Analysis

  • max time kernel
    118s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 02:14

General

  • Target

    4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe

  • Size

    4.7MB

  • MD5

    99209e1f30a833e0c7654fcc0aa2c9c5

  • SHA1

    75ac3347aae0a9dc3520ce0d31ca6ee2c7f4bbe5

  • SHA256

    4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20

  • SHA512

    abd6cac229ffac33e6ec887e41b041c4e02a5da1a054c474549657dfda326afbfd127c435f796d2945b0eb1d9586599936d0ddae339845dd43a91610c5baaa5b

  • SSDEEP

    12288:egY1Cj1eUAM2X3bV+rrmDl5/NJoBh3fVFycj3eI8HnR80p0C2jGJBHAfVDS3E6t1:elMednbV+rrmlzM6AOhujGJBKKE6t1

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • DCRat payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 7 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe
    "C:\Users\Admin\AppData\Local\Temp\4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3616
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mYYcTxZe9T.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:932
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2720
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          3⤵
            PID:5036
          • C:\Recovery\WindowsRE\Idle.exe
            "C:\Recovery\WindowsRE\Idle.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1124

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Recovery\WindowsRE\wininit.exe

        Filesize

        4.7MB

        MD5

        99209e1f30a833e0c7654fcc0aa2c9c5

        SHA1

        75ac3347aae0a9dc3520ce0d31ca6ee2c7f4bbe5

        SHA256

        4cb5fdd185102520c29c5975190f67567eeffaa42dc3692ee0cc9595b8a07e20

        SHA512

        abd6cac229ffac33e6ec887e41b041c4e02a5da1a054c474549657dfda326afbfd127c435f796d2945b0eb1d9586599936d0ddae339845dd43a91610c5baaa5b

      • C:\Users\Admin\AppData\Local\Temp\mYYcTxZe9T.bat

        Filesize

        206B

        MD5

        be7bc1f134760469047fb5fe8f8d7921

        SHA1

        500410226aaaf749d410b14e11a8caa83a9fa41d

        SHA256

        bdfaccf27a31fcd6d91db2cec94d4c7cfa5ed80bfc02ecd3c857215b6f156879

        SHA512

        61748be89da6fdc4d6b3a57f06b217659ff8ab66fd588b833b998f43935748a6691f3088e10acadd995ada525e3aa022e6f78d5921304cd153ab9f4183d4f864

      • memory/1124-46-0x00007FF8CF8E0000-0x00007FF8D03A1000-memory.dmp

        Filesize

        10.8MB

      • memory/1124-40-0x00007FF8CF8E0000-0x00007FF8D03A1000-memory.dmp

        Filesize

        10.8MB

      • memory/3616-15-0x00007FF8CFC10000-0x00007FF8D06D1000-memory.dmp

        Filesize

        10.8MB

      • memory/3616-17-0x00007FF8CFC10000-0x00007FF8D06D1000-memory.dmp

        Filesize

        10.8MB

      • memory/3616-8-0x000000001B1D0000-0x000000001B1E8000-memory.dmp

        Filesize

        96KB

      • memory/3616-10-0x00000000028B0000-0x00000000028BE000-memory.dmp

        Filesize

        56KB

      • memory/3616-12-0x000000001B1B0000-0x000000001B1BC000-memory.dmp

        Filesize

        48KB

      • memory/3616-14-0x000000001B2B0000-0x000000001B2C2000-memory.dmp

        Filesize

        72KB

      • memory/3616-0-0x00007FF8CFC13000-0x00007FF8CFC15000-memory.dmp

        Filesize

        8KB

      • memory/3616-6-0x000000001B200000-0x000000001B250000-memory.dmp

        Filesize

        320KB

      • memory/3616-16-0x000000001B8C0000-0x000000001BDE8000-memory.dmp

        Filesize

        5.2MB

      • memory/3616-28-0x00007FF8CFC10000-0x00007FF8D06D1000-memory.dmp

        Filesize

        10.8MB

      • memory/3616-5-0x0000000002890000-0x00000000028AC000-memory.dmp

        Filesize

        112KB

      • memory/3616-35-0x00007FF8CFC10000-0x00007FF8D06D1000-memory.dmp

        Filesize

        10.8MB

      • memory/3616-34-0x00007FF8CFC10000-0x00007FF8D06D1000-memory.dmp

        Filesize

        10.8MB

      • memory/3616-4-0x0000000002840000-0x000000000285C000-memory.dmp

        Filesize

        112KB

      • memory/3616-2-0x00007FF8CFC10000-0x00007FF8D06D1000-memory.dmp

        Filesize

        10.8MB

      • memory/3616-1-0x00000000005D0000-0x00000000006A4000-memory.dmp

        Filesize

        848KB