Analysis

  • max time kernel
    120s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-12-2024 18:36

General

  • Target

    E7870CD0C30A52066C454C15A5A5A2F5.exe

  • Size

    3.5MB

  • MD5

    e7870cd0c30a52066c454c15a5a5a2f5

  • SHA1

    fc64203e05c104a116e7e4c354c9ee77c99737d6

  • SHA256

    e4a958444e72eb1b3be02f3a8bf29044a81f328405a4969a4f66515ef219774e

  • SHA512

    3e0a40959eaba1fbf3cb7a11707bc658421f3066e4e1beea56088ac213c10524127d4d9e2500e549a1ee608887c113973892d54fb91fae6ea9db4eb9e818bebe

  • SSDEEP

    98304:sALvAvoV3JDBQSBK5f7a6uBt9iofavIa:smvvV5DpQ7a6ugoCvI

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Drops file in Program Files directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\E7870CD0C30A52066C454C15A5A5A2F5.exe
    "C:\Users\Admin\AppData\Local\Temp\E7870CD0C30A52066C454C15A5A5A2F5.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SHteUbqsfJ.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2576
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:1664
        • C:\Users\Admin\AppData\Local\Temp\E7870CD0C30A52066C454C15A5A5A2F5.exe
          "C:\Users\Admin\AppData\Local\Temp\E7870CD0C30A52066C454C15A5A5A2F5.exe"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:792

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\SHteUbqsfJ.bat

      Filesize

      198B

      MD5

      40685fdb41591e59f9ff20b04d20050b

      SHA1

      b3ce27b838177c22be10d56cb7975ad81028c923

      SHA256

      33414f8a10bc897dfa0f89524dd57e940629f3b029c7458d8c36bf7359107f59

      SHA512

      e396100e61ad79a64ce5602b053228c87feabd2be843a1da7e5fc22dca91d2c75ef5b3ef4841bc0c88549f4bf76dedef77c214d0d7deb326a098c0a72aae6c3d

    • C:\Users\Public\lsass.exe

      Filesize

      3.5MB

      MD5

      e7870cd0c30a52066c454c15a5a5a2f5

      SHA1

      fc64203e05c104a116e7e4c354c9ee77c99737d6

      SHA256

      e4a958444e72eb1b3be02f3a8bf29044a81f328405a4969a4f66515ef219774e

      SHA512

      3e0a40959eaba1fbf3cb7a11707bc658421f3066e4e1beea56088ac213c10524127d4d9e2500e549a1ee608887c113973892d54fb91fae6ea9db4eb9e818bebe

    • memory/792-75-0x00000000003C0000-0x000000000074E000-memory.dmp

      Filesize

      3.6MB

    • memory/1044-20-0x00000000002D0000-0x00000000002E0000-memory.dmp

      Filesize

      64KB

    • memory/1044-74-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

      Filesize

      9.9MB

    • memory/1044-6-0x00000000002A0000-0x00000000002C6000-memory.dmp

      Filesize

      152KB

    • memory/1044-31-0x00000000003C0000-0x00000000003D0000-memory.dmp

      Filesize

      64KB

    • memory/1044-8-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

      Filesize

      9.9MB

    • memory/1044-10-0x0000000000280000-0x000000000028E000-memory.dmp

      Filesize

      56KB

    • memory/1044-13-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

      Filesize

      9.9MB

    • memory/1044-16-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

      Filesize

      9.9MB

    • memory/1044-15-0x0000000000290000-0x00000000002A0000-memory.dmp

      Filesize

      64KB

    • memory/1044-12-0x0000000000380000-0x000000000039C000-memory.dmp

      Filesize

      112KB

    • memory/1044-18-0x00000000003A0000-0x00000000003B8000-memory.dmp

      Filesize

      96KB

    • memory/1044-27-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

      Filesize

      9.9MB

    • memory/1044-26-0x0000000000370000-0x000000000037E000-memory.dmp

      Filesize

      56KB

    • memory/1044-24-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

      Filesize

      9.9MB

    • memory/1044-29-0x0000000000500000-0x0000000000512000-memory.dmp

      Filesize

      72KB

    • memory/1044-23-0x0000000000360000-0x0000000000370000-memory.dmp

      Filesize

      64KB

    • memory/1044-21-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

      Filesize

      9.9MB

    • memory/1044-0-0x000007FEF5233000-0x000007FEF5234000-memory.dmp

      Filesize

      4KB

    • memory/1044-7-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

      Filesize

      9.9MB

    • memory/1044-4-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

      Filesize

      9.9MB

    • memory/1044-37-0x00000000003D0000-0x00000000003DE000-memory.dmp

      Filesize

      56KB

    • memory/1044-35-0x0000000000540000-0x0000000000552000-memory.dmp

      Filesize

      72KB

    • memory/1044-39-0x00000000003E0000-0x00000000003F0000-memory.dmp

      Filesize

      64KB

    • memory/1044-41-0x0000000000560000-0x0000000000570000-memory.dmp

      Filesize

      64KB

    • memory/1044-43-0x0000000001360000-0x00000000013BA000-memory.dmp

      Filesize

      360KB

    • memory/1044-45-0x0000000000570000-0x000000000057E000-memory.dmp

      Filesize

      56KB

    • memory/1044-47-0x0000000000580000-0x0000000000590000-memory.dmp

      Filesize

      64KB

    • memory/1044-49-0x0000000000590000-0x000000000059E000-memory.dmp

      Filesize

      56KB

    • memory/1044-51-0x00000000005E0000-0x00000000005F8000-memory.dmp

      Filesize

      96KB

    • memory/1044-53-0x00000000005A0000-0x00000000005AC000-memory.dmp

      Filesize

      48KB

    • memory/1044-55-0x000000001B090000-0x000000001B0DE000-memory.dmp

      Filesize

      312KB

    • memory/1044-3-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

      Filesize

      9.9MB

    • memory/1044-67-0x000007FEF5233000-0x000007FEF5234000-memory.dmp

      Filesize

      4KB

    • memory/1044-71-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

      Filesize

      9.9MB

    • memory/1044-2-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

      Filesize

      9.9MB

    • memory/1044-33-0x0000000000520000-0x0000000000536000-memory.dmp

      Filesize

      88KB

    • memory/1044-1-0x00000000013E0000-0x000000000176E000-memory.dmp

      Filesize

      3.6MB