Analysis

  • max time kernel
    140s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 10:12

General

  • Target

    B9C8DEE5E0470B21D27B1A70AFE25495.exe

  • Size

    25.5MB

  • MD5

    b9c8dee5e0470b21d27b1a70afe25495

  • SHA1

    955aebc905591be2c45fb95ac689374552455b58

  • SHA256

    04069d6dc8c9b79d04e96c9cd2950a374abe0c2604110c27227f60a851da123d

  • SHA512

    995ea49bdcba082927264e6dca3ac5d45ad8e152a3c9d71b9f63881e10537f866b5f45e1634af5bc1c44fb36fb0ec48b1a0ece866e1f58d14c2dcc46a0c88cf7

  • SSDEEP

    98304:vS4Lhcl+62txet6kccrV00zSO76bgkVB:vS4yA62txY1cc0XOubtVB

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\B9C8DEE5E0470B21D27B1A70AFE25495.exe
    "C:\Users\Admin\AppData\Local\Temp\B9C8DEE5E0470B21D27B1A70AFE25495.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9vG5QjcNLp.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2428
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2776
        • C:\Users\Admin\AppData\Local\Temp\B9C8DEE5E0470B21D27B1A70AFE25495.exe
          "C:\Users\Admin\AppData\Local\Temp\B9C8DEE5E0470B21D27B1A70AFE25495.exe"
          3⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:2784

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Windows Mail\es-ES\wininit.exe

      Filesize

      25.5MB

      MD5

      b9c8dee5e0470b21d27b1a70afe25495

      SHA1

      955aebc905591be2c45fb95ac689374552455b58

      SHA256

      04069d6dc8c9b79d04e96c9cd2950a374abe0c2604110c27227f60a851da123d

      SHA512

      995ea49bdcba082927264e6dca3ac5d45ad8e152a3c9d71b9f63881e10537f866b5f45e1634af5bc1c44fb36fb0ec48b1a0ece866e1f58d14c2dcc46a0c88cf7

    • C:\Users\Admin\AppData\Local\Temp\9vG5QjcNLp.bat

      Filesize

      198B

      MD5

      d9ab54e83547fe3791889b2709808eae

      SHA1

      bd93a5e1f060348c694611e448af12fda51cdf3d

      SHA256

      d3957d7423c576cd0a8c431337d7b8908d806861ee7e612679c9f5f323a5aefd

      SHA512

      be964fcbc17730204c8c427dccafe4bf6dae49f455a0671957e1f865b5ebf1c0fd5559c49456289c1ed514d5a5bc854b1afda7901f541346edcfbc49ab283095

    • memory/1732-26-0x0000000000C50000-0x0000000000C66000-memory.dmp

      Filesize

      88KB

    • memory/1732-13-0x00000000001D0000-0x00000000001E8000-memory.dmp

      Filesize

      96KB

    • memory/1732-4-0x000007FEF4FD0000-0x000007FEF59BC000-memory.dmp

      Filesize

      9.9MB

    • memory/1732-29-0x0000000000C70000-0x0000000000C82000-memory.dmp

      Filesize

      72KB

    • memory/1732-8-0x0000000000190000-0x00000000001AC000-memory.dmp

      Filesize

      112KB

    • memory/1732-10-0x00000000001C0000-0x00000000001D0000-memory.dmp

      Filesize

      64KB

    • memory/1732-11-0x000007FEF4FD0000-0x000007FEF59BC000-memory.dmp

      Filesize

      9.9MB

    • memory/1732-31-0x00000000005C0000-0x00000000005CE000-memory.dmp

      Filesize

      56KB

    • memory/1732-15-0x00000000003F0000-0x0000000000400000-memory.dmp

      Filesize

      64KB

    • memory/1732-17-0x0000000000410000-0x0000000000420000-memory.dmp

      Filesize

      64KB

    • memory/1732-18-0x000007FEF4FD0000-0x000007FEF59BC000-memory.dmp

      Filesize

      9.9MB

    • memory/1732-20-0x0000000000420000-0x000000000042E000-memory.dmp

      Filesize

      56KB

    • memory/1732-22-0x0000000000650000-0x0000000000662000-memory.dmp

      Filesize

      72KB

    • memory/1732-33-0x0000000000670000-0x0000000000680000-memory.dmp

      Filesize

      64KB

    • memory/1732-0-0x000007FEF4FD3000-0x000007FEF4FD4000-memory.dmp

      Filesize

      4KB

    • memory/1732-27-0x000007FEF4FD0000-0x000007FEF59BC000-memory.dmp

      Filesize

      9.9MB

    • memory/1732-6-0x0000000000180000-0x000000000018E000-memory.dmp

      Filesize

      56KB

    • memory/1732-3-0x000007FEF4FD0000-0x000007FEF59BC000-memory.dmp

      Filesize

      9.9MB

    • memory/1732-24-0x00000000005B0000-0x00000000005C0000-memory.dmp

      Filesize

      64KB

    • memory/1732-34-0x000007FEF4FD0000-0x000007FEF59BC000-memory.dmp

      Filesize

      9.9MB

    • memory/1732-36-0x0000000000680000-0x0000000000690000-memory.dmp

      Filesize

      64KB

    • memory/1732-38-0x000000001B2D0000-0x000000001B32A000-memory.dmp

      Filesize

      360KB

    • memory/1732-40-0x0000000000690000-0x000000000069E000-memory.dmp

      Filesize

      56KB

    • memory/1732-42-0x0000000000C90000-0x0000000000CA0000-memory.dmp

      Filesize

      64KB

    • memory/1732-44-0x00000000023B0000-0x00000000023BE000-memory.dmp

      Filesize

      56KB

    • memory/1732-46-0x00000000024E0000-0x00000000024F8000-memory.dmp

      Filesize

      96KB

    • memory/1732-47-0x000007FEF4FD0000-0x000007FEF59BC000-memory.dmp

      Filesize

      9.9MB

    • memory/1732-49-0x00000000024C0000-0x00000000024CC000-memory.dmp

      Filesize

      48KB

    • memory/1732-54-0x000007FEF4FD0000-0x000007FEF59BC000-memory.dmp

      Filesize

      9.9MB

    • memory/1732-2-0x000007FEF4FD0000-0x000007FEF59BC000-memory.dmp

      Filesize

      9.9MB

    • memory/1732-62-0x000007FEF4FD0000-0x000007FEF59BC000-memory.dmp

      Filesize

      9.9MB

    • memory/1732-67-0x000007FEF4FD0000-0x000007FEF59BC000-memory.dmp

      Filesize

      9.9MB

    • memory/1732-1-0x0000000000CA0000-0x0000000000FAA000-memory.dmp

      Filesize

      3.0MB