Analysis
-
max time kernel
118s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 02:11
Static task
static1
Behavioral task
behavioral1
Sample
0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe
Resource
win7-20240903-en
General
-
Target
0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe
-
Size
1.9MB
-
MD5
f022320106ebe6ef239cb75c93f6b3ad
-
SHA1
b183fb4f66d5327889a0440eca1a61a69ae9cc00
-
SHA256
0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1
-
SHA512
e77d922f9bcc6e9f383d955623c532942f5d6fbc8f41f29d284a165abdb4d6a77ac76cbc1826dabf8bd14fbaa4257258e866c4330d30cf05f17e9b4313dd5f23
-
SSDEEP
24576:0bTfyVA9AatfC65K16JPuO+Q3Qvi4m4B2g83KWlumjyICs7reNJCN5a4VznpQiCx:avpAwPDpa9mw2nKWljVeNJCyyVqVa
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Executes dropped EXE 1 IoCs
pid Process 2680 sppsvc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2796 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2796 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2680 sppsvc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe Token: SeDebugPrivilege 2680 sppsvc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1836 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 30 PID 2076 wrote to memory of 1836 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 30 PID 2076 wrote to memory of 1836 2076 0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe 30 PID 1836 wrote to memory of 2792 1836 cmd.exe 32 PID 1836 wrote to memory of 2792 1836 cmd.exe 32 PID 1836 wrote to memory of 2792 1836 cmd.exe 32 PID 1836 wrote to memory of 2796 1836 cmd.exe 33 PID 1836 wrote to memory of 2796 1836 cmd.exe 33 PID 1836 wrote to memory of 2796 1836 cmd.exe 33 PID 1836 wrote to memory of 2680 1836 cmd.exe 35 PID 1836 wrote to memory of 2680 1836 cmd.exe 35 PID 1836 wrote to memory of 2680 1836 cmd.exe 35 PID 1836 wrote to memory of 2680 1836 cmd.exe 35 PID 1836 wrote to memory of 2680 1836 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe"C:\Users\Admin\AppData\Local\Temp\0b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0jOreHat5V.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2792
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2796
-
-
C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\sppsvc.exe"C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\sppsvc.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5f022320106ebe6ef239cb75c93f6b3ad
SHA1b183fb4f66d5327889a0440eca1a61a69ae9cc00
SHA2560b5266ad1c75b3a3d186a050f140ee2d11b076440320989bda85197d3716a3a1
SHA512e77d922f9bcc6e9f383d955623c532942f5d6fbc8f41f29d284a165abdb4d6a77ac76cbc1826dabf8bd14fbaa4257258e866c4330d30cf05f17e9b4313dd5f23
-
Filesize
187B
MD5ecc235b93da0e26d0a04ce3ea4edff63
SHA106f342a153a9244fe84e71221577ea97a23e3460
SHA256b99aa8cf0bf377ac9342a405d9338534829e89b7b3a4df8ee785af5765656ac4
SHA5128f3ae04e4474e70954674807ddd1ad0714ffb61ee66d1d1780309cce04cc816d6eea564cb113261e848c9e4686031dec8b0fc3488a900bfceb0b9c02d682492e