Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 21:34

General

  • Target

    b86f74d1f73a0f234843f87294835ea2f1df07760ffe1a9e8b8e9b61e088562aN.exe

  • Size

    2.0MB

  • MD5

    5f83951d810b486c36ca171cecf142d0

  • SHA1

    dcb30b6d18fb8810882ff1d0ed2b61a8e70e5ed5

  • SHA256

    b86f74d1f73a0f234843f87294835ea2f1df07760ffe1a9e8b8e9b61e088562a

  • SHA512

    6c43abca1259de6a2eca5d41d5aff78c4435f57e23547002dbea6fd8caf0d206fd8ff386354392a7530cd7a196108a1c8bb5b522307b7a3f94154b39f0499b87

  • SSDEEP

    24576:YOZGGptV5fRWyXchC98blumyLeUQUoJr3GBTSowqmGU12/Dje+qAcNZxOe2hc5cJ:YOZRptV5AbySUQUKzwLa1GG5AcNyN

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b86f74d1f73a0f234843f87294835ea2f1df07760ffe1a9e8b8e9b61e088562aN.exe
    "C:\Users\Admin\AppData\Local\Temp\b86f74d1f73a0f234843f87294835ea2f1df07760ffe1a9e8b8e9b61e088562aN.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4376

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4376-0-0x00007FFEF6563000-0x00007FFEF6565000-memory.dmp

    Filesize

    8KB

  • memory/4376-1-0x0000000000CD0000-0x0000000000EDA000-memory.dmp

    Filesize

    2.0MB

  • memory/4376-2-0x00007FFEF6560000-0x00007FFEF7021000-memory.dmp

    Filesize

    10.8MB

  • memory/4376-3-0x0000000002FB0000-0x0000000002FBE000-memory.dmp

    Filesize

    56KB

  • memory/4376-4-0x0000000002FC0000-0x0000000002FCE000-memory.dmp

    Filesize

    56KB

  • memory/4376-6-0x00007FFEF6560000-0x00007FFEF7021000-memory.dmp

    Filesize

    10.8MB