Analysis
-
max time kernel
198s -
max time network
300s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30-01-2025 12:55
Static task
static1
Behavioral task
behavioral1
Sample
AIMWARE CRACK 1.3.2.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
AIMWARE CRACK 1.3.2.exe
Resource
win10v2004-20250129-en
General
-
Target
AIMWARE CRACK 1.3.2.exe
-
Size
2.5MB
-
MD5
f72fe0fbd65b2cc0376fc1d08813a512
-
SHA1
da68c3a1f66bde61c2b7bac27c1418261b0b9e1d
-
SHA256
09f319c554e4e5468ddae84384983edc21aff8717fc103a0cee62e132c70a6d3
-
SHA512
17f0ef497ab31ee122bd4377dcf6d4319b3937e08b818cb67890b62eb0caa0dff8810318b49b16fff470a99f17acc17eba3c1ea013acb4bd0d36d402e06d698d
-
SSDEEP
49152:S3KYg14K5F/STt1piw5bpMK31jZSDW0Pg3nM0n4oyy0cz8F0yqAoThNSi:S67n5pw1pdbKwjZSDW0Pg31X0q8FTqA2
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 7 IoCs
resource yara_rule behavioral1/memory/2632-11-0x0000000000400000-0x000000000067A000-memory.dmp family_dcrat_v2 behavioral1/memory/2632-7-0x0000000000400000-0x000000000067A000-memory.dmp family_dcrat_v2 behavioral1/memory/2632-5-0x0000000000400000-0x000000000067A000-memory.dmp family_dcrat_v2 behavioral1/memory/2632-13-0x0000000000400000-0x000000000067A000-memory.dmp family_dcrat_v2 behavioral1/memory/2632-16-0x0000000000400000-0x000000000067A000-memory.dmp family_dcrat_v2 behavioral1/memory/2740-75-0x0000000000400000-0x000000000067A000-memory.dmp family_dcrat_v2 behavioral1/memory/2740-77-0x0000000000400000-0x000000000067A000-memory.dmp family_dcrat_v2 -
Executes dropped EXE 2 IoCs
pid Process 2708 AIMWARE CRACK 1.3.2.exe 2740 AIMWARE CRACK 1.3.2.exe -
Loads dropped DLL 6 IoCs
pid Process 2544 cmd.exe 1588 WerFault.exe 1588 WerFault.exe 1588 WerFault.exe 1588 WerFault.exe 1588 WerFault.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2064 set thread context of 2632 2064 AIMWARE CRACK 1.3.2.exe 30 PID 2708 set thread context of 2740 2708 AIMWARE CRACK 1.3.2.exe 39 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\csrss.exe AIMWARE CRACK 1.3.2.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\csrss.exe AIMWARE CRACK 1.3.2.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\886983d96e3d3e AIMWARE CRACK 1.3.2.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\ModemLogs\lsass.exe AIMWARE CRACK 1.3.2.exe File created C:\Windows\ModemLogs\6203df4a6bafc7 AIMWARE CRACK 1.3.2.exe File created C:\Windows\Vss\Writers\System\sppsvc.exe AIMWARE CRACK 1.3.2.exe File created C:\Windows\Vss\Writers\System\0a1fd5f707cd16 AIMWARE CRACK 1.3.2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1996 2064 WerFault.exe 29 1588 2708 WerFault.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w32tm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AIMWARE CRACK 1.3.2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AIMWARE CRACK 1.3.2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AIMWARE CRACK 1.3.2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AIMWARE CRACK 1.3.2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2632 AIMWARE CRACK 1.3.2.exe 2632 AIMWARE CRACK 1.3.2.exe 2632 AIMWARE CRACK 1.3.2.exe 2632 AIMWARE CRACK 1.3.2.exe 2632 AIMWARE CRACK 1.3.2.exe 2632 AIMWARE CRACK 1.3.2.exe 2632 AIMWARE CRACK 1.3.2.exe 2740 AIMWARE CRACK 1.3.2.exe 2740 AIMWARE CRACK 1.3.2.exe 2740 AIMWARE CRACK 1.3.2.exe 2740 AIMWARE CRACK 1.3.2.exe 2740 AIMWARE CRACK 1.3.2.exe 2740 AIMWARE CRACK 1.3.2.exe 2740 AIMWARE CRACK 1.3.2.exe 2740 AIMWARE CRACK 1.3.2.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2740 AIMWARE CRACK 1.3.2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2632 AIMWARE CRACK 1.3.2.exe Token: SeDebugPrivilege 2740 AIMWARE CRACK 1.3.2.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2632 2064 AIMWARE CRACK 1.3.2.exe 30 PID 2064 wrote to memory of 2632 2064 AIMWARE CRACK 1.3.2.exe 30 PID 2064 wrote to memory of 2632 2064 AIMWARE CRACK 1.3.2.exe 30 PID 2064 wrote to memory of 2632 2064 AIMWARE CRACK 1.3.2.exe 30 PID 2064 wrote to memory of 2632 2064 AIMWARE CRACK 1.3.2.exe 30 PID 2064 wrote to memory of 2632 2064 AIMWARE CRACK 1.3.2.exe 30 PID 2064 wrote to memory of 2632 2064 AIMWARE CRACK 1.3.2.exe 30 PID 2064 wrote to memory of 2632 2064 AIMWARE CRACK 1.3.2.exe 30 PID 2064 wrote to memory of 2632 2064 AIMWARE CRACK 1.3.2.exe 30 PID 2064 wrote to memory of 1996 2064 AIMWARE CRACK 1.3.2.exe 31 PID 2064 wrote to memory of 1996 2064 AIMWARE CRACK 1.3.2.exe 31 PID 2064 wrote to memory of 1996 2064 AIMWARE CRACK 1.3.2.exe 31 PID 2064 wrote to memory of 1996 2064 AIMWARE CRACK 1.3.2.exe 31 PID 2632 wrote to memory of 2544 2632 AIMWARE CRACK 1.3.2.exe 32 PID 2632 wrote to memory of 2544 2632 AIMWARE CRACK 1.3.2.exe 32 PID 2632 wrote to memory of 2544 2632 AIMWARE CRACK 1.3.2.exe 32 PID 2632 wrote to memory of 2544 2632 AIMWARE CRACK 1.3.2.exe 32 PID 2544 wrote to memory of 1780 2544 cmd.exe 34 PID 2544 wrote to memory of 1780 2544 cmd.exe 34 PID 2544 wrote to memory of 1780 2544 cmd.exe 34 PID 2544 wrote to memory of 1780 2544 cmd.exe 34 PID 2544 wrote to memory of 2984 2544 cmd.exe 35 PID 2544 wrote to memory of 2984 2544 cmd.exe 35 PID 2544 wrote to memory of 2984 2544 cmd.exe 35 PID 2544 wrote to memory of 2984 2544 cmd.exe 35 PID 2984 wrote to memory of 2712 2984 w32tm.exe 36 PID 2984 wrote to memory of 2712 2984 w32tm.exe 36 PID 2984 wrote to memory of 2712 2984 w32tm.exe 36 PID 2984 wrote to memory of 2712 2984 w32tm.exe 36 PID 2544 wrote to memory of 2708 2544 cmd.exe 38 PID 2544 wrote to memory of 2708 2544 cmd.exe 38 PID 2544 wrote to memory of 2708 2544 cmd.exe 38 PID 2544 wrote to memory of 2708 2544 cmd.exe 38 PID 2708 wrote to memory of 2740 2708 AIMWARE CRACK 1.3.2.exe 39 PID 2708 wrote to memory of 2740 2708 AIMWARE CRACK 1.3.2.exe 39 PID 2708 wrote to memory of 2740 2708 AIMWARE CRACK 1.3.2.exe 39 PID 2708 wrote to memory of 2740 2708 AIMWARE CRACK 1.3.2.exe 39 PID 2708 wrote to memory of 2740 2708 AIMWARE CRACK 1.3.2.exe 39 PID 2708 wrote to memory of 2740 2708 AIMWARE CRACK 1.3.2.exe 39 PID 2708 wrote to memory of 2740 2708 AIMWARE CRACK 1.3.2.exe 39 PID 2708 wrote to memory of 2740 2708 AIMWARE CRACK 1.3.2.exe 39 PID 2708 wrote to memory of 2740 2708 AIMWARE CRACK 1.3.2.exe 39 PID 2708 wrote to memory of 1588 2708 AIMWARE CRACK 1.3.2.exe 40 PID 2708 wrote to memory of 1588 2708 AIMWARE CRACK 1.3.2.exe 40 PID 2708 wrote to memory of 1588 2708 AIMWARE CRACK 1.3.2.exe 40 PID 2708 wrote to memory of 1588 2708 AIMWARE CRACK 1.3.2.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\AIMWARE CRACK 1.3.2.exe"C:\Users\Admin\AppData\Local\Temp\AIMWARE CRACK 1.3.2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\AIMWARE CRACK 1.3.2.exe"C:\Users\Admin\AppData\Local\Temp\AIMWARE CRACK 1.3.2.exe"2⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0cJoPw6Di3.bat"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:1780
-
-
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵PID:2712
-
-
-
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\AIMWARE CRACK 1.3.2.exe"C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\AIMWARE CRACK 1.3.2.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\AIMWARE CRACK 1.3.2.exe"C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\AIMWARE CRACK 1.3.2.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 5445⤵
- Loads dropped DLL
- Program crash
PID:1588
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 5362⤵
- Program crash
PID:1996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5f72fe0fbd65b2cc0376fc1d08813a512
SHA1da68c3a1f66bde61c2b7bac27c1418261b0b9e1d
SHA25609f319c554e4e5468ddae84384983edc21aff8717fc103a0cee62e132c70a6d3
SHA51217f0ef497ab31ee122bd4377dcf6d4319b3937e08b818cb67890b62eb0caa0dff8810318b49b16fff470a99f17acc17eba3c1ea013acb4bd0d36d402e06d698d
-
Filesize
267B
MD5e577bc5a013e03f1c02d797ef26ae4b5
SHA1fc8fb621dfcb3ce1b5fb6f30c9a0423aca7dd202
SHA256f2cb41a83adf7033d270138643ff00ce0be9640bd263f7eb134303993ba6ca80
SHA512e50a93f6827c64e37bac7da840b171e9db239d19aeeb77fc8ab93b06f2576949f740848a7e798b4e2d21511fdb610a92387b9b9d99003eac00b35f9d812af80a