Analysis
-
max time kernel
117s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 06:31
Behavioral task
behavioral1
Sample
eb70291aebfca69fae386dfcdc209c8f9b36e135e882088c890c46308fa6df69N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb70291aebfca69fae386dfcdc209c8f9b36e135e882088c890c46308fa6df69N.exe
Resource
win10v2004-20241007-en
General
-
Target
eb70291aebfca69fae386dfcdc209c8f9b36e135e882088c890c46308fa6df69N.exe
-
Size
2.7MB
-
MD5
9ce973d39537cd129e27ab0ed843c920
-
SHA1
a0fce68a43511da1cbd63600b8e824cf684d9617
-
SHA256
eb70291aebfca69fae386dfcdc209c8f9b36e135e882088c890c46308fa6df69
-
SHA512
20dbb88bc9d5862ede036633a8e3937f47e49321872f78706d1b5881071167ab75c08da10c9a8e03a5d747f233ff97c2b0cb8e572297c309cc1497658030f404
-
SSDEEP
24576:2TbBv5rUyXVnI++nluNY4Cw7sULqPyZwSxIshnWIjm7vZAjX+ez87TkQPI1Q7SGS:IBJI++n8NY+lwSx9WkiLekTk1JMrs
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 2 IoCs
resource yara_rule behavioral2/files/0x000c000000023b71-10.dat family_dcrat_v2 behavioral2/memory/1952-13-0x00000000009B0000-0x0000000000C1E000-memory.dmp family_dcrat_v2 -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation bridgechainsurrogateserverBrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WmiPrvSE.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WmiPrvSE.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation eb70291aebfca69fae386dfcdc209c8f9b36e135e882088c890c46308fa6df69N.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 4 IoCs
pid Process 1952 bridgechainsurrogateserverBrowser.exe 3816 WmiPrvSE.exe 4124 WmiPrvSE.exe 5104 WmiPrvSE.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\29c1c3cc0f7685 bridgechainsurrogateserverBrowser.exe File created C:\Program Files\Windows Mail\WmiPrvSE.exe bridgechainsurrogateserverBrowser.exe File created C:\Program Files\Windows Mail\24dbde2999530e bridgechainsurrogateserverBrowser.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\fontdrvhost.exe bridgechainsurrogateserverBrowser.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\5b884080fd4f94 bridgechainsurrogateserverBrowser.exe File created C:\Program Files (x86)\Internet Explorer\unsecapp.exe bridgechainsurrogateserverBrowser.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\CSC\TrustedInstaller.exe bridgechainsurrogateserverBrowser.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb70291aebfca69fae386dfcdc209c8f9b36e135e882088c890c46308fa6df69N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 704 PING.EXE -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings eb70291aebfca69fae386dfcdc209c8f9b36e135e882088c890c46308fa6df69N.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings bridgechainsurrogateserverBrowser.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WmiPrvSE.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WmiPrvSE.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 704 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe 1952 bridgechainsurrogateserverBrowser.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1952 bridgechainsurrogateserverBrowser.exe Token: SeDebugPrivilege 3816 WmiPrvSE.exe Token: SeDebugPrivilege 4124 WmiPrvSE.exe Token: SeDebugPrivilege 5104 WmiPrvSE.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4488 wrote to memory of 1920 4488 eb70291aebfca69fae386dfcdc209c8f9b36e135e882088c890c46308fa6df69N.exe 82 PID 4488 wrote to memory of 1920 4488 eb70291aebfca69fae386dfcdc209c8f9b36e135e882088c890c46308fa6df69N.exe 82 PID 4488 wrote to memory of 1920 4488 eb70291aebfca69fae386dfcdc209c8f9b36e135e882088c890c46308fa6df69N.exe 82 PID 1920 wrote to memory of 3276 1920 WScript.exe 90 PID 1920 wrote to memory of 3276 1920 WScript.exe 90 PID 1920 wrote to memory of 3276 1920 WScript.exe 90 PID 3276 wrote to memory of 1952 3276 cmd.exe 92 PID 3276 wrote to memory of 1952 3276 cmd.exe 92 PID 1952 wrote to memory of 1444 1952 bridgechainsurrogateserverBrowser.exe 94 PID 1952 wrote to memory of 1444 1952 bridgechainsurrogateserverBrowser.exe 94 PID 1444 wrote to memory of 1424 1444 cmd.exe 96 PID 1444 wrote to memory of 1424 1444 cmd.exe 96 PID 1444 wrote to memory of 704 1444 cmd.exe 97 PID 1444 wrote to memory of 704 1444 cmd.exe 97 PID 1444 wrote to memory of 3816 1444 cmd.exe 99 PID 1444 wrote to memory of 3816 1444 cmd.exe 99 PID 3816 wrote to memory of 4196 3816 WmiPrvSE.exe 100 PID 3816 wrote to memory of 4196 3816 WmiPrvSE.exe 100 PID 4196 wrote to memory of 756 4196 cmd.exe 102 PID 4196 wrote to memory of 756 4196 cmd.exe 102 PID 4196 wrote to memory of 4660 4196 cmd.exe 103 PID 4196 wrote to memory of 4660 4196 cmd.exe 103 PID 4196 wrote to memory of 4124 4196 cmd.exe 104 PID 4196 wrote to memory of 4124 4196 cmd.exe 104 PID 4124 wrote to memory of 2692 4124 WmiPrvSE.exe 105 PID 4124 wrote to memory of 2692 4124 WmiPrvSE.exe 105 PID 2692 wrote to memory of 4300 2692 cmd.exe 107 PID 2692 wrote to memory of 4300 2692 cmd.exe 107 PID 2692 wrote to memory of 4208 2692 cmd.exe 108 PID 2692 wrote to memory of 4208 2692 cmd.exe 108 PID 2692 wrote to memory of 5104 2692 cmd.exe 109 PID 2692 wrote to memory of 5104 2692 cmd.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb70291aebfca69fae386dfcdc209c8f9b36e135e882088c890c46308fa6df69N.exe"C:\Users\Admin\AppData\Local\Temp\eb70291aebfca69fae386dfcdc209c8f9b36e135e882088c890c46308fa6df69N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Blockmonitor\HeUwcB4baJ09hxtgLFYnrYRurWpCBdRotBlDKLgEXR4j0GQXLf0GLW.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Blockmonitor\i2PbrgOOwQRRChofjSNVXl67BG60nzl0wUfDSUyfdly0UjRL.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Blockmonitor\bridgechainsurrogateserverBrowser.exe"C:\Blockmonitor/bridgechainsurrogateserverBrowser.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\X6aBNgxfma.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:1424
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:704
-
-
C:\Program Files\Windows Mail\WmiPrvSE.exe"C:\Program Files\Windows Mail\WmiPrvSE.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0H3zCkvC0l.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:756
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:4660
-
-
C:\Program Files\Windows Mail\WmiPrvSE.exe"C:\Program Files\Windows Mail\WmiPrvSE.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4len57naH7.bat"9⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\system32\chcp.comchcp 6500110⤵PID:4300
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:4208
-
-
C:\Program Files\Windows Mail\WmiPrvSE.exe"C:\Program Files\Windows Mail\WmiPrvSE.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239B
MD53e63707e4d8b55019daddbf38b91a5aa
SHA18079c688efbac523116d6466faf7364a7a3eeeeb
SHA256707f7fdea6e382b7df65eb229634645d2bf48b37485381e78061e117c85d1d21
SHA512b0004124ed88fe3a13247787bfbd82a9b8b545902d2c36c688270a357e7cae0259d2fcff028fc04b4270c1ef6e85b65cffc903ccb8d90173b13d92188dbcade7
-
Filesize
2.4MB
MD590ec39d1b525bd236ffbe02fac42f53d
SHA10c7d6ec16d26546a13ba98daef26c20eaee9e35f
SHA256df2bc338a5f3ade391666a46efa5bc59d0bf88fe224bb7c9a79f934a155cad10
SHA512e9acf468d7782cfbc4334aa4689cbb7d5aedadb2c3f06ae2e3d6a49c7691a53761d4fd1e1348299dad60b105c63f2c8a122336c12067f411f19768cfd2f97374
-
Filesize
104B
MD5267273f89b4dfe0e94294134e8cdd20e
SHA1530eba1aacce08a71715c0c5ebf1e7312fbf9274
SHA256d2aea7c169666ee3c82d1c366030c1a2264142941f0693ba3a79acaca46b48f9
SHA512da167fab4faf015416b42ddc45de43e3779dca6523f96624df2ce6e5073024e5365c33dbf641da25219ba9957a328e1a8f742453b3ce6af790d642d440a0d5d5
-
Filesize
1KB
MD5bbb951a34b516b66451218a3ec3b0ae1
SHA17393835a2476ae655916e0a9687eeaba3ee876e9
SHA256eb70c64ae99d14ac2588b7a84854fbf3c420532d7fe4dfd49c7b5a70c869943a
SHA51263bcbfcf8e7421c66855c487c31b2991a989bdea0c1edd4c40066b52fa3eb3d9d37db1cd21b8eb4f33dd5870cc20532c8f485eab9c0b4f6b0793a35c077f2d6f
-
Filesize
218B
MD5a9511851c31887defc471103577c9001
SHA1ee828916f203a0f88680473fbb32cb91056178be
SHA256a50b09079eee68f2138a6530056643f77c2aa91bcbe0c3db75764656939098e5
SHA51246e9785d7ed7c5212d41bf24f23cf538a7ab182f461ef11e028198bdf02c1c94692ccbfa4eb39bd8793915a3f378a45a871c5747360f5bacb9675f756a7a7633
-
Filesize
218B
MD58e8d3f625f7e64c58dd28937b709b210
SHA16d4b0bdfc2498a069f6a4f374573a142e806aca8
SHA25662ecb4ab59721b813c9f405cc568b52b17d10cf8ad39e054c925c2e0c777a22b
SHA51203de9d58360c7959ea17993dd74f1101085a1aba0281a3b72b11481ffcc75918fad741ee77dfff62a047351cb3ac7184a8234937fc4c7c469126525a17092f56
-
Filesize
170B
MD5944b96c4a8a77f1e329063261869f9a2
SHA1111d2fb18ee758890c2ee001c8f9906cfbfa3d57
SHA256dc464efee528eb4bbb74b56ea852c4fd3b72c4fa036745e4cd1bd8bde3bd7eca
SHA51246dec8339f544cd19c44861de0fab34dc1e2a4ccf0db55b6f5a799cd2a320520ac5b3c76438edbe3ac1fbb815392a479bfd4adba1fbc64238b73fa4cf2c07e1b