Overview
overview
10Static
static
10v2dc/123.exe
windows10-1703-x64
10v2dc/DCRat.exe
windows10-1703-x64
7v2dc/back.gif
windows10-1703-x64
1v2dc/config.cson
windows10-1703-x64
3v2dc/data/7zxa.dll
windows10-1703-x64
3v2dc/data/DCRAC.exe
windows10-1703-x64
1v2dc/data/DCRCC.exe
windows10-1703-x64
3v2dc/data/Default.exe
windows10-1703-x64
1v2dc/data/NCC2.dll
windows10-1703-x64
1v2dc/data/NCC3.dll
windows10-1703-x64
3v2dc/data/NCCheck.dll
windows10-1703-x64
1v2dc/data/Rar.exe
windows10-1703-x64
3v2dc/data/RarExt.dll
windows10-1703-x64
3v2dc/data/...64.dll
windows10-1703-x64
3v2dc/data/WinCon.exe
windows10-1703-x64
1v2dc/data/Zip.exe
windows10-1703-x64
1v2dc/data/dnlib.dll
windows10-1703-x64
1v2dc/data/...le.exe
windows10-1703-x64
7v2dc/data/...or.exe
windows10-1703-x64
7v2dc/data/enc.vbe
windows10-1703-x64
1v2dc/data/kll.temp
windows10-1703-x64
3v2dc/data/upx.exe
windows10-1703-x64
7v2dc/data/wRar.exe
windows10-1703-x64
4v2dc/desig...d.json
windows10-1703-x64
3v2dc/desig...t.json
windows10-1703-x64
3v2dc/desig...l.json
windows10-1703-x64
3v2dc/desig...n.json
windows10-1703-x64
3v2dc/desig...n.json
windows10-1703-x64
3v2dc/desig...n.json
windows10-1703-x64
3v2dc/desig...y.json
windows10-1703-x64
3v2dc/desig...l.json
windows10-1703-x64
3v2dc/desig...n.json
windows10-1703-x64
3Analysis
-
max time kernel
137s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
07/06/2024, 18:36
Behavioral task
behavioral1
Sample
v2dc/123.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
v2dc/DCRat.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
v2dc/back.gif
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
v2dc/config.cson
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
v2dc/data/7zxa.dll
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
v2dc/data/DCRAC.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
v2dc/data/DCRCC.exe
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
v2dc/data/Default.exe
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
v2dc/data/NCC2.dll
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
v2dc/data/NCC3.dll
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
v2dc/data/NCCheck.dll
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
v2dc/data/Rar.exe
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
v2dc/data/RarExt.dll
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
v2dc/data/RarExt64.dll
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
v2dc/data/WinCon.exe
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
v2dc/data/Zip.exe
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
v2dc/data/dnlib.dll
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
v2dc/data/dotNET_Reactor.Console.exe
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
v2dc/data/dotNET_Reactor.exe
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
v2dc/data/enc.vbe
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
v2dc/data/kll.temp
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
v2dc/data/upx.exe
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
v2dc/data/wRar.exe
Resource
win10-20240404-en
Behavioral task
behavioral24
Sample
v2dc/design/ActiveWindowNotifierCommand.json
Resource
win10-20240404-en
Behavioral task
behavioral25
Sample
v2dc/design/BlockInput.json
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
v2dc/design/ClipboardLoggerControl.json
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
v2dc/design/ClipperTableAddon.json
Resource
win10-20240404-en
Behavioral task
behavioral28
Sample
v2dc/design/CrashLoggerDesign.json
Resource
win10-20240404-en
Behavioral task
behavioral29
Sample
v2dc/design/CryptoStealerTableAddon.json
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
v2dc/design/DeleteAll_legacy.json
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
v2dc/design/FakeSteamWindowsControl.json
Resource
win10-20240404-en
Behavioral task
behavioral32
Sample
v2dc/design/FileGrabberTableAddon.json
Resource
win10-20240404-en
General
-
Target
v2dc/data/7zxa.dll
-
Size
155KB
-
MD5
786d4c74c05832a652be5c0a559be1e6
-
SHA1
56bc5cf0bef56565da871af9e10ac8c2302d2ad7
-
SHA256
d0680ac62e94f953df031533acd0acb718ad8494f938d84198c655507709e5df
-
SHA512
29cf07d3acceb716a2e9ec66434170ba7f15c5af3c843253d72be6f7bf1ab942a6e098a423beb33efb9fbf8bb6c967c34d4dedf65aca72984c6aa70c58e0eeb4
-
SSDEEP
3072:QwBYN3i204AHpzTjaLd4+OTpLcl28hpQplf4btKL6mCF:E3cp3jaLupLc3fclAKmJ
Malware Config
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 4044 3012 WerFault.exe 72 1872 3012 WerFault.exe 72 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4364 wrote to memory of 3012 4364 rundll32.exe 72 PID 4364 wrote to memory of 3012 4364 rundll32.exe 72 PID 4364 wrote to memory of 3012 4364 rundll32.exe 72
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\v2dc\data\7zxa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\v2dc\data\7zxa.dll,#12⤵PID:3012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 6163⤵
- Program crash
PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 6603⤵
- Program crash
PID:1872
-
-