Analysis
-
max time kernel
120s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 02:14
Behavioral task
behavioral1
Sample
4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe
Resource
win7-20240903-en
General
-
Target
4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe
-
Size
4.7MB
-
MD5
99209e1f30a833e0c7654fcc0aa2c9c5
-
SHA1
75ac3347aae0a9dc3520ce0d31ca6ee2c7f4bbe5
-
SHA256
4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20
-
SHA512
abd6cac229ffac33e6ec887e41b041c4e02a5da1a054c474549657dfda326afbfd127c435f796d2945b0eb1d9586599936d0ddae339845dd43a91610c5baaa5b
-
SSDEEP
12288:egY1Cj1eUAM2X3bV+rrmDl5/NJoBh3fVFycj3eI8HnR80p0C2jGJBHAfVDS3E6t1:elMednbV+rrmlzM6AOhujGJBKKE6t1
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 3 IoCs
resource yara_rule behavioral1/memory/2508-1-0x00000000013E0000-0x00000000014B4000-memory.dmp family_dcrat_v2 behavioral1/files/0x0008000000016d29-24.dat family_dcrat_v2 behavioral1/memory/2848-37-0x0000000000A20000-0x0000000000AF4000-memory.dmp family_dcrat_v2 -
Executes dropped EXE 1 IoCs
pid Process 2848 Idle.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\ja-JP\Idle.exe 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe File created C:\Program Files\Internet Explorer\ja-JP\6ccacd8608530f 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\L2Schemas\Idle.exe 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe File opened for modification C:\Windows\L2Schemas\Idle.exe 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe File created C:\Windows\L2Schemas\6ccacd8608530f 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\ehRecObj\6e35ba22c9762646d5294dd919175c69\WmiPrvSE.exe 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\ehRecObj\6e35ba22c9762646d5294dd919175c69\24dbde2999530e 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2860 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2860 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe Token: SeDebugPrivilege 2848 Idle.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2848 Idle.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2508 wrote to memory of 1852 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 30 PID 2508 wrote to memory of 1852 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 30 PID 2508 wrote to memory of 1852 2508 4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe 30 PID 1852 wrote to memory of 2880 1852 cmd.exe 32 PID 1852 wrote to memory of 2880 1852 cmd.exe 32 PID 1852 wrote to memory of 2880 1852 cmd.exe 32 PID 1852 wrote to memory of 2860 1852 cmd.exe 33 PID 1852 wrote to memory of 2860 1852 cmd.exe 33 PID 1852 wrote to memory of 2860 1852 cmd.exe 33 PID 1852 wrote to memory of 2848 1852 cmd.exe 34 PID 1852 wrote to memory of 2848 1852 cmd.exe 34 PID 1852 wrote to memory of 2848 1852 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe"C:\Users\Admin\AppData\Local\Temp\4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\G0q4qmSC6M.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2880
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2860
-
-
C:\Windows\L2Schemas\Idle.exe"C:\Windows\L2Schemas\Idle.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2848
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157B
MD52945768874c3610570676cfc840a0ce2
SHA1c79978937f171f566b7bc71f5f43924ecefea5a0
SHA25648d4f659b487f1e25fb5965b86054313a7f286b554f6609d7c434968542acd6b
SHA5121bf42a15bcfbb3ce77eaa0db5a3cd4344d759959690ccc55a85b7642df2216c30956aaf0872e5d1a07b7b11abd026766c2a94e8c2dd3675720cc584015e76d07
-
Filesize
4.7MB
MD599209e1f30a833e0c7654fcc0aa2c9c5
SHA175ac3347aae0a9dc3520ce0d31ca6ee2c7f4bbe5
SHA2564cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20
SHA512abd6cac229ffac33e6ec887e41b041c4e02a5da1a054c474549657dfda326afbfd127c435f796d2945b0eb1d9586599936d0ddae339845dd43a91610c5baaa5b