Analysis
-
max time kernel
122s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-01-2025 14:22
Static task
static1
Behavioral task
behavioral1
Sample
AIMWARECRACK1.3.2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AIMWARECRACK1.3.2.exe
Resource
win10v2004-20250129-en
General
-
Target
AIMWARECRACK1.3.2.exe
-
Size
2.5MB
-
MD5
f72fe0fbd65b2cc0376fc1d08813a512
-
SHA1
da68c3a1f66bde61c2b7bac27c1418261b0b9e1d
-
SHA256
09f319c554e4e5468ddae84384983edc21aff8717fc103a0cee62e132c70a6d3
-
SHA512
17f0ef497ab31ee122bd4377dcf6d4319b3937e08b818cb67890b62eb0caa0dff8810318b49b16fff470a99f17acc17eba3c1ea013acb4bd0d36d402e06d698d
-
SSDEEP
49152:S3KYg14K5F/STt1piw5bpMK31jZSDW0Pg3nM0n4oyy0cz8F0yqAoThNSi:S67n5pw1pdbKwjZSDW0Pg31X0q8FTqA2
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 7 IoCs
resource yara_rule behavioral1/memory/2916-9-0x0000000000400000-0x000000000067A000-memory.dmp family_dcrat_v2 behavioral1/memory/2916-15-0x0000000000400000-0x000000000067A000-memory.dmp family_dcrat_v2 behavioral1/memory/2916-17-0x0000000000400000-0x000000000067A000-memory.dmp family_dcrat_v2 behavioral1/memory/2916-13-0x0000000000400000-0x000000000067A000-memory.dmp family_dcrat_v2 behavioral1/memory/2916-7-0x0000000000400000-0x000000000067A000-memory.dmp family_dcrat_v2 behavioral1/memory/2696-76-0x0000000000400000-0x000000000067A000-memory.dmp family_dcrat_v2 behavioral1/memory/2696-78-0x0000000000400000-0x000000000067A000-memory.dmp family_dcrat_v2 -
Executes dropped EXE 2 IoCs
pid Process 2620 services.exe 2696 services.exe -
Loads dropped DLL 6 IoCs
pid Process 2592 cmd.exe 2508 WerFault.exe 2508 WerFault.exe 2508 WerFault.exe 2508 WerFault.exe 2508 WerFault.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1872 set thread context of 2916 1872 AIMWARECRACK1.3.2.exe 28 PID 2620 set thread context of 2696 2620 services.exe 35 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\Office14\AIMWARECRACK1.3.2.exe AIMWARECRACK1.3.2.exe File created C:\Program Files\Microsoft Office\Office14\566c04d1dba844 AIMWARECRACK1.3.2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1916 1872 WerFault.exe 27 2508 2620 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AIMWARECRACK1.3.2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AIMWARECRACK1.3.2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2688 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2688 PING.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2916 AIMWARECRACK1.3.2.exe 2696 services.exe 2696 services.exe 2696 services.exe 2696 services.exe 2696 services.exe 2696 services.exe 2696 services.exe 2696 services.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2916 AIMWARECRACK1.3.2.exe Token: SeDebugPrivilege 2696 services.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2916 1872 AIMWARECRACK1.3.2.exe 28 PID 1872 wrote to memory of 2916 1872 AIMWARECRACK1.3.2.exe 28 PID 1872 wrote to memory of 2916 1872 AIMWARECRACK1.3.2.exe 28 PID 1872 wrote to memory of 2916 1872 AIMWARECRACK1.3.2.exe 28 PID 1872 wrote to memory of 2916 1872 AIMWARECRACK1.3.2.exe 28 PID 1872 wrote to memory of 2916 1872 AIMWARECRACK1.3.2.exe 28 PID 1872 wrote to memory of 2916 1872 AIMWARECRACK1.3.2.exe 28 PID 1872 wrote to memory of 2916 1872 AIMWARECRACK1.3.2.exe 28 PID 1872 wrote to memory of 2916 1872 AIMWARECRACK1.3.2.exe 28 PID 1872 wrote to memory of 1916 1872 AIMWARECRACK1.3.2.exe 29 PID 1872 wrote to memory of 1916 1872 AIMWARECRACK1.3.2.exe 29 PID 1872 wrote to memory of 1916 1872 AIMWARECRACK1.3.2.exe 29 PID 1872 wrote to memory of 1916 1872 AIMWARECRACK1.3.2.exe 29 PID 2916 wrote to memory of 2592 2916 AIMWARECRACK1.3.2.exe 30 PID 2916 wrote to memory of 2592 2916 AIMWARECRACK1.3.2.exe 30 PID 2916 wrote to memory of 2592 2916 AIMWARECRACK1.3.2.exe 30 PID 2916 wrote to memory of 2592 2916 AIMWARECRACK1.3.2.exe 30 PID 2592 wrote to memory of 2684 2592 cmd.exe 32 PID 2592 wrote to memory of 2684 2592 cmd.exe 32 PID 2592 wrote to memory of 2684 2592 cmd.exe 32 PID 2592 wrote to memory of 2684 2592 cmd.exe 32 PID 2592 wrote to memory of 2688 2592 cmd.exe 33 PID 2592 wrote to memory of 2688 2592 cmd.exe 33 PID 2592 wrote to memory of 2688 2592 cmd.exe 33 PID 2592 wrote to memory of 2688 2592 cmd.exe 33 PID 2592 wrote to memory of 2620 2592 cmd.exe 34 PID 2592 wrote to memory of 2620 2592 cmd.exe 34 PID 2592 wrote to memory of 2620 2592 cmd.exe 34 PID 2592 wrote to memory of 2620 2592 cmd.exe 34 PID 2620 wrote to memory of 2696 2620 services.exe 35 PID 2620 wrote to memory of 2696 2620 services.exe 35 PID 2620 wrote to memory of 2696 2620 services.exe 35 PID 2620 wrote to memory of 2696 2620 services.exe 35 PID 2620 wrote to memory of 2696 2620 services.exe 35 PID 2620 wrote to memory of 2696 2620 services.exe 35 PID 2620 wrote to memory of 2696 2620 services.exe 35 PID 2620 wrote to memory of 2696 2620 services.exe 35 PID 2620 wrote to memory of 2696 2620 services.exe 35 PID 2620 wrote to memory of 2508 2620 services.exe 36 PID 2620 wrote to memory of 2508 2620 services.exe 36 PID 2620 wrote to memory of 2508 2620 services.exe 36 PID 2620 wrote to memory of 2508 2620 services.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\AIMWARECRACK1.3.2.exe"C:\Users\Admin\AppData\Local\Temp\AIMWARECRACK1.3.2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\AIMWARECRACK1.3.2.exe"C:\Users\Admin\AppData\Local\Temp\AIMWARECRACK1.3.2.exe"2⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4DTouCxMhC.bat"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2684
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2688
-
-
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\services.exe"C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\services.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\services.exe"C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\services.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 5405⤵
- Loads dropped DLL
- Program crash
PID:2508
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 5362⤵
- Program crash
PID:1916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5f72fe0fbd65b2cc0376fc1d08813a512
SHA1da68c3a1f66bde61c2b7bac27c1418261b0b9e1d
SHA25609f319c554e4e5468ddae84384983edc21aff8717fc103a0cee62e132c70a6d3
SHA51217f0ef497ab31ee122bd4377dcf6d4319b3937e08b818cb67890b62eb0caa0dff8810318b49b16fff470a99f17acc17eba3c1ea013acb4bd0d36d402e06d698d
-
Filesize
203B
MD5dc833134e0c08cd2af03f7f9c1345aad
SHA19efa49bdb8d3b1ff89ebf897b7dcfa3cacfaf732
SHA2565130dd9b8e76e308ac91769008fba6e2a1c25ecb608c8a38c460295dba317add
SHA5122daeceb2444bb3b0913125b1403307ab47595458e3da47affcc8f1529c0840b0473a09012cd582e5361480059852bf9d04110ebf26b0bf4703244be082b3a236