Analysis

  • max time kernel
    83s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 11:38

General

  • Target

    e71708d1637b813f224ac113348c16a9be59cb1f3d0f3a8c2304441b5b77ef03N.exe

  • Size

    2.0MB

  • MD5

    74b319abea1aca31fcef9f947fce8310

  • SHA1

    53981e89a73f6ae58fcf7c29949a5ba9fdadd052

  • SHA256

    e71708d1637b813f224ac113348c16a9be59cb1f3d0f3a8c2304441b5b77ef03

  • SHA512

    38ad20edcdd5ceb790da3dbf42c2fdea27be6e88c6d5998762f4f3d3cad6920942aa4ce8d1262f8cc3fd0252feb9d35335d4f58a1fc6ba38b0f138d14aec2e70

  • SSDEEP

    49152:2vI62G31g6rFz6CtxYVICq18meUEYbac:2vI6Z1Lz68xYeCq18

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e71708d1637b813f224ac113348c16a9be59cb1f3d0f3a8c2304441b5b77ef03N.exe
    "C:\Users\Admin\AppData\Local\Temp\e71708d1637b813f224ac113348c16a9be59cb1f3d0f3a8c2304441b5b77ef03N.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2084-0-0x000007FEF5E33000-0x000007FEF5E34000-memory.dmp

    Filesize

    4KB

  • memory/2084-1-0x0000000001140000-0x0000000001348000-memory.dmp

    Filesize

    2.0MB

  • memory/2084-2-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2084-3-0x00000000003C0000-0x00000000003CE000-memory.dmp

    Filesize

    56KB

  • memory/2084-4-0x0000000000460000-0x000000000046E000-memory.dmp

    Filesize

    56KB

  • memory/2084-5-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB