Analysis
-
max time kernel
79s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2023 11:46
Behavioral task
behavioral1
Sample
a77c89b6d4961bb56c53196685ed97b01f7e49f5606e15b80ba0034e422b1029.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a77c89b6d4961bb56c53196685ed97b01f7e49f5606e15b80ba0034e422b1029.exe
Resource
win10v2004-20220812-en
General
-
Target
a77c89b6d4961bb56c53196685ed97b01f7e49f5606e15b80ba0034e422b1029.exe
-
Size
2.0MB
-
MD5
45ad397238e5e447aef495a80218019a
-
SHA1
23ee937bb616025ae0185c98ab183e9282c525da
-
SHA256
a77c89b6d4961bb56c53196685ed97b01f7e49f5606e15b80ba0034e422b1029
-
SHA512
c981a1c6bb7f0c28bf2fa07c23ca06f9c12f113457114eade25a8c8ad79fb01edf84719b2ed59fa61ecf9943b470328a92afee1b8c234b7549f1cad2d99e2c75
-
SSDEEP
49152:dndSiKG7Idc6Rm8sDJMSgkdEiVTpnjyv:dhURm8vSFVov
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Processes:
resource yara_rule behavioral2/memory/3008-132-0x0000000000570000-0x000000000076A000-memory.dmp dcrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a77c89b6d4961bb56c53196685ed97b01f7e49f5606e15b80ba0034e422b1029.exedescription pid process Token: SeDebugPrivilege 3008 a77c89b6d4961bb56c53196685ed97b01f7e49f5606e15b80ba0034e422b1029.exe