Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 02:03
Static task
static1
Behavioral task
behavioral1
Sample
0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe
Resource
win7-20240903-en
General
-
Target
0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe
-
Size
1.9MB
-
MD5
f022320106ebe6ef239cb75c93f6b3ad
-
SHA1
b183fb4f66d5327889a0440eca1a61a69ae9cc00
-
SHA256
0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1
-
SHA512
e77d922f9bcc6e9f383d955623c532942f5d6fbc8f41f29d284a165abdb4d6a77ac76cbc1826dabf8bd14fbaa4257258e866c4330d30cf05f17e9b4313dd5f23
-
SSDEEP
24576:0bTfyVA9AatfC65K16JPuO+Q3Qvi4m4B2g83KWlumjyICs7reNJCN5a4VznpQiCx:avpAwPDpa9mw2nKWljVeNJCyyVqVa
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe -
Executes dropped EXE 1 IoCs
pid Process 3864 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Help\OEM\backgroundTaskHost.exe 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe File created C:\Windows\Help\OEM\eddb19405b7ce1 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe File created C:\Windows\servicing\Editions\0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe File created C:\Windows\servicing\Editions\a6cfe2e3058395 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe Token: SeDebugPrivilege 3864 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1616 wrote to memory of 944 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 83 PID 1616 wrote to memory of 944 1616 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 83 PID 944 wrote to memory of 4252 944 cmd.exe 85 PID 944 wrote to memory of 4252 944 cmd.exe 85 PID 944 wrote to memory of 1552 944 cmd.exe 86 PID 944 wrote to memory of 1552 944 cmd.exe 86 PID 944 wrote to memory of 3864 944 cmd.exe 88 PID 944 wrote to memory of 3864 944 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe"C:\Users\Admin\AppData\Local\Temp\0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YV3YpMvuXr.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:4252
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1552
-
-
C:\Windows\servicing\Editions\0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe"C:\Windows\servicing\Editions\0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5f022320106ebe6ef239cb75c93f6b3ad
SHA1b183fb4f66d5327889a0440eca1a61a69ae9cc00
SHA2560b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1
SHA512e77d922f9bcc6e9f383d955623c532942f5d6fbc8f41f29d284a165abdb4d6a77ac76cbc1826dabf8bd14fbaa4257258e866c4330d30cf05f17e9b4313dd5f23
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe.log
Filesize1KB
MD51eff74e45bb1f7104e691358cb209546
SHA1253b13ffad516cc34704f5b882c6fa36953a953f
SHA2567ad96be486e6058b19446b95bb734acdaf4addc557b2d059a66ee1acfe19b3fc
SHA51244163ed001baf697ce66d3b386e13bf5cb94bc24ce6b1ae98665d766d5fcdf0ca28b41ecc26c5f11bbea117ac17099e87f204f9d5469bb102a769548edeead7e
-
Filesize
274B
MD56cc8e1eaadafd408504053eb3eadfa61
SHA1ce034432502769f3d4a281947891a58386be7d36
SHA2569855f25aa2781b14858d8846ea25d6682ec6d17ef23a5d3ac4ed0684736420dc
SHA512f260296f03f00b616cd4e6b387b86579957d9a43332c621ed29fb3fdfc68382d440f0463c8eb2c7cd5abbe21252a6935d984519f140182a8b8ab074fd8d2b846