Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2024 11:16

General

  • Target

    f7303df63303ee53c9d1a951949da53ddfe6cb4fac429be190a5515759e7b5a7N.exe

  • Size

    2.0MB

  • MD5

    71d2a565cd28e6bc1cea51310646c780

  • SHA1

    4a62dc8e751e52bb2a629398017fbc3bad516bba

  • SHA256

    f7303df63303ee53c9d1a951949da53ddfe6cb4fac429be190a5515759e7b5a7

  • SHA512

    e94df7552840bf72bb69bfa805bdbfb7aaac9a4de3cfa4fc2a6d0fd3aab286bb46db4e39fc2d30df06bd2f565ff8cea491b0530419b355bbe41c24bac7785daa

  • SSDEEP

    24576:YOZGGptV5fRWyXchC98blumyLeUQUoJr3GBTSowqmGU12/Dje+qAcNZxOe2hc5cJ:YOZRptV5AbySUQUKzwLa1GG5AcNyN

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7303df63303ee53c9d1a951949da53ddfe6cb4fac429be190a5515759e7b5a7N.exe
    "C:\Users\Admin\AppData\Local\Temp\f7303df63303ee53c9d1a951949da53ddfe6cb4fac429be190a5515759e7b5a7N.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3212

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3212-0-0x00007FFDBCE03000-0x00007FFDBCE05000-memory.dmp

    Filesize

    8KB

  • memory/3212-1-0x0000000000C80000-0x0000000000E8A000-memory.dmp

    Filesize

    2.0MB

  • memory/3212-2-0x00007FFDBCE00000-0x00007FFDBD8C1000-memory.dmp

    Filesize

    10.8MB

  • memory/3212-3-0x000000001B980000-0x000000001B98E000-memory.dmp

    Filesize

    56KB

  • memory/3212-4-0x000000001B990000-0x000000001B99E000-memory.dmp

    Filesize

    56KB

  • memory/3212-6-0x00007FFDBCE00000-0x00007FFDBD8C1000-memory.dmp

    Filesize

    10.8MB