Analysis

  • max time kernel
    117s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-01-2025 06:31

General

  • Target

    eb70291aebfca69fae386dfcdc209c8f9b36e135e882088c890c46308fa6df69N.exe

  • Size

    2.7MB

  • MD5

    9ce973d39537cd129e27ab0ed843c920

  • SHA1

    a0fce68a43511da1cbd63600b8e824cf684d9617

  • SHA256

    eb70291aebfca69fae386dfcdc209c8f9b36e135e882088c890c46308fa6df69

  • SHA512

    20dbb88bc9d5862ede036633a8e3937f47e49321872f78706d1b5881071167ab75c08da10c9a8e03a5d747f233ff97c2b0cb8e572297c309cc1497658030f404

  • SSDEEP

    24576:2TbBv5rUyXVnI++nluNY4Cw7sULqPyZwSxIshnWIjm7vZAjX+ez87TkQPI1Q7SGS:IBJI++n8NY+lwSx9WkiLekTk1JMrs

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • DCRat payload 2 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb70291aebfca69fae386dfcdc209c8f9b36e135e882088c890c46308fa6df69N.exe
    "C:\Users\Admin\AppData\Local\Temp\eb70291aebfca69fae386dfcdc209c8f9b36e135e882088c890c46308fa6df69N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Blockmonitor\HeUwcB4baJ09hxtgLFYnrYRurWpCBdRotBlDKLgEXR4j0GQXLf0GLW.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Blockmonitor\i2PbrgOOwQRRChofjSNVXl67BG60nzl0wUfDSUyfdly0UjRL.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3276
        • C:\Blockmonitor\bridgechainsurrogateserverBrowser.exe
          "C:\Blockmonitor/bridgechainsurrogateserverBrowser.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1952
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\X6aBNgxfma.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1444
            • C:\Windows\system32\chcp.com
              chcp 65001
              6⤵
                PID:1424
              • C:\Windows\system32\PING.EXE
                ping -n 10 localhost
                6⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:704
              • C:\Program Files\Windows Mail\WmiPrvSE.exe
                "C:\Program Files\Windows Mail\WmiPrvSE.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3816
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0H3zCkvC0l.bat"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4196
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    8⤵
                      PID:756
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      8⤵
                        PID:4660
                      • C:\Program Files\Windows Mail\WmiPrvSE.exe
                        "C:\Program Files\Windows Mail\WmiPrvSE.exe"
                        8⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4124
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4len57naH7.bat"
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2692
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            10⤵
                              PID:4300
                            • C:\Windows\system32\w32tm.exe
                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                              10⤵
                                PID:4208
                              • C:\Program Files\Windows Mail\WmiPrvSE.exe
                                "C:\Program Files\Windows Mail\WmiPrvSE.exe"
                                10⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5104

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Blockmonitor\HeUwcB4baJ09hxtgLFYnrYRurWpCBdRotBlDKLgEXR4j0GQXLf0GLW.vbe

              Filesize

              239B

              MD5

              3e63707e4d8b55019daddbf38b91a5aa

              SHA1

              8079c688efbac523116d6466faf7364a7a3eeeeb

              SHA256

              707f7fdea6e382b7df65eb229634645d2bf48b37485381e78061e117c85d1d21

              SHA512

              b0004124ed88fe3a13247787bfbd82a9b8b545902d2c36c688270a357e7cae0259d2fcff028fc04b4270c1ef6e85b65cffc903ccb8d90173b13d92188dbcade7

            • C:\Blockmonitor\bridgechainsurrogateserverBrowser.exe

              Filesize

              2.4MB

              MD5

              90ec39d1b525bd236ffbe02fac42f53d

              SHA1

              0c7d6ec16d26546a13ba98daef26c20eaee9e35f

              SHA256

              df2bc338a5f3ade391666a46efa5bc59d0bf88fe224bb7c9a79f934a155cad10

              SHA512

              e9acf468d7782cfbc4334aa4689cbb7d5aedadb2c3f06ae2e3d6a49c7691a53761d4fd1e1348299dad60b105c63f2c8a122336c12067f411f19768cfd2f97374

            • C:\Blockmonitor\i2PbrgOOwQRRChofjSNVXl67BG60nzl0wUfDSUyfdly0UjRL.bat

              Filesize

              104B

              MD5

              267273f89b4dfe0e94294134e8cdd20e

              SHA1

              530eba1aacce08a71715c0c5ebf1e7312fbf9274

              SHA256

              d2aea7c169666ee3c82d1c366030c1a2264142941f0693ba3a79acaca46b48f9

              SHA512

              da167fab4faf015416b42ddc45de43e3779dca6523f96624df2ce6e5073024e5365c33dbf641da25219ba9957a328e1a8f742453b3ce6af790d642d440a0d5d5

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\WmiPrvSE.exe.log

              Filesize

              1KB

              MD5

              bbb951a34b516b66451218a3ec3b0ae1

              SHA1

              7393835a2476ae655916e0a9687eeaba3ee876e9

              SHA256

              eb70c64ae99d14ac2588b7a84854fbf3c420532d7fe4dfd49c7b5a70c869943a

              SHA512

              63bcbfcf8e7421c66855c487c31b2991a989bdea0c1edd4c40066b52fa3eb3d9d37db1cd21b8eb4f33dd5870cc20532c8f485eab9c0b4f6b0793a35c077f2d6f

            • C:\Users\Admin\AppData\Local\Temp\0H3zCkvC0l.bat

              Filesize

              218B

              MD5

              a9511851c31887defc471103577c9001

              SHA1

              ee828916f203a0f88680473fbb32cb91056178be

              SHA256

              a50b09079eee68f2138a6530056643f77c2aa91bcbe0c3db75764656939098e5

              SHA512

              46e9785d7ed7c5212d41bf24f23cf538a7ab182f461ef11e028198bdf02c1c94692ccbfa4eb39bd8793915a3f378a45a871c5747360f5bacb9675f756a7a7633

            • C:\Users\Admin\AppData\Local\Temp\4len57naH7.bat

              Filesize

              218B

              MD5

              8e8d3f625f7e64c58dd28937b709b210

              SHA1

              6d4b0bdfc2498a069f6a4f374573a142e806aca8

              SHA256

              62ecb4ab59721b813c9f405cc568b52b17d10cf8ad39e054c925c2e0c777a22b

              SHA512

              03de9d58360c7959ea17993dd74f1101085a1aba0281a3b72b11481ffcc75918fad741ee77dfff62a047351cb3ac7184a8234937fc4c7c469126525a17092f56

            • C:\Users\Admin\AppData\Local\Temp\X6aBNgxfma.bat

              Filesize

              170B

              MD5

              944b96c4a8a77f1e329063261869f9a2

              SHA1

              111d2fb18ee758890c2ee001c8f9906cfbfa3d57

              SHA256

              dc464efee528eb4bbb74b56ea852c4fd3b72c4fa036745e4cd1bd8bde3bd7eca

              SHA512

              46dec8339f544cd19c44861de0fab34dc1e2a4ccf0db55b6f5a799cd2a320520ac5b3c76438edbe3ac1fbb815392a479bfd4adba1fbc64238b73fa4cf2c07e1b

            • memory/1952-39-0x000000001C740000-0x000000001CC68000-memory.dmp

              Filesize

              5.2MB

            • memory/1952-47-0x000000001C280000-0x000000001C2DA000-memory.dmp

              Filesize

              360KB

            • memory/1952-22-0x0000000002D90000-0x0000000002DA0000-memory.dmp

              Filesize

              64KB

            • memory/1952-24-0x000000001B810000-0x000000001B828000-memory.dmp

              Filesize

              96KB

            • memory/1952-26-0x0000000002DA0000-0x0000000002DB0000-memory.dmp

              Filesize

              64KB

            • memory/1952-28-0x000000001B7F0000-0x000000001B800000-memory.dmp

              Filesize

              64KB

            • memory/1952-30-0x000000001B800000-0x000000001B80E000-memory.dmp

              Filesize

              56KB

            • memory/1952-32-0x000000001C1B0000-0x000000001C1C2000-memory.dmp

              Filesize

              72KB

            • memory/1952-34-0x000000001B830000-0x000000001B840000-memory.dmp

              Filesize

              64KB

            • memory/1952-36-0x000000001C1D0000-0x000000001C1E6000-memory.dmp

              Filesize

              88KB

            • memory/1952-38-0x000000001C1F0000-0x000000001C202000-memory.dmp

              Filesize

              72KB

            • memory/1952-19-0x0000000002DF0000-0x0000000002E0C000-memory.dmp

              Filesize

              112KB

            • memory/1952-41-0x000000001C190000-0x000000001C19E000-memory.dmp

              Filesize

              56KB

            • memory/1952-43-0x000000001C1A0000-0x000000001C1B0000-memory.dmp

              Filesize

              64KB

            • memory/1952-45-0x000000001C210000-0x000000001C220000-memory.dmp

              Filesize

              64KB

            • memory/1952-20-0x000000001C100000-0x000000001C150000-memory.dmp

              Filesize

              320KB

            • memory/1952-49-0x000000001C220000-0x000000001C22E000-memory.dmp

              Filesize

              56KB

            • memory/1952-51-0x000000001C230000-0x000000001C240000-memory.dmp

              Filesize

              64KB

            • memory/1952-53-0x000000001C240000-0x000000001C24E000-memory.dmp

              Filesize

              56KB

            • memory/1952-57-0x000000001C350000-0x000000001C39E000-memory.dmp

              Filesize

              312KB

            • memory/1952-55-0x000000001C2E0000-0x000000001C2F8000-memory.dmp

              Filesize

              96KB

            • memory/1952-73-0x000000001CC70000-0x000000001CD19000-memory.dmp

              Filesize

              676KB

            • memory/1952-17-0x0000000002D80000-0x0000000002D8E000-memory.dmp

              Filesize

              56KB

            • memory/1952-12-0x00007FF985793000-0x00007FF985795000-memory.dmp

              Filesize

              8KB

            • memory/1952-13-0x00000000009B0000-0x0000000000C1E000-memory.dmp

              Filesize

              2.4MB

            • memory/1952-15-0x0000000002DC0000-0x0000000002DE6000-memory.dmp

              Filesize

              152KB

            • memory/3816-106-0x000000001D1E0000-0x000000001D289000-memory.dmp

              Filesize

              676KB

            • memory/3816-99-0x000000001D1E0000-0x000000001D289000-memory.dmp

              Filesize

              676KB

            • memory/4124-131-0x000000001CC70000-0x000000001CD19000-memory.dmp

              Filesize

              676KB

            • memory/4124-137-0x000000001CC70000-0x000000001CD19000-memory.dmp

              Filesize

              676KB

            • memory/5104-161-0x000000001C8E0000-0x000000001C989000-memory.dmp

              Filesize

              676KB