Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 10:06

General

  • Target

    B9C8DEE5E0470B21D27B1A70AFE25495.exe

  • Size

    25.5MB

  • MD5

    b9c8dee5e0470b21d27b1a70afe25495

  • SHA1

    955aebc905591be2c45fb95ac689374552455b58

  • SHA256

    04069d6dc8c9b79d04e96c9cd2950a374abe0c2604110c27227f60a851da123d

  • SHA512

    995ea49bdcba082927264e6dca3ac5d45ad8e152a3c9d71b9f63881e10537f866b5f45e1634af5bc1c44fb36fb0ec48b1a0ece866e1f58d14c2dcc46a0c88cf7

  • SSDEEP

    98304:vS4Lhcl+62txet6kccrV00zSO76bgkVB:vS4yA62txY1cc0XOubtVB

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\B9C8DEE5E0470B21D27B1A70AFE25495.exe
    "C:\Users\Admin\AppData\Local\Temp\B9C8DEE5E0470B21D27B1A70AFE25495.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3484
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lo7GkT925Y.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:3136
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:832
        • C:\Users\Admin\AppData\Local\Temp\B9C8DEE5E0470B21D27B1A70AFE25495.exe
          "C:\Users\Admin\AppData\Local\Temp\B9C8DEE5E0470B21D27B1A70AFE25495.exe"
          3⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:5112

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\sppsvc.exe

      Filesize

      25.5MB

      MD5

      b9c8dee5e0470b21d27b1a70afe25495

      SHA1

      955aebc905591be2c45fb95ac689374552455b58

      SHA256

      04069d6dc8c9b79d04e96c9cd2950a374abe0c2604110c27227f60a851da123d

      SHA512

      995ea49bdcba082927264e6dca3ac5d45ad8e152a3c9d71b9f63881e10537f866b5f45e1634af5bc1c44fb36fb0ec48b1a0ece866e1f58d14c2dcc46a0c88cf7

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\B9C8DEE5E0470B21D27B1A70AFE25495.exe.log

      Filesize

      1KB

      MD5

      54b2e6b7ff883363a93d869c42fe1a95

      SHA1

      de3238edb42bccc05885837e500049a6015e73db

      SHA256

      1adbc5b2c2a8cc156bc1d9b52e9383df523db7a4aa35117a670a99f49b895808

      SHA512

      51b3f94a8e760e641dda4ce55e7895cc35ef58427e24c32e821a1949345da72d82cc43f84b61bce087cce995728b3352d9f8aee6363bb3b23db5ca9402aa447c

    • C:\Users\Admin\AppData\Local\Temp\lo7GkT925Y.bat

      Filesize

      198B

      MD5

      d4f62e1becf6504365bbe355b7455619

      SHA1

      eb60882f289e6674764fbb8123570ca3bd7fdf6e

      SHA256

      902da162405fa784b7392891f31f16da5405154eaa07c01203762bb2af2f886a

      SHA512

      93a24bf3e5245306bc03fe4695010d77d8ca9fd23e65eeb2e25430acd15c3e387d8dade7adb28313be88effb3cbc5182f99c7c0901b5b16ca9b5495c8a499732

    • memory/3484-33-0x000000001B630000-0x000000001B642000-memory.dmp

      Filesize

      72KB

    • memory/3484-14-0x00007FFCFD080000-0x00007FFCFDB41000-memory.dmp

      Filesize

      10.8MB

    • memory/3484-6-0x0000000000C90000-0x0000000000C9E000-memory.dmp

      Filesize

      56KB

    • memory/3484-34-0x00007FFCFD080000-0x00007FFCFDB41000-memory.dmp

      Filesize

      10.8MB

    • memory/3484-9-0x000000001B530000-0x000000001B54C000-memory.dmp

      Filesize

      112KB

    • memory/3484-37-0x000000001B580000-0x000000001B58E000-memory.dmp

      Filesize

      56KB

    • memory/3484-10-0x00007FFCFD080000-0x00007FFCFDB41000-memory.dmp

      Filesize

      10.8MB

    • memory/3484-35-0x000000001BB80000-0x000000001C0A8000-memory.dmp

      Filesize

      5.2MB

    • memory/3484-13-0x0000000000CB0000-0x0000000000CC0000-memory.dmp

      Filesize

      64KB

    • memory/3484-15-0x00007FFCFD080000-0x00007FFCFDB41000-memory.dmp

      Filesize

      10.8MB

    • memory/3484-20-0x0000000002700000-0x0000000002710000-memory.dmp

      Filesize

      64KB

    • memory/3484-18-0x00007FFCFD080000-0x00007FFCFDB41000-memory.dmp

      Filesize

      10.8MB

    • memory/3484-17-0x000000001B550000-0x000000001B568000-memory.dmp

      Filesize

      96KB

    • memory/3484-23-0x00007FFCFD080000-0x00007FFCFDB41000-memory.dmp

      Filesize

      10.8MB

    • memory/3484-25-0x000000001B520000-0x000000001B52E000-memory.dmp

      Filesize

      56KB

    • memory/3484-27-0x000000001B5F0000-0x000000001B602000-memory.dmp

      Filesize

      72KB

    • memory/3484-22-0x000000001B510000-0x000000001B520000-memory.dmp

      Filesize

      64KB

    • memory/3484-29-0x000000001B570000-0x000000001B580000-memory.dmp

      Filesize

      64KB

    • memory/3484-31-0x000000001B610000-0x000000001B626000-memory.dmp

      Filesize

      88KB

    • memory/3484-0-0x00007FFCFD083000-0x00007FFCFD085000-memory.dmp

      Filesize

      8KB

    • memory/3484-7-0x00007FFCFD080000-0x00007FFCFDB41000-memory.dmp

      Filesize

      10.8MB

    • memory/3484-4-0x00007FFCFD080000-0x00007FFCFDB41000-memory.dmp

      Filesize

      10.8MB

    • memory/3484-11-0x000000001B5A0000-0x000000001B5F0000-memory.dmp

      Filesize

      320KB

    • memory/3484-39-0x000000001B590000-0x000000001B5A0000-memory.dmp

      Filesize

      64KB

    • memory/3484-40-0x00007FFCFD080000-0x00007FFCFDB41000-memory.dmp

      Filesize

      10.8MB

    • memory/3484-42-0x000000001B650000-0x000000001B660000-memory.dmp

      Filesize

      64KB

    • memory/3484-43-0x00007FFCFD080000-0x00007FFCFDB41000-memory.dmp

      Filesize

      10.8MB

    • memory/3484-45-0x000000001B6C0000-0x000000001B71A000-memory.dmp

      Filesize

      360KB

    • memory/3484-48-0x000000001B660000-0x000000001B66E000-memory.dmp

      Filesize

      56KB

    • memory/3484-46-0x00007FFCFD080000-0x00007FFCFDB41000-memory.dmp

      Filesize

      10.8MB

    • memory/3484-50-0x000000001B670000-0x000000001B680000-memory.dmp

      Filesize

      64KB

    • memory/3484-52-0x000000001B680000-0x000000001B68E000-memory.dmp

      Filesize

      56KB

    • memory/3484-54-0x000000001B920000-0x000000001B938000-memory.dmp

      Filesize

      96KB

    • memory/3484-56-0x000000001B690000-0x000000001B69C000-memory.dmp

      Filesize

      48KB

    • memory/3484-3-0x00007FFCFD080000-0x00007FFCFDB41000-memory.dmp

      Filesize

      10.8MB

    • memory/3484-73-0x000000001BA80000-0x000000001BB4D000-memory.dmp

      Filesize

      820KB

    • memory/3484-74-0x00007FFCFD080000-0x00007FFCFDB41000-memory.dmp

      Filesize

      10.8MB

    • memory/3484-2-0x00007FFCFD080000-0x00007FFCFDB41000-memory.dmp

      Filesize

      10.8MB

    • memory/3484-1-0x00000000001B0000-0x00000000004BA000-memory.dmp

      Filesize

      3.0MB

    • memory/5112-98-0x000000001BB80000-0x000000001BB88000-memory.dmp

      Filesize

      32KB

    • memory/5112-97-0x000000001BD20000-0x000000001BDED000-memory.dmp

      Filesize

      820KB