Analysis

  • max time kernel
    120s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 02:46

General

  • Target

    e4a958444e72eb1b3be02f3a8bf29044a81f328405a4969a4f66515ef219774e.exe

  • Size

    3.5MB

  • MD5

    e7870cd0c30a52066c454c15a5a5a2f5

  • SHA1

    fc64203e05c104a116e7e4c354c9ee77c99737d6

  • SHA256

    e4a958444e72eb1b3be02f3a8bf29044a81f328405a4969a4f66515ef219774e

  • SHA512

    3e0a40959eaba1fbf3cb7a11707bc658421f3066e4e1beea56088ac213c10524127d4d9e2500e549a1ee608887c113973892d54fb91fae6ea9db4eb9e818bebe

  • SSDEEP

    98304:sALvAvoV3JDBQSBK5f7a6uBt9iofavIa:smvvV5DpQ7a6ugoCvI

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4a958444e72eb1b3be02f3a8bf29044a81f328405a4969a4f66515ef219774e.exe
    "C:\Users\Admin\AppData\Local\Temp\e4a958444e72eb1b3be02f3a8bf29044a81f328405a4969a4f66515ef219774e.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1912
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aV5EmrSpqX.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2688
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2700
        • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\sppsvc.exe
          "C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\sppsvc.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious use of AdjustPrivilegeToken
          PID:1016

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\aV5EmrSpqX.bat

      Filesize

      201B

      MD5

      542c290ee15a6fdd24f637b0be81ffbb

      SHA1

      fd43631d07a1a6d3583188ec84b45a5fcfa2fa70

      SHA256

      ce71cdc4e58adc482a558dfcc62fe027d301ffcd2fa8501f90f4f31168810b6c

      SHA512

      a82fe9a18c742044726c8289200438c6b4a2753089173d15f50d696755b0306b5276fa1425e4c8dec8712d20069883a2c400460595204daf94765cca0d211638

    • C:\Users\Default\lsass.exe

      Filesize

      3.5MB

      MD5

      e7870cd0c30a52066c454c15a5a5a2f5

      SHA1

      fc64203e05c104a116e7e4c354c9ee77c99737d6

      SHA256

      e4a958444e72eb1b3be02f3a8bf29044a81f328405a4969a4f66515ef219774e

      SHA512

      3e0a40959eaba1fbf3cb7a11707bc658421f3066e4e1beea56088ac213c10524127d4d9e2500e549a1ee608887c113973892d54fb91fae6ea9db4eb9e818bebe

    • memory/1016-77-0x00000000012B0000-0x000000000163E000-memory.dmp

      Filesize

      3.6MB

    • memory/1912-31-0x0000000000730000-0x0000000000746000-memory.dmp

      Filesize

      88KB

    • memory/1912-2-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

      Filesize

      9.9MB

    • memory/1912-8-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

      Filesize

      9.9MB

    • memory/1912-33-0x0000000000750000-0x0000000000762000-memory.dmp

      Filesize

      72KB

    • memory/1912-5-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

      Filesize

      9.9MB

    • memory/1912-10-0x0000000000180000-0x000000000018E000-memory.dmp

      Filesize

      56KB

    • memory/1912-13-0x0000000000580000-0x000000000059C000-memory.dmp

      Filesize

      112KB

    • memory/1912-14-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

      Filesize

      9.9MB

    • memory/1912-11-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

      Filesize

      9.9MB

    • memory/1912-16-0x0000000000520000-0x0000000000530000-memory.dmp

      Filesize

      64KB

    • memory/1912-18-0x00000000005A0000-0x00000000005B8000-memory.dmp

      Filesize

      96KB

    • memory/1912-20-0x0000000000530000-0x0000000000540000-memory.dmp

      Filesize

      64KB

    • memory/1912-21-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

      Filesize

      9.9MB

    • memory/1912-23-0x0000000000540000-0x0000000000550000-memory.dmp

      Filesize

      64KB

    • memory/1912-25-0x00000000006C0000-0x00000000006CE000-memory.dmp

      Filesize

      56KB

    • memory/1912-27-0x00000000006F0000-0x0000000000702000-memory.dmp

      Filesize

      72KB

    • memory/1912-29-0x00000000006D0000-0x00000000006E0000-memory.dmp

      Filesize

      64KB

    • memory/1912-0-0x000007FEF5E73000-0x000007FEF5E74000-memory.dmp

      Filesize

      4KB

    • memory/1912-7-0x0000000000550000-0x0000000000576000-memory.dmp

      Filesize

      152KB

    • memory/1912-4-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

      Filesize

      9.9MB

    • memory/1912-37-0x00000000006E0000-0x00000000006EE000-memory.dmp

      Filesize

      56KB

    • memory/1912-35-0x000007FEF5E73000-0x000007FEF5E74000-memory.dmp

      Filesize

      4KB

    • memory/1912-39-0x0000000000710000-0x0000000000720000-memory.dmp

      Filesize

      64KB

    • memory/1912-41-0x0000000000720000-0x0000000000730000-memory.dmp

      Filesize

      64KB

    • memory/1912-42-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

      Filesize

      9.9MB

    • memory/1912-44-0x0000000002390000-0x00000000023EA000-memory.dmp

      Filesize

      360KB

    • memory/1912-46-0x0000000000770000-0x000000000077E000-memory.dmp

      Filesize

      56KB

    • memory/1912-48-0x0000000000780000-0x0000000000790000-memory.dmp

      Filesize

      64KB

    • memory/1912-50-0x0000000000910000-0x000000000091E000-memory.dmp

      Filesize

      56KB

    • memory/1912-52-0x0000000000A50000-0x0000000000A68000-memory.dmp

      Filesize

      96KB

    • memory/1912-54-0x0000000000A30000-0x0000000000A3C000-memory.dmp

      Filesize

      48KB

    • memory/1912-56-0x000000001ABB0000-0x000000001ABFE000-memory.dmp

      Filesize

      312KB

    • memory/1912-3-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

      Filesize

      9.9MB

    • memory/1912-71-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

      Filesize

      9.9MB

    • memory/1912-73-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

      Filesize

      9.9MB

    • memory/1912-34-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

      Filesize

      9.9MB

    • memory/1912-1-0x0000000000190000-0x000000000051E000-memory.dmp

      Filesize

      3.6MB