Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 21:23
Behavioral task
behavioral1
Sample
adjthjawdth.exe
Resource
win7-20240708-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
adjthjawdth.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
adjthjawdth.exe
-
Size
888KB
-
MD5
28aaa8f0b29a96138fd597975a16c5d4
-
SHA1
b0ea5394610d089ab5248631a4c0f6666f79ffcd
-
SHA256
2516d63aa8aef58d6f0a4e330bd87209872b0ff21a17cff5201a2d4783c5bfab
-
SHA512
7feafb633d698a96d81fae7069ebc2492caa253ade2106a645353096e7855e9cf33a69307f71f253ebbb5b957abab0de608860cc5efb7a2196720c269f8c231d
-
SSDEEP
12288:wAl1WPQtkQNQ6yMs/Ua+iXPrQfkXmm1RhdLB9XirkVknCBz9eQFZz//qK4oV4g50:wwFp5yMs/UFEPLZj956t1
Score
10/10
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3508-1-0x0000000000A80000-0x0000000000B64000-memory.dmp family_dcrat_v2 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
adjthjawdth.exepid Process 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe 3508 adjthjawdth.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
adjthjawdth.exedescription pid Process Token: SeDebugPrivilege 3508 adjthjawdth.exe