Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 21:59
Behavioral task
behavioral1
Sample
70fedb45901cb9c54a6a12ee4906f71f4a353979093e8986f6c563a625cba195N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
70fedb45901cb9c54a6a12ee4906f71f4a353979093e8986f6c563a625cba195N.exe
Resource
win10v2004-20241007-en
General
-
Target
70fedb45901cb9c54a6a12ee4906f71f4a353979093e8986f6c563a625cba195N.exe
-
Size
1.2MB
-
MD5
9fe788a1f60102a3fce1e5b5ec4189f0
-
SHA1
8d8a3da5bd25096bd450ff057f036d1aa18f6850
-
SHA256
70fedb45901cb9c54a6a12ee4906f71f4a353979093e8986f6c563a625cba195
-
SHA512
370b02c90574e4a19389d5f37c546afa5481479ab57bfe5ffe72c8efdc9f361fddb3c8f011c916f676cb0dc5f3c6e243de047e215126efe1c43a08b2d2bd73ef
-
SSDEEP
24576:FXjf6WYaN4kHhE5w0e1OKQREvixjVJAU9z0DTaBcvsgr3hoVnUOy:pxaG1OZEvixjVJAU9z0zsggf
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
resource yara_rule behavioral1/memory/3024-1-0x0000000001080000-0x00000000011C4000-memory.dmp dcrat -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2672 3024 70fedb45901cb9c54a6a12ee4906f71f4a353979093e8986f6c563a625cba195N.exe 31 PID 3024 wrote to memory of 2672 3024 70fedb45901cb9c54a6a12ee4906f71f4a353979093e8986f6c563a625cba195N.exe 31 PID 3024 wrote to memory of 2672 3024 70fedb45901cb9c54a6a12ee4906f71f4a353979093e8986f6c563a625cba195N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\70fedb45901cb9c54a6a12ee4906f71f4a353979093e8986f6c563a625cba195N.exe"C:\Users\Admin\AppData\Local\Temp\70fedb45901cb9c54a6a12ee4906f71f4a353979093e8986f6c563a625cba195N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3024 -s 6402⤵PID:2672
-