Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:43
Behavioral task
behavioral1
Sample
fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe
Resource
win7-20240708-en
General
-
Target
fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe
-
Size
736KB
-
MD5
8dd93bb163b1658947ad6c63b79ad36f
-
SHA1
1d0ac0d640c7fcdf5f8641b8598777a42b9fecff
-
SHA256
fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c
-
SHA512
62956e65d74fc82c053314e6c9d2bde8efd036b0be8f5591161bde951eb7bc346b195e59289ebd466c18e7c0227619d6bd5b0314e7ed3d7415beaae03d3d5670
-
SSDEEP
12288:kATnF3pDw8Ji1OGaNeqALaJJMA+UiXPrQfkXmm1RhdLB9XGbHJnZ6:kATngKqqALEJMA+yEqX6
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
DCRat payload 1 IoCs
resource yara_rule behavioral2/memory/3964-1-0x0000000000370000-0x000000000042E000-memory.dmp family_dcrat_v2 -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3964 fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe"C:\Users\Admin\AppData\Local\Temp\fb4256038010fac2182f060deffaa1ffe0ce66f55ad4ed328e30465522f9c79c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3964