Analysis

  • max time kernel
    31s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    26-03-2023 01:02

General

  • Target

    746cf06882b23f72a1f61783ef15bc50309a451abf181f80342565e89e51e04b.exe

  • Size

    829KB

  • MD5

    0b68b6976ce7b3b7932a35a00160e38c

  • SHA1

    14d43c43292d417da6bbac21491dcf346a4bc0de

  • SHA256

    746cf06882b23f72a1f61783ef15bc50309a451abf181f80342565e89e51e04b

  • SHA512

    7f16da4b0782a351182db85d9315f9057c0ad6996885eeb2111ffad561818a9f487ca6a4444cd50b25667a73b66b3390f45414c4bbb397450afe21f5284541d3

  • SSDEEP

    12288:+f26x3stG2zpTYlbCXdOm6r2i8hiPafbxjkAdbV3knD7nsTVkmT:CStJt0lbXm6r2imlkpnD7nsTVkC

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\746cf06882b23f72a1f61783ef15bc50309a451abf181f80342565e89e51e04b.exe
    "C:\Users\Admin\AppData\Local\Temp\746cf06882b23f72a1f61783ef15bc50309a451abf181f80342565e89e51e04b.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2016

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2016-54-0x0000000000B20000-0x0000000000BF6000-memory.dmp
    Filesize

    856KB

  • memory/2016-55-0x000000001B010000-0x000000001B090000-memory.dmp
    Filesize

    512KB