Analysis

  • max time kernel
    112s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2025 19:07

General

  • Target

    062c124b7a6d9297d4ed689b6cf8f30255153fe57bab1df94017823c96f1045a.exe

  • Size

    2.0MB

  • MD5

    43556ce01d23dee540a9c00a895478fa

  • SHA1

    04a78efa3659b2a3123432c6066858edf9d97ca6

  • SHA256

    062c124b7a6d9297d4ed689b6cf8f30255153fe57bab1df94017823c96f1045a

  • SHA512

    c0a9a9e62732bc945f2a3f458d4cc453eb9fcdb9b125b9c76e13bcfc9c41e84b04dfc4d66b691ca6c6ec35f8663449bea3f9281d5e3fb7346cb85bbd0926f290

  • SSDEEP

    24576:N3s6IAVPf6cr+jZRRGjzpRjns1NpJz8jEQ0tg284YVv9baETptpGntxvboFDQvWs:FjUQjzTbs1NpJzg0tg2G9bZpUt1mDo

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\062c124b7a6d9297d4ed689b6cf8f30255153fe57bab1df94017823c96f1045a.exe
    "C:\Users\Admin\AppData\Local\Temp\062c124b7a6d9297d4ed689b6cf8f30255153fe57bab1df94017823c96f1045a.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0YYZ5nWjHt.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:772
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:4540
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:1936
        • C:\Users\Admin\AppData\Local\Temp\062c124b7a6d9297d4ed689b6cf8f30255153fe57bab1df94017823c96f1045a.exe
          "C:\Users\Admin\AppData\Local\Temp\062c124b7a6d9297d4ed689b6cf8f30255153fe57bab1df94017823c96f1045a.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3368

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\WindowsRE\services.exe

      Filesize

      2.0MB

      MD5

      43556ce01d23dee540a9c00a895478fa

      SHA1

      04a78efa3659b2a3123432c6066858edf9d97ca6

      SHA256

      062c124b7a6d9297d4ed689b6cf8f30255153fe57bab1df94017823c96f1045a

      SHA512

      c0a9a9e62732bc945f2a3f458d4cc453eb9fcdb9b125b9c76e13bcfc9c41e84b04dfc4d66b691ca6c6ec35f8663449bea3f9281d5e3fb7346cb85bbd0926f290

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\062c124b7a6d9297d4ed689b6cf8f30255153fe57bab1df94017823c96f1045a.exe.log

      Filesize

      1KB

      MD5

      1eff74e45bb1f7104e691358cb209546

      SHA1

      253b13ffad516cc34704f5b882c6fa36953a953f

      SHA256

      7ad96be486e6058b19446b95bb734acdaf4addc557b2d059a66ee1acfe19b3fc

      SHA512

      44163ed001baf697ce66d3b386e13bf5cb94bc24ce6b1ae98665d766d5fcdf0ca28b41ecc26c5f11bbea117ac17099e87f204f9d5469bb102a769548edeead7e

    • C:\Users\Admin\AppData\Local\Temp\0YYZ5nWjHt.bat

      Filesize

      230B

      MD5

      d9718f87843c6ad3cf81e0de06ecaba7

      SHA1

      c3cf18a0307649398cc4cfd13aa0b7215ad093a9

      SHA256

      2362defdf8ee4fd73a6f364a7cb62cd0d822d3c5faa1438962435f639462b040

      SHA512

      4619c3b40d1fcf8575307f6135d8a3605cabbb8fbcf5ebb54ab3e3216fab71516353da402265e8005c1e96f3883ac8dadb8b66ad73123cc02200884eea4b02d6

    • memory/3368-45-0x00007FFC2E370000-0x00007FFC2EE31000-memory.dmp

      Filesize

      10.8MB

    • memory/3368-44-0x000000001BEC0000-0x000000001BF2B000-memory.dmp

      Filesize

      428KB

    • memory/3368-39-0x00007FFC2E370000-0x00007FFC2EE31000-memory.dmp

      Filesize

      10.8MB

    • memory/4380-15-0x00007FFC2E370000-0x00007FFC2EE31000-memory.dmp

      Filesize

      10.8MB

    • memory/4380-32-0x00007FFC2E370000-0x00007FFC2EE31000-memory.dmp

      Filesize

      10.8MB

    • memory/4380-8-0x000000001BAF0000-0x000000001BB0C000-memory.dmp

      Filesize

      112KB

    • memory/4380-12-0x000000001BB10000-0x000000001BB28000-memory.dmp

      Filesize

      96KB

    • memory/4380-0-0x00007FFC2E373000-0x00007FFC2E375000-memory.dmp

      Filesize

      8KB

    • memory/4380-14-0x0000000002FA0000-0x0000000002FAC000-memory.dmp

      Filesize

      48KB

    • memory/4380-19-0x00007FFC2E370000-0x00007FFC2EE31000-memory.dmp

      Filesize

      10.8MB

    • memory/4380-10-0x00007FFC2E370000-0x00007FFC2EE31000-memory.dmp

      Filesize

      10.8MB

    • memory/4380-26-0x00007FFC2E370000-0x00007FFC2EE31000-memory.dmp

      Filesize

      10.8MB

    • memory/4380-9-0x000000001BE80000-0x000000001BED0000-memory.dmp

      Filesize

      320KB

    • memory/4380-33-0x00007FFC2E370000-0x00007FFC2EE31000-memory.dmp

      Filesize

      10.8MB

    • memory/4380-36-0x00007FFC2E370000-0x00007FFC2EE31000-memory.dmp

      Filesize

      10.8MB

    • memory/4380-6-0x0000000002F90000-0x0000000002F9E000-memory.dmp

      Filesize

      56KB

    • memory/4380-4-0x00007FFC2E370000-0x00007FFC2EE31000-memory.dmp

      Filesize

      10.8MB

    • memory/4380-3-0x00007FFC2E370000-0x00007FFC2EE31000-memory.dmp

      Filesize

      10.8MB

    • memory/4380-2-0x00007FFC2E370000-0x00007FFC2EE31000-memory.dmp

      Filesize

      10.8MB

    • memory/4380-1-0x0000000000CE0000-0x0000000000EBC000-memory.dmp

      Filesize

      1.9MB