Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 02:30
Behavioral task
behavioral1
Sample
6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe
Resource
win10v2004-20241007-en
General
-
Target
6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe
-
Size
889KB
-
MD5
ef75329efa1fa3cff64a2249e8b59306
-
SHA1
90db5c089347c52e7aeddbe97a652b0dc622b840
-
SHA256
6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259
-
SHA512
73cf385ce56147f4c7862ef90cda59c947408dc0bf82c9d0c4b503bb53266d62763c79759235ee20e07b6e36cb50c123facab185d099e397daf0574eb586302f
-
SSDEEP
12288:kzw1NV5Il51mx6vEiss/VRqyAk9wiXPrQfkXmm1RhdLB9XirkVknCBz9eQFZz//q:kc8Xh/VAyAksEPLZj9H6t1
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 1 IoCs
resource yara_rule behavioral1/memory/2296-1-0x0000000000030000-0x0000000000114000-memory.dmp family_dcrat_v2 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2296 6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe"C:\Users\Admin\AppData\Local\Temp\6024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296