Overview
overview
10Static
static
10Release/DcRat.exe
windows7-x64
10Release/DcRat.exe
windows10-2004-x64
10Release/Pl...io.dll
windows7-x64
1Release/Pl...io.dll
windows10-2004-x64
1Release/Pl...at.dll
windows7-x64
1Release/Pl...at.dll
windows10-2004-x64
1Release/Pl...ra.dll
windows7-x64
1Release/Pl...ra.dll
windows10-2004-x64
1Release/Pl...er.dll
windows7-x64
1Release/Pl...er.dll
windows10-2004-x64
1Release/Pl...er.dll
windows7-x64
1Release/Pl...er.dll
windows10-2004-x64
1Release/Pl...un.dll
windows7-x64
1Release/Pl...un.dll
windows10-2004-x64
1Release/Pl...on.dll
windows7-x64
1Release/Pl...on.dll
windows10-2004-x64
1Release/Pl...er.exe
windows7-x64
1Release/Pl...er.exe
windows10-2004-x64
1Release/Pl...er.dll
windows7-x64
1Release/Pl...er.dll
windows10-2004-x64
1Release/Pl...us.dll
windows7-x64
1Release/Pl...us.dll
windows10-2004-x64
1Release/Pl...at.dll
windows7-x64
1Release/Pl...at.dll
windows10-2004-x64
1Release/Pl...ns.dll
windows7-x64
1Release/Pl...ns.dll
windows10-2004-x64
1Release/Pl...er.dll
windows7-x64
1Release/Pl...er.dll
windows10-2004-x64
1Release/Pl...re.dll
windows7-x64
1Release/Pl...re.dll
windows10-2004-x64
1Release/Pl...ry.dll
windows7-x64
1Release/Pl...ry.dll
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 02:58
Behavioral task
behavioral1
Sample
Release/DcRat.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Release/DcRat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Release/Plugins/Audio.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Release/Plugins/Audio.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Release/Plugins/Chat.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Release/Plugins/Chat.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Release/Plugins/Extra.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
Release/Plugins/Extra.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Release/Plugins/FileManager.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Release/Plugins/FileManager.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Release/Plugins/FileSearcher.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Release/Plugins/FileSearcher.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Release/Plugins/Fun.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Release/Plugins/Fun.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Release/Plugins/Information.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Release/Plugins/Information.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Release/Plugins/Keylogger.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Release/Plugins/Keylogger.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Release/Plugins/Logger.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Release/Plugins/Logger.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Release/Plugins/Miscellaneous.dll
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
Release/Plugins/Miscellaneous.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Release/Plugins/Netstat.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Release/Plugins/Netstat.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Release/Plugins/Options.dll
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
Release/Plugins/Options.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Release/Plugins/ProcessManager.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Release/Plugins/ProcessManager.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Release/Plugins/Ransomware.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Release/Plugins/Ransomware.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Release/Plugins/Recovery.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Release/Plugins/Recovery.dll
Resource
win10v2004-20241007-en
General
-
Target
Release/DcRat.exe
-
Size
12.3MB
-
MD5
7fce411ea2b74f227489659113960b18
-
SHA1
543d95b74193a188fe273ce7b065aa177405beb5
-
SHA256
c73b1ffa39c5843b2ed951ac48350d1deb33db4057341f1dab1ee64ea1a62248
-
SHA512
42de7bc4a0b47e1053ff3ff52a3f887e56759f81cfa691996a533d769e80f98b3e8dcf869785fce801d9cc7a2bc3d675e2eb832b520846b053d6b07093be2678
-
SSDEEP
196608:XtfZFB2gaNIsNNNNKmvN8rNNNNNNNNNNHbL7aIXM1B7Z0/3G6tULs8wR:XlT81Bd+3G6
Malware Config
Extracted
asyncrat
1.0.7
Default
DcRatMutex_qwqdanchun
-
c2_url_file
https://Pastebin.com/raw/fevFJe98
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 3 IoCs
Processes:
resource yara_rule behavioral1/files/0x0005000000019c74-53.dat family_asyncrat behavioral1/files/0x0005000000019c74-91.dat family_asyncrat behavioral1/files/0x0006000000019c76-112.dat family_asyncrat -
Executes dropped EXE 3 IoCs
Processes:
Client.exeClient.exeClient.exepid Process 840 Client.exe 1864 Client.exe 1952 Client.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Drops file in Windows directory 2 IoCs
Processes:
DcRat.exedescription ioc Process File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe DcRat.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe DcRat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
Processes:
DcRat.exedescription ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 DcRat.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" DcRat.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c0031000000000023591a2f100041646d696e00380008000400efbe2359ac2923591a2f2a00000030000000000004000000000000000000000000000000410064006d0069006e00000014000000 DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 52003100000000002359ac29122041707044617461003c0008000400efbe2359ac292359ac292a000000eb0100000000020000000000000000000000000000004100700070004400610074006100000016000000 DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 DcRat.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 DcRat.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 74003100000000002359ac291100557365727300600008000400efbeee3a851a2359ac292a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell DcRat.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" DcRat.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlot = "2" DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots DcRat.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff DcRat.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" DcRat.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" DcRat.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 DcRat.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 DcRat.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" DcRat.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4a0031000000000067595517102054656d700000360008000400efbe2359ac29675955172a000000ff010000000002000000000000000000000000000000540065006d007000000014000000 DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags DcRat.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 DcRat.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = 520031000000000067595817102052656c65617365003c0008000400efbe67595517675958172a00000063860100000017000000000000000000000000000000520065006c006500610073006500000016000000 DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0c00000050000000a66a63283d95d211b5d600c04fd918d00b0000007800000030f125b7ef471a10a5f102608c9eebac0e00000078000000 DcRat.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" DcRat.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 4c003100000000006759581710204c6f63616c00380008000400efbe2359ac29675958172a000000fe0100000000020000000000000000000000000000004c006f00630061006c00000014000000 DcRat.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" DcRat.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" DcRat.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" DcRat.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "48" DcRat.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell DcRat.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} DcRat.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
DcRat.exepid Process 2072 DcRat.exe 2072 DcRat.exe 2072 DcRat.exe 2072 DcRat.exe 2072 DcRat.exe 2072 DcRat.exe 2072 DcRat.exe 2072 DcRat.exe 2072 DcRat.exe 2072 DcRat.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
DcRat.exepid Process 2072 DcRat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
DcRat.exeClient.exedescription pid Process Token: SeDebugPrivilege 2072 DcRat.exe Token: SeDebugPrivilege 840 Client.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
DcRat.exepid Process 2072 DcRat.exe 2072 DcRat.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
DcRat.exepid Process 2072 DcRat.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
DcRat.exepid Process 2072 DcRat.exe 2072 DcRat.exe 2072 DcRat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Release\DcRat.exe"C:\Users\Admin\AppData\Local\Temp\Release\DcRat.exe"1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2072
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1796
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:840
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵
- Executes dropped EXE
PID:1864
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵
- Executes dropped EXE
PID:1952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Server\DcRat.exe_Url_0xi2najjma3q33cy3liy1lyphmot3lyd\1.0.7.0\gx4ylfga.newcfg
Filesize585B
MD5d33502309781171038abe74a9d25fe4e
SHA1978477fccabaa7edfbd55e54202d4ceb916f6c6c
SHA256a2a5e43f2f583a212d182ead278e52d08dd0fc89bca22e02dc283ce1f8cb7d81
SHA512e37712e379b9c3bc6b8bd427f9c456369ee65e0a98b82002117336fb7bb392f15ca0f8f4690fdbff0438146804c2a77099a4b4677a711e41aa2599381a03dfc7
-
C:\Users\Admin\AppData\Local\Server\DcRat.exe_Url_0xi2najjma3q33cy3liy1lyphmot3lyd\1.0.7.0\user.config
Filesize309B
MD50c6e4f57ebaba0cc4acfc8bb65c589f8
SHA18c021c2371b87f2570d226b419c64c3102b8d434
SHA256a9539ba4eae9035b2ff715f0e755aa772b499d72ccab23af2bf5a2dc2bcfa41c
SHA512c6b877ff887d029e29bf35f53006b8c84704f73b74c616bf97696d06c6ef237dff85269bdf8dfb432457b031dd52410e2b883fd86c3f54b09f0a072a689a08c0
-
C:\Users\Admin\AppData\Local\Server\DcRat.exe_Url_0xi2najjma3q33cy3liy1lyphmot3lyd\1.0.7.0\user.config
Filesize586B
MD50bf93f584275ab33f1f4b6fb52f51ec9
SHA1902549af26744c6bfe6805727d490e15a74186e7
SHA256caee138f4c2c9bd33fcb37fb510640496bb8af855e75613aaebd2fad62f9b745
SHA5122b10fa3d9ca83b99facfae7d3e4f3c60bf7ee10a944d5b66b58f0628aee64bc38e07c032e8eb9b55789fd23480b50885024426f5139393281bf79db5d87d9c22
-
Filesize
47KB
MD51c50598d545ea58d0c62d833c9d34954
SHA14723fcf39ff4e95b6f77456ad80aee7e658eec71
SHA2564ea310fdfaecace36726c2d78ec7856ad54d24c72ca4c790555dd8b83d189428
SHA512a376247fd6b5c95b8e7780b44032996ad485fcec0834eed1427a174a38d40b3ef544c64760efb352e1b25c64e3287995999d900c215b15b5b588b4be729a2c04
-
Filesize
47KB
MD55948c1d53160246a2b8e54c424c96e50
SHA10b57b6e570311dbef4d89e96d38b4c88500e1891
SHA256d49f87f6e79a64d17f5ae4b64643883477aee8cddeba92a19a89cfafa6a6db10
SHA512ce1e57336f17f3a9bea26aa34f27a79a300f052c328424b80a33c07f28e90c361077c8da77f4c517df38d0d3373b7a6c9adc2c3b708e7bbb4f8874819750720b
-
Filesize
1KB
MD58360967653fc39253c066f6735106f00
SHA14677c7c50ddedcda1e828c5db1fcd55a440b95cc
SHA256b12befa0c4c46edacec05e8a9d19a7624cb366c1e8da8d2aeb6c02cd5f27ea05
SHA5127d1eb3da380954c33872b4b35f8fd36f7634e3a2bcff82be846a31b03d88cb7209c531c82290384716b1b4a95cd89c145765d8aa18136186033c281cf92f8e5b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1846800975-3917212583-2893086201-1000\97f7a763e504579efb23c3d920b8c0a1_f9da27c9-c625-43c3-9b3a-b1344b01e128
Filesize1KB
MD539d4866448114d76ca84a449d3df2ec9
SHA1d1556a43f4a481837fc78b3b82446eafa0653585
SHA256c73e0b72dac3b00f4f64a87c506e2de34b55848ff51828bb6add28d5124ed3ae
SHA512ef60c04ffef7301750d11380bda33a20d11dcbc8a53dc073885a8b88c0015d866f84c5205992287cc90f1263fadb9334f75e46a4b3bab3e206d36803bdfda892
-
Filesize
47KB
MD5ec6e0cf30838de6891cbd634493704c9
SHA1a2c789e57cd8f460e9f23e2bf9bf55c320b9f1e8
SHA25649ee7559547911e9df5c694d31318126dbfc2b86229dbf2f22b301dfd7de7fd0
SHA512e0df6f667d97ebed351209b0b6d5eb112e3fe97655ce4af5d301a9b00e9c1507bdb9489c61bfac166b89d05cd171ac8cba2307d21eaf2f8f9f561c8e51895dc7