Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 09:06
Behavioral task
behavioral1
Sample
99209E1F30A833E0C7654FCC0AA2C9C5.exe
Resource
win7-20241023-en
General
-
Target
99209E1F30A833E0C7654FCC0AA2C9C5.exe
-
Size
4.7MB
-
MD5
99209e1f30a833e0c7654fcc0aa2c9c5
-
SHA1
75ac3347aae0a9dc3520ce0d31ca6ee2c7f4bbe5
-
SHA256
4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20
-
SHA512
abd6cac229ffac33e6ec887e41b041c4e02a5da1a054c474549657dfda326afbfd127c435f796d2945b0eb1d9586599936d0ddae339845dd43a91610c5baaa5b
-
SSDEEP
12288:egY1Cj1eUAM2X3bV+rrmDl5/NJoBh3fVFycj3eI8HnR80p0C2jGJBHAfVDS3E6t1:elMednbV+rrmlzM6AOhujGJBKKE6t1
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 2 IoCs
resource yara_rule behavioral2/memory/2440-1-0x00000000000D0000-0x00000000001A4000-memory.dmp family_dcrat_v2 behavioral2/files/0x0007000000023cb4-28.dat family_dcrat_v2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 99209E1F30A833E0C7654FCC0AA2C9C5.exe -
Executes dropped EXE 1 IoCs
pid Process 4836 csrss.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\winlogon.exe 99209E1F30A833E0C7654FCC0AA2C9C5.exe File created C:\Program Files\Common Files\cc11b995f2a76d 99209E1F30A833E0C7654FCC0AA2C9C5.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Panther\actionqueue\886983d96e3d3e 99209E1F30A833E0C7654FCC0AA2C9C5.exe File created C:\Windows\Prefetch\fontdrvhost.exe 99209E1F30A833E0C7654FCC0AA2C9C5.exe File opened for modification C:\Windows\Prefetch\fontdrvhost.exe 99209E1F30A833E0C7654FCC0AA2C9C5.exe File created C:\Windows\Prefetch\5b884080fd4f94 99209E1F30A833E0C7654FCC0AA2C9C5.exe File created C:\Windows\Panther\actionqueue\csrss.exe 99209E1F30A833E0C7654FCC0AA2C9C5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 99209E1F30A833E0C7654FCC0AA2C9C5.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4836 csrss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe Token: SeDebugPrivilege 4836 csrss.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4836 csrss.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2428 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 85 PID 2440 wrote to memory of 2428 2440 99209E1F30A833E0C7654FCC0AA2C9C5.exe 85 PID 2428 wrote to memory of 4392 2428 cmd.exe 87 PID 2428 wrote to memory of 4392 2428 cmd.exe 87 PID 2428 wrote to memory of 3692 2428 cmd.exe 88 PID 2428 wrote to memory of 3692 2428 cmd.exe 88 PID 2428 wrote to memory of 4836 2428 cmd.exe 90 PID 2428 wrote to memory of 4836 2428 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\99209E1F30A833E0C7654FCC0AA2C9C5.exe"C:\Users\Admin\AppData\Local\Temp\99209E1F30A833E0C7654FCC0AA2C9C5.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xMYL1qaDAA.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:4392
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3692
-
-
C:\Windows\Panther\actionqueue\csrss.exe"C:\Windows\Panther\actionqueue\csrss.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.7MB
MD599209e1f30a833e0c7654fcc0aa2c9c5
SHA175ac3347aae0a9dc3520ce0d31ca6ee2c7f4bbe5
SHA2564cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20
SHA512abd6cac229ffac33e6ec887e41b041c4e02a5da1a054c474549657dfda326afbfd127c435f796d2945b0eb1d9586599936d0ddae339845dd43a91610c5baaa5b
-
Filesize
216B
MD5890d9fb696c06dc610caecdd3e945a72
SHA1644e361517ec3d7fdbdce4d226ad1e1146b9298a
SHA256fa87bb1ffa6f6eb8ae438133b337804b668efa8ded00bcbe953f71c63f2fe3aa
SHA5122765e8c07268a5dc887a87d7ccc09cf2a3d9023cfd034326664b6fd368b837290f818d6f53263821c86105d02c4f78dde6be552d80e0db19b86c7fd35f17f12d