Analysis
-
max time kernel
119s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 09:13
Behavioral task
behavioral1
Sample
99209E1F30A833E0C7654FCC0AA2C9C5.exe
Resource
win7-20240903-en
General
-
Target
99209E1F30A833E0C7654FCC0AA2C9C5.exe
-
Size
4.7MB
-
MD5
99209e1f30a833e0c7654fcc0aa2c9c5
-
SHA1
75ac3347aae0a9dc3520ce0d31ca6ee2c7f4bbe5
-
SHA256
4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20
-
SHA512
abd6cac229ffac33e6ec887e41b041c4e02a5da1a054c474549657dfda326afbfd127c435f796d2945b0eb1d9586599936d0ddae339845dd43a91610c5baaa5b
-
SSDEEP
12288:egY1Cj1eUAM2X3bV+rrmDl5/NJoBh3fVFycj3eI8HnR80p0C2jGJBHAfVDS3E6t1:elMednbV+rrmlzM6AOhujGJBKKE6t1
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 3 IoCs
resource yara_rule behavioral1/memory/2896-1-0x0000000000DB0000-0x0000000000E84000-memory.dmp family_dcrat_v2 behavioral1/files/0x0009000000015e18-24.dat family_dcrat_v2 behavioral1/memory/2268-36-0x00000000011C0000-0x0000000001294000-memory.dmp family_dcrat_v2 -
Executes dropped EXE 1 IoCs
pid Process 2268 dwm.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Windows Portable Devices\Idle.exe 99209E1F30A833E0C7654FCC0AA2C9C5.exe File created C:\Program Files\Windows Portable Devices\6ccacd8608530f 99209E1F30A833E0C7654FCC0AA2C9C5.exe File created C:\Program Files (x86)\Windows Mail\fr-FR\dwm.exe 99209E1F30A833E0C7654FCC0AA2C9C5.exe File created C:\Program Files (x86)\Windows Mail\fr-FR\6cb0b6c459d5d3 99209E1F30A833E0C7654FCC0AA2C9C5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2400 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2400 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe Token: SeDebugPrivilege 2268 dwm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2268 dwm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2896 wrote to memory of 1912 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 28 PID 2896 wrote to memory of 1912 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 28 PID 2896 wrote to memory of 1912 2896 99209E1F30A833E0C7654FCC0AA2C9C5.exe 28 PID 1912 wrote to memory of 2396 1912 cmd.exe 30 PID 1912 wrote to memory of 2396 1912 cmd.exe 30 PID 1912 wrote to memory of 2396 1912 cmd.exe 30 PID 1912 wrote to memory of 2400 1912 cmd.exe 31 PID 1912 wrote to memory of 2400 1912 cmd.exe 31 PID 1912 wrote to memory of 2400 1912 cmd.exe 31 PID 1912 wrote to memory of 2268 1912 cmd.exe 32 PID 1912 wrote to memory of 2268 1912 cmd.exe 32 PID 1912 wrote to memory of 2268 1912 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\99209E1F30A833E0C7654FCC0AA2C9C5.exe"C:\Users\Admin\AppData\Local\Temp\99209E1F30A833E0C7654FCC0AA2C9C5.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\brv3OwcnhE.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2396
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2400
-
-
C:\Program Files (x86)\Windows Mail\fr-FR\dwm.exe"C:\Program Files (x86)\Windows Mail\fr-FR\dwm.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2268
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.7MB
MD599209e1f30a833e0c7654fcc0aa2c9c5
SHA175ac3347aae0a9dc3520ce0d31ca6ee2c7f4bbe5
SHA2564cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20
SHA512abd6cac229ffac33e6ec887e41b041c4e02a5da1a054c474549657dfda326afbfd127c435f796d2945b0eb1d9586599936d0ddae339845dd43a91610c5baaa5b
-
Filesize
177B
MD5f9987e8e98cd957a49b0f709d37d0a28
SHA1b7025b3e1d6d541a8e88c30ffc31b57f4e66f41a
SHA2567406715c0fa94f551b7b575b61e56a4122970ce5f09c278131a2a3b321a2e55e
SHA5123376af7a1cd7f484a6f01970c99f45fb34a115c56adc238e41199a9102810c945f49a8dd0afa35aa9c2ea00f56f00fe4d201cb545e094163c5493590c13fd0e2