Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
malware.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
malware.exe
Resource
win10v2004-20240508-en
General
-
Target
malware.exe
-
Size
1.9MB
-
MD5
4825e7df93d8acb3dd236cc14c342a71
-
SHA1
5cc72cdde2d55a8c5e01ccd80cbb5743bc60ca1b
-
SHA256
c84bbfce14fdc65c6e738ce1196d40066c87e58f443e23266d3b9e542b8a583e
-
SHA512
a2e8aa90a719cdddb2f9a4fb21b43f6471cb06e0cb94bd041f26b6a4e11bd820a04c5ea832bb899a91db73d7114b046834afe788d6c03d71b1bf6697272de591
-
SSDEEP
24576:Ware5SMXhd8zlKNfn6LQrmq4Ku0a7ttoXJZ4pt+NfCgPc52L6cnPmJ9C7CnzpCrk:WvgTW0uNmJPCrjTpM5B3L/q0vlU426n
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Processes:
resource yara_rule behavioral1/memory/2476-22-0x0000000000400000-0x0000000000456000-memory.dmp dcrat behavioral1/memory/2476-21-0x0000000000400000-0x0000000000456000-memory.dmp dcrat behavioral1/memory/2476-20-0x0000000000400000-0x0000000000456000-memory.dmp dcrat -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2564 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
DllHelper.exepid process 1688 DllHelper.exe -
Loads dropped DLL 2 IoCs
Processes:
malware.exepid process 2332 malware.exe 2332 malware.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DllHelper.exedescription pid process target process PID 1688 set thread context of 2476 1688 DllHelper.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
malware.exeDllHelper.exeInstallUtil.exepid process 2332 malware.exe 2332 malware.exe 2332 malware.exe 2332 malware.exe 2332 malware.exe 1688 DllHelper.exe 1688 DllHelper.exe 1688 DllHelper.exe 1688 DllHelper.exe 1688 DllHelper.exe 2476 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
InstallUtil.exedescription pid process Token: SeDebugPrivilege 2476 InstallUtil.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
malware.execmd.exeDllHelper.exedescription pid process target process PID 2332 wrote to memory of 2848 2332 malware.exe schtasks.exe PID 2332 wrote to memory of 2848 2332 malware.exe schtasks.exe PID 2332 wrote to memory of 2848 2332 malware.exe schtasks.exe PID 2332 wrote to memory of 2848 2332 malware.exe schtasks.exe PID 2332 wrote to memory of 1688 2332 malware.exe DllHelper.exe PID 2332 wrote to memory of 1688 2332 malware.exe DllHelper.exe PID 2332 wrote to memory of 1688 2332 malware.exe DllHelper.exe PID 2332 wrote to memory of 1688 2332 malware.exe DllHelper.exe PID 2332 wrote to memory of 2564 2332 malware.exe cmd.exe PID 2332 wrote to memory of 2564 2332 malware.exe cmd.exe PID 2332 wrote to memory of 2564 2332 malware.exe cmd.exe PID 2332 wrote to memory of 2564 2332 malware.exe cmd.exe PID 2564 wrote to memory of 2656 2564 cmd.exe chcp.com PID 2564 wrote to memory of 2656 2564 cmd.exe chcp.com PID 2564 wrote to memory of 2656 2564 cmd.exe chcp.com PID 2564 wrote to memory of 2656 2564 cmd.exe chcp.com PID 2564 wrote to memory of 2800 2564 cmd.exe PING.EXE PID 2564 wrote to memory of 2800 2564 cmd.exe PING.EXE PID 2564 wrote to memory of 2800 2564 cmd.exe PING.EXE PID 2564 wrote to memory of 2800 2564 cmd.exe PING.EXE PID 1688 wrote to memory of 2468 1688 DllHelper.exe InstallUtil.exe PID 1688 wrote to memory of 2468 1688 DllHelper.exe InstallUtil.exe PID 1688 wrote to memory of 2468 1688 DllHelper.exe InstallUtil.exe PID 1688 wrote to memory of 2468 1688 DllHelper.exe InstallUtil.exe PID 1688 wrote to memory of 2468 1688 DllHelper.exe InstallUtil.exe PID 1688 wrote to memory of 2468 1688 DllHelper.exe InstallUtil.exe PID 1688 wrote to memory of 2468 1688 DllHelper.exe InstallUtil.exe PID 1688 wrote to memory of 2476 1688 DllHelper.exe InstallUtil.exe PID 1688 wrote to memory of 2476 1688 DllHelper.exe InstallUtil.exe PID 1688 wrote to memory of 2476 1688 DllHelper.exe InstallUtil.exe PID 1688 wrote to memory of 2476 1688 DllHelper.exe InstallUtil.exe PID 1688 wrote to memory of 2476 1688 DllHelper.exe InstallUtil.exe PID 1688 wrote to memory of 2476 1688 DllHelper.exe InstallUtil.exe PID 1688 wrote to memory of 2476 1688 DllHelper.exe InstallUtil.exe PID 1688 wrote to memory of 2476 1688 DllHelper.exe InstallUtil.exe PID 1688 wrote to memory of 2476 1688 DllHelper.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\malware.exe"C:\Users\Admin\AppData\Local\Temp\malware.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\AppVerif\DllHelper.exe"2⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Users\Admin\AppVerif\DllHelper.exe"C:\Users\Admin\AppVerif\DllHelper.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\malware.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1688-15-0x0000000002080000-0x000000000221F000-memory.dmpFilesize
1.6MB
-
memory/1688-23-0x0000000002080000-0x000000000221F000-memory.dmpFilesize
1.6MB
-
memory/1688-17-0x000000000BB70000-0x000000000BE66000-memory.dmpFilesize
3.0MB
-
memory/1688-16-0x0000000002080000-0x000000000221F000-memory.dmpFilesize
1.6MB
-
memory/1688-14-0x0000000002080000-0x000000000221F000-memory.dmpFilesize
1.6MB
-
memory/2332-13-0x0000000000850000-0x00000000009EF000-memory.dmpFilesize
1.6MB
-
memory/2332-0-0x0000000000850000-0x00000000009EF000-memory.dmpFilesize
1.6MB
-
memory/2332-2-0x0000000000850000-0x00000000009EF000-memory.dmpFilesize
1.6MB
-
memory/2332-1-0x0000000000850000-0x00000000009EF000-memory.dmpFilesize
1.6MB
-
memory/2476-18-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2476-22-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2476-21-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2476-20-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB