Analysis

  • max time kernel
    61s
  • max time network
    64s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-01-2025 04:35

General

  • Target

    Nursultan Alpha.exe

  • Size

    3.8MB

  • MD5

    eb9f6fb7804c8c8dbd3ebb1d355fa173

  • SHA1

    1a37eaa4e337486684f104578fd6bda83bbecd90

  • SHA256

    8a67da8e48b02c1e2b697629fe80e2de89a8eabee46778b3d1c461a14848142d

  • SHA512

    e94a0664474caa4b9a964b6cb83b9623ae2fe628b61ead3c90364e4168969884da4dd93340c96b48e49237a5b3748d4c881bcce7e299367e6a8f66408c8dded4

  • SSDEEP

    98304:yX1GibnDr0kTmDBN68MiXWF21fGotJfqf+5Ybux:y1GibnkkTW68MATfGVf+5o4

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Nursultan Alpha.exe
    "C:\Users\Admin\AppData\Local\Temp\Nursultan Alpha.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3576
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\c\j0rb9X1I2m1oleoOgwnJO7znjk9sCQMFXvhfZcscNZxn61N13golWBWN.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:428
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\c\RWyyAE.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2308
        • C:\c\shvhost.exe
          "C:\/c/shvhost.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4428
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\MrfUPDYpIx.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4148
            • C:\Windows\system32\chcp.com
              chcp 65001
              6⤵
                PID:4276
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                6⤵
                  PID:4920
                • C:\c\shvhost.exe
                  "C:\c\shvhost.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:216

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\shvhost.exe.log

        Filesize

        1KB

        MD5

        89cb79e1d42f837d7920fbf17b8403e0

        SHA1

        ae1ef657b25a868f74bf150900af98baeb25ed4c

        SHA256

        6a62db318eea0009f0b53380a597ddffdb8203f242515b7b44900d19a8ca9c1f

        SHA512

        91fd649034b5a2c678eb412f1a7a2a88f9e065e8f6d3451376f986bc5d6aa96190fd5b94c968fcd1ddd975f289fc692423aa02a0b14cb53ecbb73b8923bb9502

      • C:\Users\Admin\AppData\Local\Temp\MrfUPDYpIx.bat

        Filesize

        192B

        MD5

        0233ec8f3300bbc9d08ec59b1077ae4c

        SHA1

        630ae8854f908b456da460193675175a2992b1b1

        SHA256

        16cda85dc09af9ecb8710f227e8f7b3abc312ab9ad7512a5c7140be21f4a88b8

        SHA512

        ea7591b3c55395ae51c339b8a4e55af578b1c49a0a7d2efc9a360c1f609f69e66a097f5b1a872a4dc170c1c1f84f309d58ffc733c0187f31a64e4b9085638457

      • C:\c\RWyyAE.bat

        Filesize

        80B

        MD5

        eb42e2ec27edbdf9cce20783e0c2f979

        SHA1

        a36d55a0a0920852f7f583172a2dc16e3efbf1ff

        SHA256

        8e77d1eba5650474ed6c0b5aa86baaeac4b1adca852dc89db67f36886b108108

        SHA512

        73e61da6a2090b9100a5f335d76308e33844c28ce930d538c01692022666edbfa0538e715e3ff6644e35ec7f45d35fe957653c7e828d50c9ef1ff390ee3b4cf7

      • C:\c\j0rb9X1I2m1oleoOgwnJO7znjk9sCQMFXvhfZcscNZxn61N13golWBWN.vbe

        Filesize

        198B

        MD5

        b3d9fbae9b41bbf170e950d813bb8db1

        SHA1

        534551e402cdd865417c42ab591d1806aec9e73f

        SHA256

        c3c2429bd95c15775a3a3d611a5e9eb9276d6223395fbefe47978d4250afa019

        SHA512

        169fec8b816e8a01ce09eeb7939631d88ab4e7953f2beb06087c9bcc157984f4fd20b0de3702054fb832fd1d4dfe82b7fee112da1b94247c1cddbeb73a97f43f

      • C:\c\shvhost.exe

        Filesize

        3.5MB

        MD5

        31e600a210957ad4eb0937897528c65c

        SHA1

        15a576fe4341a9dabedae06e6677cc3006eec306

        SHA256

        b19bf50129f50187e68591c6623aaaeef088fbda19d5e684b867e68e7bf5dfc3

        SHA512

        682f9797a6aecb1171d10dc02f87f6d300c2948d6a519dbcc9f262ec1fef91d8ae2175cb108a871cf59edb34abe403f75600405332a4b47bc18c266c1ac3abf7

      • memory/4428-32-0x000000001C760000-0x000000001C772000-memory.dmp

        Filesize

        72KB

      • memory/4428-40-0x000000001C780000-0x000000001C790000-memory.dmp

        Filesize

        64KB

      • memory/4428-19-0x000000001B330000-0x000000001B34C000-memory.dmp

        Filesize

        112KB

      • memory/4428-20-0x000000001C790000-0x000000001C7E0000-memory.dmp

        Filesize

        320KB

      • memory/4428-22-0x000000001B180000-0x000000001B190000-memory.dmp

        Filesize

        64KB

      • memory/4428-24-0x000000001B350000-0x000000001B368000-memory.dmp

        Filesize

        96KB

      • memory/4428-26-0x000000001B190000-0x000000001B1A0000-memory.dmp

        Filesize

        64KB

      • memory/4428-28-0x000000001B1A0000-0x000000001B1B0000-memory.dmp

        Filesize

        64KB

      • memory/4428-30-0x000000001B370000-0x000000001B37E000-memory.dmp

        Filesize

        56KB

      • memory/4428-15-0x000000001B300000-0x000000001B326000-memory.dmp

        Filesize

        152KB

      • memory/4428-34-0x000000001C740000-0x000000001C750000-memory.dmp

        Filesize

        64KB

      • memory/4428-36-0x000000001C800000-0x000000001C816000-memory.dmp

        Filesize

        88KB

      • memory/4428-38-0x000000001C750000-0x000000001C75E000-memory.dmp

        Filesize

        56KB

      • memory/4428-17-0x000000001B170000-0x000000001B17E000-memory.dmp

        Filesize

        56KB

      • memory/4428-42-0x000000001C7E0000-0x000000001C7F0000-memory.dmp

        Filesize

        64KB

      • memory/4428-44-0x000000001C880000-0x000000001C8DA000-memory.dmp

        Filesize

        360KB

      • memory/4428-46-0x000000001C7F0000-0x000000001C7FE000-memory.dmp

        Filesize

        56KB

      • memory/4428-48-0x000000001C820000-0x000000001C830000-memory.dmp

        Filesize

        64KB

      • memory/4428-50-0x000000001C830000-0x000000001C83E000-memory.dmp

        Filesize

        56KB

      • memory/4428-52-0x000000001C840000-0x000000001C848000-memory.dmp

        Filesize

        32KB

      • memory/4428-54-0x000000001C8E0000-0x000000001C8F8000-memory.dmp

        Filesize

        96KB

      • memory/4428-56-0x000000001C850000-0x000000001C85C000-memory.dmp

        Filesize

        48KB

      • memory/4428-58-0x000000001C950000-0x000000001C99E000-memory.dmp

        Filesize

        312KB

      • memory/4428-13-0x0000000000240000-0x00000000005C0000-memory.dmp

        Filesize

        3.5MB

      • memory/4428-12-0x00007FFFA51D3000-0x00007FFFA51D5000-memory.dmp

        Filesize

        8KB