Analysis

  • max time kernel
    316s
  • max time network
    320s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2024 21:53

General

  • Target

    Release/DcRat.exe.xml

  • Size

    5KB

  • MD5

    f8806ec6bcfeda3bfaab9821506ef15c

  • SHA1

    ede84267e6df98f8c60ecdb72a1546013cb4ba3b

  • SHA256

    dc698c4a2c1b33a2e449f4f4c8ef6058c325b4125584a70b71efde05715b78e7

  • SHA512

    2617bd0917f5de770c06adec6484ffd2b34406e6708c67929192531bd95eed9e216825909f610573dd6bbef64870c6a7c5801d9d201c0d98010fc634b8f28477

  • SSDEEP

    96:ur71Y7KO7KTrO0BGiv4273I2TpV6RVIAIUAv0np9V0BGivi4273I2TpV6RUGoKSX:ur7S7x7kralLI2GoKS/pv7sJ+J/qJvS

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Release\DcRat.exe.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4fead24ce8f8b2db6556df98922239c

    SHA1

    199539782a5afe738a0b4c8c714fa786d72ff5f8

    SHA256

    ef2a8c6d6639654edd70960392cf25a9e0b7fa652b1320c68b459ab255136fbe

    SHA512

    26bf73371b88b8dcda1b8a59ea95bab9bd58fc421af8b4ce93e71a2c9721cd212bd3a18c5f3118e09cbe59fd84f08535b3ce62aaadd6fb37c6a5c49d998c0579

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58607df379e8adfaa59129051e143e22

    SHA1

    d557d6957f75980c1260542dc7af38d98325b40d

    SHA256

    e7bd768b0b048d3ce13e9d4761021fcb9521413df800cf0b7941cdbbd7619e22

    SHA512

    81c062c1cc024b48dc8f6e1734d5b054cf9fbfa3f8008973da1bff3a5e5cb7e82ec55629889ed027249b70192c0c867cd8e4e81962fe94578da11ad0ec8db0e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    595ea14b21aaf26ed8ea09fdf81e6e19

    SHA1

    9345e3ab578546129d93a4ae6ec41f4768be94a8

    SHA256

    d5bc6bc3297b76c8c54f0b5597f08d13506db6a9d4ac21ffab69b152f7c28d47

    SHA512

    8962dcf7a93b4d85fffdea2286dcae9b91a6d4299f5be25888cb1383ec26b17e90ddde604398c49adcbf1d066d00168e00d1b927f3361a9d516b76ee052e2a53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8f86407fcf46af6c8439173e7cbfc77

    SHA1

    06b624cdf80d03559699cd9158947c583c04285b

    SHA256

    e959490a78ef87b52b0d780630d0b8767ab5ea49de2e15f85a63eff12ece79c0

    SHA512

    3961cf885bb86fa12486aaf8245afe8caed41f318464a9c0432069119705aebd0aaee904e4a7e70ee6db9b152ed34e77e001ba7d8cfe51ac805fd774f73cc736

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bea11e53bef58ed360c010beed800479

    SHA1

    ff7f95345a3c876d298b4267eae05e1554c84c09

    SHA256

    fe55f95b88fb60d9c46a404753a9e86a2d31271f1d99a0ab2954a5b488726af3

    SHA512

    74c4685706ecbc0f6cb2b0bd17dcdcd3f148e5e0bf5b333052557a459243beeeeb553e20f40162a30e6ec9b9f3039924f572ffdbde3e80122d26db721f11a734

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a542cbb3501ab466e18254b83521c38d

    SHA1

    81fb3b3aaffc320fc9a0eb9202fd474c8c619fa1

    SHA256

    0cc53362c53801b71f12afa3883532b55aa58ccd622794cd6805cc97ad201008

    SHA512

    7d9e275b3aaa6cad940e8a0c7a99e53a4684769d62a5e36f51b78e73e69ff8256197423980f07bb6469e1ed5183ac69b1d78806c5d1b2cd650e397cc9101d65d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    786f432d9ce097c99caae6beab8447e7

    SHA1

    3db84c125ddd9f2de06430d6bcc822825756cdef

    SHA256

    85f9c40c54d9dc2279e558d253b308d4f4f59991f27cf15549f75d6992cfbf29

    SHA512

    911e9e9bf703b41cdb4adbd9ff15acd3d5c8bcceafbe49af601553516e7d90cfcaa8dcded8868dcdf366ab0e4b2f53e9cb42e34468c3658582507bb75af9b3af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    262bcf27295ecdc690e48dabc588eaa6

    SHA1

    bff48684026e2bbdf06aef0f8e0338f99dc98be8

    SHA256

    481488092a9ba2dfaf40dad560d3ec8b455420f9fd0b6418bcb787045f34561e

    SHA512

    e5f3b72022b96658a30e2887c3b613c52a01cc462cd2896ed71a1303a9880f52b0e6dfa8938049ef8deb71c2c1f5c838d1f54e0d1e378f5c8b6fc17b126b8774

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0a861204d314239fd0a9098a6a0d2d9

    SHA1

    90c2cb834cc96dbf5f3f2d5c838a2d641d598dfc

    SHA256

    b56152f65b257cb2b53e8b957a0ae41a7fd8a07c5ada16f1989eaa806fa3e14b

    SHA512

    878308d2169f4db4ee2422e803c7fbdc554ee7f82f27539e15eb3cdbed8e69d73c01463ee967968bb06fba8b7143723faa5504d2ef70b053bcdb55fdec2b66d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fba03cc928fbc0652be302a1cb484c9a

    SHA1

    e6b11d34c27ef1e3f313ec2ef2e120c198dc38b0

    SHA256

    2a49cfd4003829a73e66c63d9b34d083023a96deb3ed0d6ee4857f31edde0765

    SHA512

    f7aba9dd2b266a9d7037cbcd075d2adde2704e24b2895c85bb26a3f3ae2def7d08ffbc8f9fa803c91d906e2c3d637ec5bc75338a065216033dde268322013d91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc763c21dec65ee037845c7d7941ad0b

    SHA1

    75e520a4eeaed599213891813b497711424ed765

    SHA256

    1ec6aae2f29ca5e2c7d7386e33a8db8ef40184a63aa88a41c952207e43cb07d9

    SHA512

    d6f4a0edbb008447ae60f627cf999478077e17e006bd95a953615491173153b1e86cf50a0adf73055a6efbac25d15a99994643655bdd07f189b921f98597df3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94b612f42c8430156358f5b69354333f

    SHA1

    170105d425962cd4f9570ac1f648186aee770143

    SHA256

    07c650e09ad420e4c45bc35e8a17d13786554bf2a480f1d2a36a5a1386e3a870

    SHA512

    8c181d94d4d53ff5f80e4f72a97bf23a4efc3ea3792a482ca6ca39a8e72c4eba9ed85e97517296befda758f266774aaf1cc242cf299fcd9ebfd6ed35e8d4deba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5030c7768b537165e7b6603be5aad3ec

    SHA1

    e1c3d93d355deffa45e8eb6e1004e20023424398

    SHA256

    20761b1de688a9a28d3bab6d41cb844d254eb87b1107e9b6310cb82bf634108d

    SHA512

    96c709d16689f6ba4740c94c1663999a7c6ce43e976e02d4d98f29167420b44ede95b3c4652ade0a8670454c022de685717ebaaf33f5a0c0208502d16752054f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a13fb1a3557b1377da57caacc948302f

    SHA1

    d0cf58efae33d359bb8140e1b7e12066e1aaa2e2

    SHA256

    7668a9cefa2293c321fd3ab992ed577eae59cb17ae3a5d1a6a8354b8fcf7e278

    SHA512

    4ef1b9b3d568aa8b082489bcf93245ade6a0d248b172dde018026ce2278139ba84477ed806e2644c4ce814d841bee08ee9632d5ed0c2ad4e18451d30eac8ead9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d865003b09a91a8856c60af14f4be1a

    SHA1

    d2019ed5a54c2a8a329297d6c6dda1a8a97b523b

    SHA256

    06eea19ed14f44a84255b6f256baeb5ead3be9f288c6022a4d6a889754067db4

    SHA512

    d1c1b20b3f64fe022ca804ece1b8fac0010a55d8dad757a7ca3321ada103b76de6b864b3090018d8345525c64707ae0ddb6f9ab2fd1f418be83153318e9b9479

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86d48b1b9c3e88148cef468ae8d065c9

    SHA1

    6863d0348aae45b5f3cb4b7902b8e762804c2615

    SHA256

    a650fb5473995f357a2502ef8d1758a608451b9e25a3e620329ad9d89e31606e

    SHA512

    52fc1323139d18b1bdb0f17aa6cbab6b33fa23b9d7e86f0c93ead899e9ab6f2764475faca02dacce9b283703646510ec6c32df714e5c5cb76c0cb51b641b584a

  • C:\Users\Admin\AppData\Local\Temp\CabC776.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC825.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b