Analysis
-
max time kernel
94s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 21:50
Behavioral task
behavioral1
Sample
hjgesadfseawd.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
hjgesadfseawd.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
hjgesadfseawd.exe
-
Size
889KB
-
MD5
ef75329efa1fa3cff64a2249e8b59306
-
SHA1
90db5c089347c52e7aeddbe97a652b0dc622b840
-
SHA256
6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259
-
SHA512
73cf385ce56147f4c7862ef90cda59c947408dc0bf82c9d0c4b503bb53266d62763c79759235ee20e07b6e36cb50c123facab185d099e397daf0574eb586302f
-
SSDEEP
12288:kzw1NV5Il51mx6vEiss/VRqyAk9wiXPrQfkXmm1RhdLB9XirkVknCBz9eQFZz//q:kc8Xh/VAyAksEPLZj9H6t1
Score
10/10
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1544-1-0x0000000000930000-0x0000000000A14000-memory.dmp family_dcrat_v2 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
hjgesadfseawd.exepid Process 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe 1544 hjgesadfseawd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
hjgesadfseawd.exedescription pid Process Token: SeDebugPrivilege 1544 hjgesadfseawd.exe