Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2024 07:55

General

  • Target

    7154aa063c5354a6f0b688d426917aeec72b12e8cbba2abcc077131cd2a790a3N.exe

  • Size

    2.0MB

  • MD5

    9cac7705b36c41a9574dae8e56e6bd80

  • SHA1

    4ec84a2bd07afdcfa994739a119ef13fdd4c59a2

  • SHA256

    7154aa063c5354a6f0b688d426917aeec72b12e8cbba2abcc077131cd2a790a3

  • SHA512

    13d6f03820606854e44d686f7fce122f4df99b77a29b8b02fce38f0875128c3d2cf9b66292b06409fef1b5fb59f335618161b1f1c379e39709700bd51e27935f

  • SSDEEP

    49152:pQOavWHvEToeWC7ZdEWrsELqT/wcSNWbK1ah:pLTHvEToeWELTWwb

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7154aa063c5354a6f0b688d426917aeec72b12e8cbba2abcc077131cd2a790a3N.exe
    "C:\Users\Admin\AppData\Local\Temp\7154aa063c5354a6f0b688d426917aeec72b12e8cbba2abcc077131cd2a790a3N.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2088

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2088-0-0x000007FEF5DC3000-0x000007FEF5DC4000-memory.dmp

    Filesize

    4KB

  • memory/2088-1-0x0000000000A10000-0x0000000000C18000-memory.dmp

    Filesize

    2.0MB

  • memory/2088-2-0x000007FEF5DC0000-0x000007FEF67AC000-memory.dmp

    Filesize

    9.9MB

  • memory/2088-3-0x0000000000450000-0x000000000045E000-memory.dmp

    Filesize

    56KB

  • memory/2088-4-0x0000000000460000-0x000000000046E000-memory.dmp

    Filesize

    56KB

  • memory/2088-5-0x000007FEF5DC0000-0x000007FEF67AC000-memory.dmp

    Filesize

    9.9MB