Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 21:04
Behavioral task
behavioral1
Sample
svhost.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
svhost.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
svhost.exe
-
Size
1.2MB
-
MD5
754dceb944cf505a0957e70370a972ef
-
SHA1
c16e4782f0f2f868deff74d4bc76b528162f1fcc
-
SHA256
2a9851860e7d245eadc3004f986afc3cec8c7bf2fc967fdfbca1e0a96b864efa
-
SHA512
ad1ace193fdc6ba8dba7c11dacc9afc5420efd7dc45a0994bec8d12952e806488b3156b8ec346e6f13b7f66e9b0890e65791eecb1ed574383ca73ed5ab2a4568
-
SSDEEP
12288:3F81ciMbLepD06qWmVoos41xTTnKYli3CaKyA/Ds5iE1kxuZcsWBYQ/7o+No9eLd:uciMa06q2YpE2yA/DFPxuBWBZCA
Score
10/10
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Processes:
resource yara_rule behavioral1/memory/2100-1-0x0000000000180000-0x00000000002BA000-memory.dmp dcrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svhost.exedescription pid process Token: SeDebugPrivilege 2100 svhost.exe