Resubmissions

07-12-2024 15:44

241207-s6ya4a1qcl 10

07-12-2024 15:22

241207-ssdpja1pam 10

07-12-2024 15:21

241207-srns4swmhw 10

Analysis

  • max time kernel
    97s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2024 15:44

General

  • Target

    Discord.exe

  • Size

    1.6MB

  • MD5

    202a94b566ed1c4e1445086ed56f0f3b

  • SHA1

    0bbabc9905ba952288b1fe1a0edba6dba200734d

  • SHA256

    d3e61c42225ddfa5698b6573920261e106becc4937f7b390c925cfbb926e31b8

  • SHA512

    a13e60b6541b0feace92a76f444fa8772c51a16abeaaa7a149d1f960e368b1e5510925f1571375f29c4529d832c4009c7ba8c5a205a6c1689fd87953af3eeded

  • SSDEEP

    24576:bcl8Pbml8yHSSbrJ4N5Zj11rkbLatxG0PlNG4J5cY+EfOdokIubMvp4:bC8eG11AitHlNGw5x+Eflkw

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Discord.exe
    "C:\Users\Admin\AppData\Local\Temp\Discord.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1448
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4032
    • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
      "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb edit "C:\Recovery\WindowsRE\ReAgent.xml"
      1⤵
        PID:2988
      • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
        "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb edit "C:\Users\Admin\Desktop\ReAgent.xml"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:3232
        • C:\Program Files\Windows NT\Accessories\WORDPAD.EXE
          "C:\Program Files\Windows NT\Accessories\WORDPAD.EXE" "C:\Users\Admin\Desktop\ReAgent.xml"
          2⤵
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          PID:4708
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
        1⤵
          PID:3456

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1448-0-0x00007FFDC0AB3000-0x00007FFDC0AB5000-memory.dmp

          Filesize

          8KB

        • memory/1448-1-0x0000000000840000-0x00000000009E8000-memory.dmp

          Filesize

          1.7MB

        • memory/1448-2-0x00007FFDC0AB0000-0x00007FFDC1571000-memory.dmp

          Filesize

          10.8MB

        • memory/1448-3-0x000000001B4E0000-0x000000001B4EE000-memory.dmp

          Filesize

          56KB

        • memory/1448-5-0x00007FFDC0AB0000-0x00007FFDC1571000-memory.dmp

          Filesize

          10.8MB

        • memory/2988-6-0x00007FFD9EBD0000-0x00007FFD9EBE0000-memory.dmp

          Filesize

          64KB

        • memory/2988-7-0x00007FFDDEBED000-0x00007FFDDEBEE000-memory.dmp

          Filesize

          4KB

        • memory/2988-8-0x00007FFDDEB50000-0x00007FFDDED45000-memory.dmp

          Filesize

          2.0MB

        • memory/2988-9-0x00007FFDDEB50000-0x00007FFDDED45000-memory.dmp

          Filesize

          2.0MB

        • memory/3232-10-0x00007FFD9EBD0000-0x00007FFD9EBE0000-memory.dmp

          Filesize

          64KB

        • memory/3232-12-0x00007FFD9EBD0000-0x00007FFD9EBE0000-memory.dmp

          Filesize

          64KB

        • memory/3232-11-0x00007FFD9EBD0000-0x00007FFD9EBE0000-memory.dmp

          Filesize

          64KB

        • memory/3232-14-0x00007FFDDEB50000-0x00007FFDDED45000-memory.dmp

          Filesize

          2.0MB

        • memory/3232-15-0x00007FFDDEB50000-0x00007FFDDED45000-memory.dmp

          Filesize

          2.0MB

        • memory/3232-13-0x00007FFD9EBD0000-0x00007FFD9EBE0000-memory.dmp

          Filesize

          64KB

        • memory/3232-16-0x00007FFD9EBD0000-0x00007FFD9EBE0000-memory.dmp

          Filesize

          64KB

        • memory/3232-18-0x00007FFD9EBD0000-0x00007FFD9EBE0000-memory.dmp

          Filesize

          64KB

        • memory/3232-20-0x00007FFD9EBD0000-0x00007FFD9EBE0000-memory.dmp

          Filesize

          64KB

        • memory/3232-21-0x00007FFDDEB50000-0x00007FFDDED45000-memory.dmp

          Filesize

          2.0MB

        • memory/3232-19-0x00007FFD9EBD0000-0x00007FFD9EBE0000-memory.dmp

          Filesize

          64KB

        • memory/3232-17-0x00007FFD9EBD0000-0x00007FFD9EBE0000-memory.dmp

          Filesize

          64KB