Analysis

  • max time kernel
    133s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 09:13

General

  • Target

    99209E1F30A833E0C7654FCC0AA2C9C5.exe

  • Size

    4.7MB

  • MD5

    99209e1f30a833e0c7654fcc0aa2c9c5

  • SHA1

    75ac3347aae0a9dc3520ce0d31ca6ee2c7f4bbe5

  • SHA256

    4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20

  • SHA512

    abd6cac229ffac33e6ec887e41b041c4e02a5da1a054c474549657dfda326afbfd127c435f796d2945b0eb1d9586599936d0ddae339845dd43a91610c5baaa5b

  • SSDEEP

    12288:egY1Cj1eUAM2X3bV+rrmDl5/NJoBh3fVFycj3eI8HnR80p0C2jGJBHAfVDS3E6t1:elMednbV+rrmlzM6AOhujGJBKKE6t1

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • DCRat payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99209E1F30A833E0C7654FCC0AA2C9C5.exe
    "C:\Users\Admin\AppData\Local\Temp\99209E1F30A833E0C7654FCC0AA2C9C5.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:396
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Ta9uspLCYm.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4920
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:4180
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2432
        • C:\Program Files\Windows Mail\unsecapp.exe
          "C:\Program Files\Windows Mail\unsecapp.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:4788

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\RuntimeBroker.exe

      Filesize

      4.7MB

      MD5

      99209e1f30a833e0c7654fcc0aa2c9c5

      SHA1

      75ac3347aae0a9dc3520ce0d31ca6ee2c7f4bbe5

      SHA256

      4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20

      SHA512

      abd6cac229ffac33e6ec887e41b041c4e02a5da1a054c474549657dfda326afbfd127c435f796d2945b0eb1d9586599936d0ddae339845dd43a91610c5baaa5b

    • C:\Users\Admin\AppData\Local\Temp\Ta9uspLCYm.bat

      Filesize

      170B

      MD5

      4d9a7c992f083f80a982584ddcb6e88e

      SHA1

      0bf58d2149f3259a511dcf09be9650ef61090cfd

      SHA256

      84989164d7a48e40135d6389444da724f3d5922331bcbd8442332f62a21f265e

      SHA512

      6bce468bfccfa3fbee0c9834a30d0f5b74386983ef73465b7f9576f662b437afc10e55216d5d17de502f72a8866ffc07cbcf3049bfcd366c939916470260bbbd

    • memory/396-11-0x00007FFAF29E0000-0x00007FFAF34A1000-memory.dmp

      Filesize

      10.8MB

    • memory/396-18-0x00007FFAF29E0000-0x00007FFAF34A1000-memory.dmp

      Filesize

      10.8MB

    • memory/396-5-0x0000000001630000-0x000000000164C000-memory.dmp

      Filesize

      112KB

    • memory/396-6-0x0000000002ED0000-0x0000000002F20000-memory.dmp

      Filesize

      320KB

    • memory/396-8-0x0000000002E90000-0x0000000002EA8000-memory.dmp

      Filesize

      96KB

    • memory/396-13-0x0000000002E80000-0x0000000002E8C000-memory.dmp

      Filesize

      48KB

    • memory/396-10-0x0000000002E70000-0x0000000002E7E000-memory.dmp

      Filesize

      56KB

    • memory/396-15-0x0000000002F80000-0x0000000002F92000-memory.dmp

      Filesize

      72KB

    • memory/396-1-0x0000000000C90000-0x0000000000D64000-memory.dmp

      Filesize

      848KB

    • memory/396-16-0x00007FFAF29E0000-0x00007FFAF34A1000-memory.dmp

      Filesize

      10.8MB

    • memory/396-17-0x000000001C780000-0x000000001CCA8000-memory.dmp

      Filesize

      5.2MB

    • memory/396-4-0x0000000002E00000-0x0000000002E1C000-memory.dmp

      Filesize

      112KB

    • memory/396-27-0x00007FFAF29E0000-0x00007FFAF34A1000-memory.dmp

      Filesize

      10.8MB

    • memory/396-30-0x00007FFAF29E0000-0x00007FFAF34A1000-memory.dmp

      Filesize

      10.8MB

    • memory/396-2-0x00007FFAF29E0000-0x00007FFAF34A1000-memory.dmp

      Filesize

      10.8MB

    • memory/396-34-0x00007FFAF29E0000-0x00007FFAF34A1000-memory.dmp

      Filesize

      10.8MB

    • memory/396-35-0x00007FFAF29E0000-0x00007FFAF34A1000-memory.dmp

      Filesize

      10.8MB

    • memory/396-38-0x00007FFAF29E0000-0x00007FFAF34A1000-memory.dmp

      Filesize

      10.8MB

    • memory/396-0-0x00007FFAF29E3000-0x00007FFAF29E5000-memory.dmp

      Filesize

      8KB

    • memory/4788-43-0x00007FFAF2300000-0x00007FFAF2DC1000-memory.dmp

      Filesize

      10.8MB

    • memory/4788-49-0x00007FFAF2300000-0x00007FFAF2DC1000-memory.dmp

      Filesize

      10.8MB