Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-10-2024 11:36

General

  • Target

    https://github.com/sysrom/DcRatCHS/releases/download/NewRelease/Release.zip

Score
10/10

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Executes dropped EXE 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 52 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/sysrom/DcRatCHS/releases/download/NewRelease/Release.zip
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4168
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90bc646f8,0x7ff90bc64708,0x7ff90bc64718
      2⤵
        PID:936
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,13186850018487222937,1697725727478497797,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:2
        2⤵
          PID:5052
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,13186850018487222937,1697725727478497797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1792
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,13186850018487222937,1697725727478497797,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:8
          2⤵
            PID:3424
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13186850018487222937,1697725727478497797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
            2⤵
              PID:448
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13186850018487222937,1697725727478497797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1
              2⤵
                PID:1032
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,13186850018487222937,1697725727478497797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:8
                2⤵
                  PID:2348
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,13186850018487222937,1697725727478497797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4468
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13186850018487222937,1697725727478497797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:1
                  2⤵
                    PID:400
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13186850018487222937,1697725727478497797,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:1
                    2⤵
                      PID:4960
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13186850018487222937,1697725727478497797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:1
                      2⤵
                        PID:644
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13186850018487222937,1697725727478497797,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
                        2⤵
                          PID:3716
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2040,13186850018487222937,1697725727478497797,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5668 /prefetch:8
                          2⤵
                            PID:1020
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13186850018487222937,1697725727478497797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:1
                            2⤵
                              PID:2756
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2040,13186850018487222937,1697725727478497797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2296
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1020
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:2896
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:1112
                                • C:\Program Files\7-Zip\7zFM.exe
                                  "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Release.zip"
                                  1⤵
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:3764
                                • C:\Users\Admin\Desktop\DcRat.exe
                                  "C:\Users\Admin\Desktop\DcRat.exe"
                                  1⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:548
                                • C:\Windows\system32\wbem\WmiApSrv.exe
                                  C:\Windows\system32\wbem\WmiApSrv.exe
                                  1⤵
                                    PID:2880

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    d7cb450b1315c63b1d5d89d98ba22da5

                                    SHA1

                                    694005cd9e1a4c54e0b83d0598a8a0c089df1556

                                    SHA256

                                    38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031

                                    SHA512

                                    df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    37f660dd4b6ddf23bc37f5c823d1c33a

                                    SHA1

                                    1c35538aa307a3e09d15519df6ace99674ae428b

                                    SHA256

                                    4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                                    SHA512

                                    807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    265B

                                    MD5

                                    f5cd008cf465804d0e6f39a8d81f9a2d

                                    SHA1

                                    6b2907356472ed4a719e5675cc08969f30adc855

                                    SHA256

                                    fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d

                                    SHA512

                                    dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    3b04aadfa1cb1ed3127ac655f1e2b313

                                    SHA1

                                    d308a2920e6a917150972d2c11ada3ea8ffa50c7

                                    SHA256

                                    495856d466c9fee63b4670a22d57e3a2acd1ba8999b4c8087cc5f73b5baa517f

                                    SHA512

                                    ff4fa37127e9a64dd40855c7c9fb488fdd2d085f1de4ff65c55db59ce238ab035b2c40e78bd0c8a92f28a298a565345944850e79dda1489935ac0fd261b01685

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    ed4a2fbea340975cba5242fe9624f678

                                    SHA1

                                    100d0eea03ff4225e05913023875e833fac7d5f6

                                    SHA256

                                    153b235ea78c0a8138d5f0ef515431c0e739d6b3720a2a34eeb2abc9780cde33

                                    SHA512

                                    b5b99f43e4196dc076c6571130e646e261ad12fc65910964ab2dff2bd9c1e27c843a917ce4909294d3ad65b431c5d29fe3a61764a4b62c5322cf666f572af52a

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    7da13a8c45cb8a60816bb69a49584bec

                                    SHA1

                                    6270efb60109d44196203f8c4b287dcb178b4143

                                    SHA256

                                    423f0b493888ad5018ca456ccb302aa246b2ef233f00603280e8df71f9e40adc

                                    SHA512

                                    b044506d03db57874736ada1a0ae0b6817abdf3e09007153f1a46681123bc29338f05104b874b8b47a78fb6b71a09ab6d259e40fd19eeda63145443ee645e91e

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    b2fb194b83d6fd357de20d35c24a64fd

                                    SHA1

                                    1b0cff93fe928038f728b3702c76d14d511b97de

                                    SHA256

                                    01aa064f00482044effbbb55483c4428bdb309afb7b6905fc6e34ae671c12a23

                                    SHA512

                                    f993561e4bf5191b8c60815dcbc8f838124c5b8b0dce1d234387a4ec90a7c682f2ae7d584c4aef69bfea4ee111f7993aefdab3df71fc2d9e2e5719d26aab4945

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\c0ccbe38-df73-4ea9-9f26-05c8ace76a69.tmp

                                    Filesize

                                    10KB

                                    MD5

                                    1af49807fdedaf7b77508ddf2f49947f

                                    SHA1

                                    d2072ef0aac7fba6c6130d20fd6fd1865b604323

                                    SHA256

                                    a304a6c2ea99e56eb7639a7ad92d9e5442538922c893c06c6acd2308167d1352

                                    SHA512

                                    c1f693000f0a8141f333b5f20613aadd794e335c18197056f9d214b32ff3c3b0927c2a2c981c773ecec7c8295076cf6f47714044508a12b2bc2f6edea0318b56

                                  • C:\Users\Admin\Desktop\DcRat.exe

                                    Filesize

                                    12.7MB

                                    MD5

                                    0642fae5ad169ec381f8b84a03532b10

                                    SHA1

                                    355620b0f9ca6b21828006715a98a464b04b8b05

                                    SHA256

                                    3672396ff868c23f558b5fc5718ac77b7e7624dae2afbf74052753706e68cb8f

                                    SHA512

                                    15d65649609cc584893c942fac910dd9d3f00bb6b4892a6a347192a7941b673706bdfc74ad4a9aa2482f34258e017a9f48d33b52d95f8497e49c9e046911f506

                                  • C:\Users\Admin\Desktop\DcRat.exe.config

                                    Filesize

                                    5KB

                                    MD5

                                    045a2d1c7828244d1ab2352ff403d9c8

                                    SHA1

                                    107bba38dd9b6d4b3e4a3b75dd57850ddeb8f829

                                    SHA256

                                    55c972939575ef729e894a8a8c5b221e9be15c5714c476adf8b4745a2fbd2576

                                    SHA512

                                    dc0d8dda8c73b150d361cc97c5f09adc4375b278187906e87dc6923998d0541591ff063185dd25b6e6775bce4f8bf526db7b0cb6e416ceff312a60e9e7c33a72

                                  • C:\Users\Admin\Downloads\Unconfirmed 560263.crdownload

                                    Filesize

                                    8.7MB

                                    MD5

                                    2f05766f7eaf1aa0fa5f2fdd8a05f609

                                    SHA1

                                    be09c496e1e8260d9c82f122e48051eb084b0136

                                    SHA256

                                    064033e22b906a36951ab7f5d30d11f8d4c147e6ccaab62c9888f89114dc640d

                                    SHA512

                                    d95dfcf7c7758cdfaa7a07860bddc5dc9c24664ea6e89a3a5679f983e3f1d2cf8e674ac70403dbd81db000de488f3d0131a237a33b6533764c523d77cd842b86

                                  • \??\pipe\LOCAL\crashpad_4168_IIXCVETNCBFWPPVD

                                    MD5

                                    d41d8cd98f00b204e9800998ecf8427e

                                    SHA1

                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                    SHA256

                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                    SHA512

                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                  • memory/548-173-0x000001FA4DEE0000-0x000001FA4EB8E000-memory.dmp

                                    Filesize

                                    12.7MB

                                  • memory/548-175-0x000001FA69CB0000-0x000001FA69CBA000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/548-176-0x000001FA69C60000-0x000001FA69C72000-memory.dmp

                                    Filesize

                                    72KB