Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
B9C8DEE5E0470B21D27B1A70AFE25495.exe
Resource
win7-20240903-en
General
-
Target
B9C8DEE5E0470B21D27B1A70AFE25495.exe
-
Size
25.5MB
-
MD5
b9c8dee5e0470b21d27b1a70afe25495
-
SHA1
955aebc905591be2c45fb95ac689374552455b58
-
SHA256
04069d6dc8c9b79d04e96c9cd2950a374abe0c2604110c27227f60a851da123d
-
SHA512
995ea49bdcba082927264e6dca3ac5d45ad8e152a3c9d71b9f63881e10537f866b5f45e1634af5bc1c44fb36fb0ec48b1a0ece866e1f58d14c2dcc46a0c88cf7
-
SSDEEP
98304:vS4Lhcl+62txet6kccrV00zSO76bgkVB:vS4yA62txY1cc0XOubtVB
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation B9C8DEE5E0470B21D27B1A70AFE25495.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\sppsvc.exe B9C8DEE5E0470B21D27B1A70AFE25495.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\0a1fd5f707cd16 B9C8DEE5E0470B21D27B1A70AFE25495.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Cursors\StartMenuExperienceHost.exe B9C8DEE5E0470B21D27B1A70AFE25495.exe File created C:\Windows\Cursors\55b276f4edf653 B9C8DEE5E0470B21D27B1A70AFE25495.exe File created C:\Windows\Containers\serviced\dllhost.exe B9C8DEE5E0470B21D27B1A70AFE25495.exe File created C:\Windows\Containers\serviced\5940a34987c991 B9C8DEE5E0470B21D27B1A70AFE25495.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 832 PING.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings B9C8DEE5E0470B21D27B1A70AFE25495.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 832 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5112 B9C8DEE5E0470B21D27B1A70AFE25495.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe Token: SeDebugPrivilege 5112 B9C8DEE5E0470B21D27B1A70AFE25495.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3484 wrote to memory of 2996 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 82 PID 3484 wrote to memory of 2996 3484 B9C8DEE5E0470B21D27B1A70AFE25495.exe 82 PID 2996 wrote to memory of 3136 2996 cmd.exe 84 PID 2996 wrote to memory of 3136 2996 cmd.exe 84 PID 2996 wrote to memory of 832 2996 cmd.exe 85 PID 2996 wrote to memory of 832 2996 cmd.exe 85 PID 2996 wrote to memory of 5112 2996 cmd.exe 86 PID 2996 wrote to memory of 5112 2996 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\B9C8DEE5E0470B21D27B1A70AFE25495.exe"C:\Users\Admin\AppData\Local\Temp\B9C8DEE5E0470B21D27B1A70AFE25495.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lo7GkT925Y.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:3136
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:832
-
-
C:\Users\Admin\AppData\Local\Temp\B9C8DEE5E0470B21D27B1A70AFE25495.exe"C:\Users\Admin\AppData\Local\Temp\B9C8DEE5E0470B21D27B1A70AFE25495.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25.5MB
MD5b9c8dee5e0470b21d27b1a70afe25495
SHA1955aebc905591be2c45fb95ac689374552455b58
SHA25604069d6dc8c9b79d04e96c9cd2950a374abe0c2604110c27227f60a851da123d
SHA512995ea49bdcba082927264e6dca3ac5d45ad8e152a3c9d71b9f63881e10537f866b5f45e1634af5bc1c44fb36fb0ec48b1a0ece866e1f58d14c2dcc46a0c88cf7
-
Filesize
1KB
MD554b2e6b7ff883363a93d869c42fe1a95
SHA1de3238edb42bccc05885837e500049a6015e73db
SHA2561adbc5b2c2a8cc156bc1d9b52e9383df523db7a4aa35117a670a99f49b895808
SHA51251b3f94a8e760e641dda4ce55e7895cc35ef58427e24c32e821a1949345da72d82cc43f84b61bce087cce995728b3352d9f8aee6363bb3b23db5ca9402aa447c
-
Filesize
198B
MD5d4f62e1becf6504365bbe355b7455619
SHA1eb60882f289e6674764fbb8123570ca3bd7fdf6e
SHA256902da162405fa784b7392891f31f16da5405154eaa07c01203762bb2af2f886a
SHA51293a24bf3e5245306bc03fe4695010d77d8ca9fd23e65eeb2e25430acd15c3e387d8dade7adb28313be88effb3cbc5182f99c7c0901b5b16ca9b5495c8a499732