Analysis

  • max time kernel
    148s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    31-01-2025 02:52

General

  • Target

    HORNETrat_launcher.exe

  • Size

    2.9MB

  • MD5

    f07b8eea2d8c8ee368b680254ad0fee5

  • SHA1

    1c75b5bcabedf0e31c76df0ff6ee23ab389bae3b

  • SHA256

    34947ad997759cb6aaf571df44c0996dae57e04cf4510ef4136b8b7ca16eea4e

  • SHA512

    9c01412cb8aa51419f74f8b614f88383f41ce2e2698b373b7d59519d23b875e0660b6fe4a947afa0b79878223afacb8cb8b8a3164b0a44d20f8f58521ff9d21e

  • SSDEEP

    49152:BB3kRVwF/UHWZU5qfD330oa5EL0h81IC4XA4QKa1lWpdh:L0ReSS05G281ICX4QKa1lWpdh

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 15 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\HORNETrat_launcher.exe
    "C:\Users\Admin\AppData\Local\Temp\HORNETrat_launcher.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\mshyperblock\7CVEgcv.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\mshyperblock\S9mCKi92BftZwElqhr8FGhYT1zV90zFd1F.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2816
        • C:\mshyperblock\hyperInto.exe
          "C:\mshyperblock/hyperInto.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3032
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\X3Cei7xi0V.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:588
            • C:\Windows\system32\chcp.com
              chcp 65001
              6⤵
                PID:2164
              • C:\Windows\system32\PING.EXE
                ping -n 10 localhost
                6⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:2188
              • C:\Program Files (x86)\Uninstall Information\OSPPSVC.exe
                "C:\Program Files (x86)\Uninstall Information\OSPPSVC.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2144
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AzylF6O5Hz.bat"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2028
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    8⤵
                      PID:1068
                    • C:\Windows\system32\PING.EXE
                      ping -n 10 localhost
                      8⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Runs ping.exe
                      PID:2592
                    • C:\Program Files (x86)\Uninstall Information\OSPPSVC.exe
                      "C:\Program Files (x86)\Uninstall Information\OSPPSVC.exe"
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:996
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\O4lRoaYFUn.bat"
                        9⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2180
                        • C:\Windows\system32\chcp.com
                          chcp 65001
                          10⤵
                            PID:2888
                          • C:\Windows\system32\w32tm.exe
                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                            10⤵
                              PID:2820
                            • C:\Program Files (x86)\Uninstall Information\OSPPSVC.exe
                              "C:\Program Files (x86)\Uninstall Information\OSPPSVC.exe"
                              10⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:2904
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RXbe2nqO2a.bat"
                                11⤵
                                • Suspicious use of WriteProcessMemory
                                PID:2380
                                • C:\Windows\system32\chcp.com
                                  chcp 65001
                                  12⤵
                                    PID:2936
                                  • C:\Windows\system32\PING.EXE
                                    ping -n 10 localhost
                                    12⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Runs ping.exe
                                    PID:2348
                                  • C:\Program Files (x86)\Uninstall Information\OSPPSVC.exe
                                    "C:\Program Files (x86)\Uninstall Information\OSPPSVC.exe"
                                    12⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:768
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\QZnykySc6r.bat"
                                      13⤵
                                        PID:2536
                                        • C:\Windows\system32\chcp.com
                                          chcp 65001
                                          14⤵
                                            PID:756
                                          • C:\Windows\system32\w32tm.exe
                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                            14⤵
                                              PID:2336
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\dwm.exe'" /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:2260
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Admin\dwm.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:2760
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\dwm.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:2500
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Uninstall Information\OSPPSVC.exe'" /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:436
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files (x86)\Uninstall Information\OSPPSVC.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:1960
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Uninstall Information\OSPPSVC.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:2348
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\lsass.exe'" /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:2928
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:2092
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:1892
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "hyperIntoh" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Internet Explorer\de-DE\hyperInto.exe'" /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:2732
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "hyperInto" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\de-DE\hyperInto.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:2064
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "hyperIntoh" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Internet Explorer\de-DE\hyperInto.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:1884
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\dwm.exe'" /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:2292
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\dwm.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:1164
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\dwm.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:2924

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\AzylF6O5Hz.bat

                    Filesize

                    184B

                    MD5

                    6acb86ef372b38c1ef80588ff4aae4c6

                    SHA1

                    e1d6e6199c85e63fe47748cb8e013e91d85db24c

                    SHA256

                    85efbcb7a1383497f0e3b00902c66c352cc9069561bd8c0fb824626534079e89

                    SHA512

                    5ac48e272d4bc3e79631cc977907a4b8af7d23ed6cf4cfa29165423c70e9b9f5cca9057acb00b95a67c3ba74ff9d4dfb6e1204e6f6984e1a0fff27708c8c9c22

                  • C:\Users\Admin\AppData\Local\Temp\O4lRoaYFUn.bat

                    Filesize

                    232B

                    MD5

                    d3dd9bb4a85a1d2fd00bb6c8615fd6f2

                    SHA1

                    8314ee5497c44c9b87ebdab65811c2000b6a0041

                    SHA256

                    df794f3f1896bc82a4cf68c220ee386b1e15251b9ea748f583dccd1f58c4952d

                    SHA512

                    e1dfef583357a2bafc838895458bef8b713791529ecc96c0346ddf6c446ca11b0866ba6dbacc5e80b4731ebb71f3f42bde0864f30b54d248a43ceea86815f1a6

                  • C:\Users\Admin\AppData\Local\Temp\QZnykySc6r.bat

                    Filesize

                    232B

                    MD5

                    715c317a427f37cd29aa8b938807e0cb

                    SHA1

                    828e949846046e2956be66a8727da5b8c06c6611

                    SHA256

                    099d935dbcc36c1233df9e6614e24341e9fdb70165fb280d500394a3f06a45c0

                    SHA512

                    09c854bbd46642a228f936afeaa116e2f9235691f32ee269ef5912cfd36f9448c449eb9b798b15e34db8e6aaa32260df319457c3746effcacd0387c8e26c885b

                  • C:\Users\Admin\AppData\Local\Temp\RXbe2nqO2a.bat

                    Filesize

                    184B

                    MD5

                    3f7fa6475932a8f69393513245adce0e

                    SHA1

                    e35766bdd12dc40025f5cc2a2caf273bd80c27fb

                    SHA256

                    b64db0343474c1e45840af998a4a1c582d96ae0b735bf5b4d52cb82098fa6ea1

                    SHA512

                    16f3123321cc89212e7d58abea3d1aa4eded0448fc3f87e719d0aad87a414792757ca3b1f2878ee9aeacab0b1e835ca379f053c1f83b07298ef4e09c0694b916

                  • C:\Users\Admin\AppData\Local\Temp\X3Cei7xi0V.bat

                    Filesize

                    184B

                    MD5

                    caeb270f25d420329242989789af8747

                    SHA1

                    d3c3eb3d1e71a2d0f28cfaaf229628e91d2b17cb

                    SHA256

                    b0e2a5da37b72ec29fedd6480457ca4f62080d31b9bab447e7855ee3e56e5b6d

                    SHA512

                    77694caa6499e903397da35a26a4ecce0f3deff55c1556e101017ca953ec2114aad442345035af159825916d1009e958487d5d6cf14f5d6f564cc2b2c2c41a19

                  • C:\mshyperblock\7CVEgcv.vbe

                    Filesize

                    225B

                    MD5

                    b7a9d7bc751980e5d28b50643805b2b0

                    SHA1

                    dd4e0de7003f4dfc9a4cc52bfbf542e335a700f3

                    SHA256

                    417517292e016853942d2072a55cb914a1e9c552af7d4fce9e9497d32d42ae2f

                    SHA512

                    965e0ecc6c2535d46c7cc27ca7917f5ff20e07b881bf4ab15f26fd25807ad756fed4eca03f8315b68d1e72db1b97f9344ce111955b4c7368f40c5d2f8afec8a0

                  • C:\mshyperblock\S9mCKi92BftZwElqhr8FGhYT1zV90zFd1F.bat

                    Filesize

                    71B

                    MD5

                    769d41729d7dc06c2302102db2bf90bf

                    SHA1

                    156cdeacce22a5969515bc4d61f47a908da78f1e

                    SHA256

                    38f5e3ea511d8cfe28b6d163d844a8cd7c1428ba2f0017793fba1fbae559d54e

                    SHA512

                    f33d0e2ca822168915a2ac6f8ab8bc4774d8733f92d8937b96c9b3e39ece245f003183c53d55c6a51b6c9b1241d252bd303af7381516ae1cd23641fda45de5c7

                  • C:\mshyperblock\hyperInto.exe

                    Filesize

                    2.6MB

                    MD5

                    5bdfa3d66339a5624d36ee2038584cfc

                    SHA1

                    a55b70c8e118a0aa3d3d06281ce5809db2933a7a

                    SHA256

                    a1cdf05403d641c6717c540e76ee1cff8b3d3723df3574413dbdd7e18d1393fa

                    SHA512

                    de156c9044d48657056d087252f46ed3c36f1ce676b1e0a2b3946dc29fa6e5347685bff1b4ad83ecb5b194bd3eb2e3976cbd7028d34390590393bbb5373b84c2

                  • memory/768-117-0x00000000000B0000-0x0000000000346000-memory.dmp

                    Filesize

                    2.6MB

                  • memory/996-77-0x0000000000290000-0x0000000000526000-memory.dmp

                    Filesize

                    2.6MB

                  • memory/2144-57-0x0000000000250000-0x00000000004E6000-memory.dmp

                    Filesize

                    2.6MB

                  • memory/2904-97-0x0000000000110000-0x00000000003A6000-memory.dmp

                    Filesize

                    2.6MB

                  • memory/3032-19-0x00000000004A0000-0x00000000004AE000-memory.dmp

                    Filesize

                    56KB

                  • memory/3032-27-0x0000000000620000-0x0000000000636000-memory.dmp

                    Filesize

                    88KB

                  • memory/3032-35-0x0000000000610000-0x000000000061E000-memory.dmp

                    Filesize

                    56KB

                  • memory/3032-37-0x0000000000C40000-0x0000000000C58000-memory.dmp

                    Filesize

                    96KB

                  • memory/3032-39-0x0000000000640000-0x000000000064C000-memory.dmp

                    Filesize

                    48KB

                  • memory/3032-31-0x0000000000600000-0x000000000060C000-memory.dmp

                    Filesize

                    48KB

                  • memory/3032-29-0x0000000000C00000-0x0000000000C12000-memory.dmp

                    Filesize

                    72KB

                  • memory/3032-33-0x000000001A880000-0x000000001A8DA000-memory.dmp

                    Filesize

                    360KB

                  • memory/3032-25-0x00000000004C0000-0x00000000004D0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3032-23-0x00000000004B0000-0x00000000004BC000-memory.dmp

                    Filesize

                    48KB

                  • memory/3032-21-0x00000000005E0000-0x00000000005F2000-memory.dmp

                    Filesize

                    72KB

                  • memory/3032-17-0x0000000000490000-0x00000000004A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3032-15-0x0000000000480000-0x000000000048E000-memory.dmp

                    Filesize

                    56KB

                  • memory/3032-13-0x00000000011E0000-0x0000000001476000-memory.dmp

                    Filesize

                    2.6MB