Overview
overview
10Static
static
10niha-main/OmNom.exe
windows10-ltsc_2021-x64
10niha-main/alfa.exe
windows10-ltsc_2021-x64
8niha-main/derq.exe
windows10-ltsc_2021-x64
10niha-main/...af.exe
windows10-ltsc_2021-x64
7niha-main/...dr.exe
windows10-ltsc_2021-x64
7niha-main/...ra.exe
windows10-ltsc_2021-x64
10niha-main/kiprea2.exe
windows10-ltsc_2021-x64
10niha-main/kkk.exe
windows10-ltsc_2021-x64
10niha-main/...as.exe
windows10-ltsc_2021-x64
10niha-main/...wr.exe
windows10-ltsc_2021-x64
10niha-main/...ij.exe
windows10-ltsc_2021-x64
10niha-main/...12.exe
windows10-ltsc_2021-x64
10niha-main/...sr.exe
windows10-ltsc_2021-x64
10niha-main/...as.exe
windows10-ltsc_2021-x64
10niha-main/opiww1.exe
windows10-ltsc_2021-x64
10niha-main/...na.exe
windows10-ltsc_2021-x64
10niha-main/...t1.exe
windows10-ltsc_2021-x64
10niha-main/...ad.exe
windows10-ltsc_2021-x64
niha-main/...ed.exe
windows10-ltsc_2021-x64
8niha-main/pypdwat.exe
windows10-ltsc_2021-x64
7niha-main/...12.exe
windows10-ltsc_2021-x64
10niha-main/robobob.exe
windows10-ltsc_2021-x64
10niha-main/swi.exe
windows10-ltsc_2021-x64
10niha-main/thiakdc.exe
windows10-ltsc_2021-x64
10niha-main/...ka.exe
windows10-ltsc_2021-x64
8niha-main/time.exe
windows10-ltsc_2021-x64
10niha-main/vosemOO.exe
windows10-ltsc_2021-x64
10niha-main/wint1.exe
windows10-ltsc_2021-x64
10niha-main/wint2.exe
windows10-ltsc_2021-x64
10Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250410-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250410-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
16/04/2025, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
niha-main/OmNom.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
niha-main/alfa.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral3
Sample
niha-main/derq.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral4
Sample
niha-main/inktkisaf.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral5
Sample
niha-main/iotjsjawdr.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral6
Sample
niha-main/iylksfkktra.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral7
Sample
niha-main/kiprea2.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral8
Sample
niha-main/kkk.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral9
Sample
niha-main/liladertoas.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
niha-main/lporjgjsawr.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral11
Sample
niha-main/mbyoitksfjkyij.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral12
Sample
niha-main/mixerat12.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral13
Sample
niha-main/nerialtersr.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral14
Sample
niha-main/ninahoooas.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral15
Sample
niha-main/opiww1.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral16
Sample
niha-main/plorestoana.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral17
Sample
niha-main/poratertosat1.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral18
Sample
niha-main/pothgkjad.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral19
Sample
niha-main/potphbksed.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral20
Sample
niha-main/pypdwat.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral21
Sample
niha-main/rigosae12.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral22
Sample
niha-main/robobob.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral23
Sample
niha-main/swi.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral24
Sample
niha-main/thiakdc.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral25
Sample
niha-main/tiadktka.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral26
Sample
niha-main/time.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral27
Sample
niha-main/vosemOO.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral28
Sample
niha-main/wint1.exe
Resource
win10ltsc2021-20250410-en
General
-
Target
niha-main/kiprea2.exe
-
Size
2.3MB
-
MD5
bc9c39299d0b237235882f9b4f99d57a
-
SHA1
145f608cf981af51a3dc3b289c673e25f8abd360
-
SHA256
234835e030956fb4fc80261c06c58050f17c69a1e0120de96b585cc046a468d5
-
SHA512
192ba62f1f2d50a384028e6c8a6c415380f7eb5b1eeedcf38e99e65e36f2237395681d62052edeec17ca451497f364088fcb95b6cef91135f24c709c9db367d1
-
SSDEEP
24576:u7TxN+ab32/5pCw7sULd3yRsjcAYZkDLll289Gt/beglSdwwQaUEUM6t:YxNZ2/F0Rs4A+Wl2ZBVwy
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 2 IoCs
resource yara_rule behavioral7/memory/5156-1-0x0000000000650000-0x000000000089C000-memory.dmp family_dcrat_v2 behavioral7/files/0x001c000000026d2d-60.dat family_dcrat_v2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4260291853-3905407524-539084913-1000\Control Panel\International\Geo\Nation kiprea2.exe -
Executes dropped EXE 1 IoCs
pid Process 5820 staticfile.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3060 PING.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4260291853-3905407524-539084913-1000_Classes\Local Settings kiprea2.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3060 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe 5156 kiprea2.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5820 staticfile.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5156 kiprea2.exe Token: SeDebugPrivilege 5820 staticfile.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 5820 staticfile.exe 5820 staticfile.exe 5820 staticfile.exe 5820 staticfile.exe 5820 staticfile.exe 5820 staticfile.exe 5820 staticfile.exe 5820 staticfile.exe 5820 staticfile.exe 5820 staticfile.exe 5820 staticfile.exe 5820 staticfile.exe 5820 staticfile.exe 5820 staticfile.exe 5820 staticfile.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5156 wrote to memory of 5336 5156 kiprea2.exe 81 PID 5156 wrote to memory of 5336 5156 kiprea2.exe 81 PID 5336 wrote to memory of 5572 5336 cmd.exe 83 PID 5336 wrote to memory of 5572 5336 cmd.exe 83 PID 5336 wrote to memory of 3060 5336 cmd.exe 84 PID 5336 wrote to memory of 3060 5336 cmd.exe 84 PID 5336 wrote to memory of 5820 5336 cmd.exe 85 PID 5336 wrote to memory of 5820 5336 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\niha-main\kiprea2.exe"C:\Users\Admin\AppData\Local\Temp\niha-main\kiprea2.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5156 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\UjV0vSrmD8.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:5336 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:5572
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3060
-
-
C:\Users\Admin\AppData\Local\staticfile.exe"C:\Users\Admin\AppData\Local\staticfile.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5820
-
-
Network
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171B
MD5c0bb580621d1ec1997e7c8cb07076320
SHA12cbd008fbb08a485b42c07bc0224767f2b726c3a
SHA256b337ccbdff533be7cb9517cea58a73ffc346da95a098a4335eca30ad8f1799fd
SHA51229b4aae83f7d09f6f166dddb33fe8e527ad4a3d7c90ad91108d348a32e5739818ef1afa6edf2b75847ede2015f883103c1463fa00dfdb26653af116947d15a9d
-
Filesize
2.3MB
MD5bc9c39299d0b237235882f9b4f99d57a
SHA1145f608cf981af51a3dc3b289c673e25f8abd360
SHA256234835e030956fb4fc80261c06c58050f17c69a1e0120de96b585cc046a468d5
SHA512192ba62f1f2d50a384028e6c8a6c415380f7eb5b1eeedcf38e99e65e36f2237395681d62052edeec17ca451497f364088fcb95b6cef91135f24c709c9db367d1