Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2023, 13:34

General

  • Target

    DcRat/DcRat.exe

  • Size

    21.6MB

  • MD5

    86f3de7b3546c538291820eb6f1d3d32

  • SHA1

    4b0994b910d67990c855b669f4124e6ebbbc0343

  • SHA256

    533c45a3400cceaf13703564aa125c4a17b613ea0964d140be0415d7df4f644b

  • SHA512

    002449d99933ee6a61059a2722a2b75f5358b987f4853a93ef0dd5c0b5724835c449a810450f1d2ba6cb5114a106c8f05fbad2137b3c0b3c851663fa1a00d244

  • SSDEEP

    393216:q/nGTBP+Zw6NLIsFfskh1BmXGR1Bd+/2:q/GTBP+Zlnk0rmoBY

Score
10/10

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DcRat\DcRat.exe
    "C:\Users\Admin\AppData\Local\Temp\DcRat\DcRat.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1156
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:580

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1156-54-0x0000000001390000-0x000000000292E000-memory.dmp

      Filesize

      21.6MB

    • memory/1156-55-0x000000001C680000-0x000000001C700000-memory.dmp

      Filesize

      512KB

    • memory/1156-56-0x000000001C680000-0x000000001C700000-memory.dmp

      Filesize

      512KB

    • memory/1156-57-0x000000001C680000-0x000000001C700000-memory.dmp

      Filesize

      512KB

    • memory/1156-60-0x000000001C680000-0x000000001C700000-memory.dmp

      Filesize

      512KB

    • memory/1156-61-0x000000001C680000-0x000000001C700000-memory.dmp

      Filesize

      512KB

    • memory/1156-62-0x000000001C680000-0x000000001C700000-memory.dmp

      Filesize

      512KB

    • memory/1156-66-0x000000001C680000-0x000000001C700000-memory.dmp

      Filesize

      512KB

    • memory/1156-67-0x000000001C680000-0x000000001C700000-memory.dmp

      Filesize

      512KB

    • memory/1156-74-0x000000001C680000-0x000000001C700000-memory.dmp

      Filesize

      512KB

    • memory/1156-75-0x00000000207D0000-0x00000000207E0000-memory.dmp

      Filesize

      64KB

    • memory/1156-76-0x00000000203C0000-0x00000000203C1000-memory.dmp

      Filesize

      4KB