Analysis
-
max time kernel
209s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2025 12:55
Static task
static1
Behavioral task
behavioral1
Sample
AIMWARE CRACK 1.3.2.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
AIMWARE CRACK 1.3.2.exe
Resource
win10v2004-20250129-en
General
-
Target
AIMWARE CRACK 1.3.2.exe
-
Size
2.5MB
-
MD5
f72fe0fbd65b2cc0376fc1d08813a512
-
SHA1
da68c3a1f66bde61c2b7bac27c1418261b0b9e1d
-
SHA256
09f319c554e4e5468ddae84384983edc21aff8717fc103a0cee62e132c70a6d3
-
SHA512
17f0ef497ab31ee122bd4377dcf6d4319b3937e08b818cb67890b62eb0caa0dff8810318b49b16fff470a99f17acc17eba3c1ea013acb4bd0d36d402e06d698d
-
SSDEEP
49152:S3KYg14K5F/STt1piw5bpMK31jZSDW0Pg3nM0n4oyy0cz8F0yqAoThNSi:S67n5pw1pdbKwjZSDW0Pg31X0q8FTqA2
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 1 IoCs
resource yara_rule behavioral2/memory/1432-4-0x0000000000400000-0x000000000067A000-memory.dmp family_dcrat_v2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\Control Panel\International\Geo\Nation AIMWARE CRACK 1.3.2.exe -
Executes dropped EXE 4 IoCs
pid Process 4840 RuntimeBroker.exe 4180 RuntimeBroker.exe 4308 RuntimeBroker.exe 2448 RuntimeBroker.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2756 set thread context of 1432 2756 AIMWARE CRACK 1.3.2.exe 84 PID 4840 set thread context of 2448 4840 RuntimeBroker.exe 95 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Windows Media Player\es-ES\System.exe AIMWARE CRACK 1.3.2.exe File created C:\Program Files\Windows Media Player\es-ES\27d1bcfc3c54e0 AIMWARE CRACK 1.3.2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Installer\9e8d7a4ca61bd9 AIMWARE CRACK 1.3.2.exe File created C:\Windows\Installer\RuntimeBroker.exe AIMWARE CRACK 1.3.2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3580 2756 WerFault.exe 81 3624 4840 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AIMWARE CRACK 1.3.2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AIMWARE CRACK 1.3.2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4960 PING.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000_Classes\Local Settings AIMWARE CRACK 1.3.2.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4960 PING.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1432 AIMWARE CRACK 1.3.2.exe 1432 AIMWARE CRACK 1.3.2.exe 1432 AIMWARE CRACK 1.3.2.exe 1432 AIMWARE CRACK 1.3.2.exe 1432 AIMWARE CRACK 1.3.2.exe 1432 AIMWARE CRACK 1.3.2.exe 1432 AIMWARE CRACK 1.3.2.exe 1432 AIMWARE CRACK 1.3.2.exe 1432 AIMWARE CRACK 1.3.2.exe 1432 AIMWARE CRACK 1.3.2.exe 1432 AIMWARE CRACK 1.3.2.exe 1432 AIMWARE CRACK 1.3.2.exe 1432 AIMWARE CRACK 1.3.2.exe 1432 AIMWARE CRACK 1.3.2.exe 2448 RuntimeBroker.exe 2448 RuntimeBroker.exe 2448 RuntimeBroker.exe 2448 RuntimeBroker.exe 2448 RuntimeBroker.exe 2448 RuntimeBroker.exe 2448 RuntimeBroker.exe 2448 RuntimeBroker.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2448 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1432 AIMWARE CRACK 1.3.2.exe Token: SeDebugPrivilege 2448 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2756 wrote to memory of 1432 2756 AIMWARE CRACK 1.3.2.exe 84 PID 2756 wrote to memory of 1432 2756 AIMWARE CRACK 1.3.2.exe 84 PID 2756 wrote to memory of 1432 2756 AIMWARE CRACK 1.3.2.exe 84 PID 2756 wrote to memory of 1432 2756 AIMWARE CRACK 1.3.2.exe 84 PID 2756 wrote to memory of 1432 2756 AIMWARE CRACK 1.3.2.exe 84 PID 2756 wrote to memory of 1432 2756 AIMWARE CRACK 1.3.2.exe 84 PID 2756 wrote to memory of 1432 2756 AIMWARE CRACK 1.3.2.exe 84 PID 2756 wrote to memory of 1432 2756 AIMWARE CRACK 1.3.2.exe 84 PID 1432 wrote to memory of 2768 1432 AIMWARE CRACK 1.3.2.exe 88 PID 1432 wrote to memory of 2768 1432 AIMWARE CRACK 1.3.2.exe 88 PID 1432 wrote to memory of 2768 1432 AIMWARE CRACK 1.3.2.exe 88 PID 2768 wrote to memory of 1736 2768 cmd.exe 90 PID 2768 wrote to memory of 1736 2768 cmd.exe 90 PID 2768 wrote to memory of 1736 2768 cmd.exe 90 PID 2768 wrote to memory of 4960 2768 cmd.exe 91 PID 2768 wrote to memory of 4960 2768 cmd.exe 91 PID 2768 wrote to memory of 4960 2768 cmd.exe 91 PID 2768 wrote to memory of 4840 2768 cmd.exe 92 PID 2768 wrote to memory of 4840 2768 cmd.exe 92 PID 2768 wrote to memory of 4840 2768 cmd.exe 92 PID 4840 wrote to memory of 4180 4840 RuntimeBroker.exe 93 PID 4840 wrote to memory of 4180 4840 RuntimeBroker.exe 93 PID 4840 wrote to memory of 4180 4840 RuntimeBroker.exe 93 PID 4840 wrote to memory of 4308 4840 RuntimeBroker.exe 94 PID 4840 wrote to memory of 4308 4840 RuntimeBroker.exe 94 PID 4840 wrote to memory of 4308 4840 RuntimeBroker.exe 94 PID 4840 wrote to memory of 2448 4840 RuntimeBroker.exe 95 PID 4840 wrote to memory of 2448 4840 RuntimeBroker.exe 95 PID 4840 wrote to memory of 2448 4840 RuntimeBroker.exe 95 PID 4840 wrote to memory of 2448 4840 RuntimeBroker.exe 95 PID 4840 wrote to memory of 2448 4840 RuntimeBroker.exe 95 PID 4840 wrote to memory of 2448 4840 RuntimeBroker.exe 95 PID 4840 wrote to memory of 2448 4840 RuntimeBroker.exe 95 PID 4840 wrote to memory of 2448 4840 RuntimeBroker.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\AIMWARE CRACK 1.3.2.exe"C:\Users\Admin\AppData\Local\Temp\AIMWARE CRACK 1.3.2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\AIMWARE CRACK 1.3.2.exe"C:\Users\Admin\AppData\Local\Temp\AIMWARE CRACK 1.3.2.exe"2⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\KJELcpVi8R.bat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:1736
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4960
-
-
C:\Windows\Installer\RuntimeBroker.exe"C:\Windows\Installer\RuntimeBroker.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\Installer\RuntimeBroker.exe"C:\Windows\Installer\RuntimeBroker.exe"5⤵
- Executes dropped EXE
PID:4180
-
-
C:\Windows\Installer\RuntimeBroker.exe"C:\Windows\Installer\RuntimeBroker.exe"5⤵
- Executes dropped EXE
PID:4308
-
-
C:\Windows\Installer\RuntimeBroker.exe"C:\Windows\Installer\RuntimeBroker.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 8645⤵
- Program crash
PID:3624
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 8402⤵
- Program crash
PID:3580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2756 -ip 27561⤵PID:1404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4840 -ip 48401⤵PID:116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166B
MD5eca2aad2f79ab993401424c6b7aa4b5f
SHA161bee13d44a76ad63280046637549324a094c14e
SHA256b1fb0f4db7555c4cdd19c3b1f56950d0812756f2a48d42b42cf9835439175fd7
SHA5121b448e2e4183b3b5208dd4f02131a9b970c529c491f212e2cf6cf7caaf7630bddd0150c4046c469e13699f954936148ecab419bae87e1fc75e0e43e69401205c
-
Filesize
2.5MB
MD5f72fe0fbd65b2cc0376fc1d08813a512
SHA1da68c3a1f66bde61c2b7bac27c1418261b0b9e1d
SHA25609f319c554e4e5468ddae84384983edc21aff8717fc103a0cee62e132c70a6d3
SHA51217f0ef497ab31ee122bd4377dcf6d4319b3937e08b818cb67890b62eb0caa0dff8810318b49b16fff470a99f17acc17eba3c1ea013acb4bd0d36d402e06d698d