 PID 2404 wrote to memory of 2020 2404 Bootstrapper.exe 44 PID 2404 wrote to memory of 2020 2404 Bootstrapper.exe 44 PID 2020 wrote to memory of 2912 2020 cmd.exe 46 PID 2020 wrote to memory of 2912 2020 cmd.exe 46 PID 2020 wrote to memory of 2912 2020 cmd.exe 46 PID 2404 wrote to memory of 2272 2404 Bootstrapper.exe 48 PID 2404 wrote to memory of 2272 2404 Bootstrapper.exe 48 PID 2404 wrote to memory of 2272 2404 Bootstrapper.exe 48 PID 2976 wrote to memory of 2512 2976 cmd.exe 49 PID 2976 wrote to memory of 2512 2976 cmd.exe 49 PID 2976 wrote to memory of 2512 2976 cmd.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\8576F95A0E018025E8B46367AE311E83.exe"C:\Users\Admin\AppData\Local\Temp\8576F95A0E018025E8B46367AE311E83.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\cmd.exe"cmd" /c ipconfig /all3⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:2856
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")3⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\System32\Wbem\WMIC.exewmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2404 -s 11283⤵
- Loads dropped DLL
PID:2272
-
-
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ComponentReviewperfmonitor\Uq2tX7p25HNYhIggX0PpAZXDUcRcexvQlwrHhzLqWtjOjit.vbe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ComponentReviewperfmonitor\QUMJYJlT6Ngt.bat" "4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\ComponentReviewperfmonitor\Mscrt.exe"C:\ComponentReviewperfmonitor/Mscrt.exe"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NMENkFjCyN.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:1032
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:2004
-
-
C:\ComponentReviewperfmonitor\Mscrt.exe"C:\ComponentReviewperfmonitor\Mscrt.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83B
MD5514f93d92ae221458937c720626b46b3
SHA1608eabeab6fd1b15449452c146dca0e08421b3e5
SHA256630c846609cc08488485cd976ca51355f8c43666d59186df6936747ce06d383f
SHA51283ec92c38be82ffb0e817ac97e545ef8c83c19e891474ca78fe469fe99da63a5e00c38449d04a7de31be543c64a99adb5732d2e7d966eaccc23998666e7aae28
-
Filesize
216B
MD527f28b26b1a641e515a8c84280fc4638
SHA1103d1e3b99c8900e4fde8cf88e91e9a30132e614
SHA2567610dec18100d028feb67fd231ced9f363ffcf79a8788d8b37c909c5393bbd58
SHA512aa2025dd4ffa8dd73838d10b6b2bd9b1a197ded1d4aa04645a2e51d33b5ee3d970c8b8dbeebfe2f23d728ccea83d63ca40501822ba57dde477ede93340c398c2
-
Filesize
215B
MD59da399b2ebf30875c9e0dcaeeb1a9929
SHA10ab7299dbe9b5f3b492bf0b487e1023bc7949c51
SHA256e58771bc3b4ec783b151b5b4dfff56c64e83545b8da2918d9139ee927c33521b
SHA512c25cdfab01f705c94421ba1d429c9abdbdcbd09374feea5ff7673fe992cd59031849947eba254176e9c6b7ac6a82444fc0f09d980929dc009d3f55589fc64daa
-
Filesize
3.5MB
MD5e7870cd0c30a52066c454c15a5a5a2f5
SHA1fc64203e05c104a116e7e4c354c9ee77c99737d6
SHA256e4a958444e72eb1b3be02f3a8bf29044a81f328405a4969a4f66515ef219774e
SHA5123e0a40959eaba1fbf3cb7a11707bc658421f3066e4e1beea56088ac213c10524127d4d9e2500e549a1ee608887c113973892d54fb91fae6ea9db4eb9e818bebe
-
Filesize
800KB
MD502c70d9d6696950c198db93b7f6a835e
SHA130231a467a49cc37768eea0f55f4bea1cbfb48e2
SHA2568f2e28588f2303bd8d7a9b0c3ff6a9cb16fa93f8ddc9c5e0666a8c12d6880ee3
SHA512431d9b9918553bff4f4a5bc2a5e7b7015f8ad0e2d390bb4d5264d08983372424156524ef5587b24b67d1226856fc630aaca08edc8113097e0094501b4f08efeb
-
Filesize
3.8MB
MD54680b7118d5d69d9d9aca7265a07fa8b
SHA147036b3ed3f8ac995680bb6e9d12c91d30d840be
SHA25698b1a4b0f9d10a1310b30401147cbd7fbb328f03f00c4dd31b99ab6bedf651ff
SHA5126593078d884dd5eeefb528c388dfd05f528b03d35b93e47ed73ed27ff35769b6ef5991dd837cb398a44139a35407ab0917bda82b90a39ed1eecab2a99cd1f3d7