Resubmissions

07-12-2024 15:44

241207-s6ya4a1qcl 10

07-12-2024 15:22

241207-ssdpja1pam 10

07-12-2024 15:21

241207-srns4swmhw 10

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2024 15:22

General

  • Target

    Discord.exe

  • Size

    1.6MB

  • MD5

    202a94b566ed1c4e1445086ed56f0f3b

  • SHA1

    0bbabc9905ba952288b1fe1a0edba6dba200734d

  • SHA256

    d3e61c42225ddfa5698b6573920261e106becc4937f7b390c925cfbb926e31b8

  • SHA512

    a13e60b6541b0feace92a76f444fa8772c51a16abeaaa7a149d1f960e368b1e5510925f1571375f29c4529d832c4009c7ba8c5a205a6c1689fd87953af3eeded

  • SSDEEP

    24576:bcl8Pbml8yHSSbrJ4N5Zj11rkbLatxG0PlNG4J5cY+EfOdokIubMvp4:bC8eG11AitHlNGw5x+Eflkw

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Discord.exe
    "C:\Users\Admin\AppData\Local\Temp\Discord.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2864

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2864-0-0x00007FFC76C43000-0x00007FFC76C45000-memory.dmp

    Filesize

    8KB

  • memory/2864-1-0x00000000001E0000-0x0000000000388000-memory.dmp

    Filesize

    1.7MB

  • memory/2864-2-0x00007FFC76C40000-0x00007FFC77701000-memory.dmp

    Filesize

    10.8MB

  • memory/2864-3-0x000000001AE90000-0x000000001AE9E000-memory.dmp

    Filesize

    56KB

  • memory/2864-5-0x00007FFC76C40000-0x00007FFC77701000-memory.dmp

    Filesize

    10.8MB