Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 21:00
Behavioral task
behavioral1
Sample
svhost.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
svhost.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
svhost.exe
Resource
win11-20241007-en
General
-
Target
svhost.exe
-
Size
1.2MB
-
MD5
754dceb944cf505a0957e70370a972ef
-
SHA1
c16e4782f0f2f868deff74d4bc76b528162f1fcc
-
SHA256
2a9851860e7d245eadc3004f986afc3cec8c7bf2fc967fdfbca1e0a96b864efa
-
SHA512
ad1ace193fdc6ba8dba7c11dacc9afc5420efd7dc45a0994bec8d12952e806488b3156b8ec346e6f13b7f66e9b0890e65791eecb1ed574383ca73ed5ab2a4568
-
SSDEEP
12288:3F81ciMbLepD06qWmVoos41xTTnKYli3CaKyA/Ds5iE1kxuZcsWBYQ/7o+No9eLd:uciMa06q2YpE2yA/DFPxuBWBZCA
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Processes:
resource yara_rule behavioral2/memory/3428-1-0x00000000006B0000-0x00000000007EA000-memory.dmp dcrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svhost.exedescription pid process Token: SeDebugPrivilege 3428 svhost.exe