Overview
overview
10Static
static
10DCrat-Crac...ck.exe
windows7-x64
10DCrat-Crac...ck.exe
windows10-2004-x64
10DCrat-Crac...am.dll
windows7-x64
3DCrat-Crac...am.dll
windows10-2004-x64
3DCrat-Crac...ch.dll
windows7-x64
3DCrat-Crac...ch.dll
windows10-2004-x64
3DCrat-Crac...ic.dll
windows7-x64
1DCrat-Crac...ic.dll
windows10-2004-x64
1DCrat-Crac...lg.dll
windows7-x64
3DCrat-Crac...lg.dll
windows10-2004-x64
3DCrat-Crac...pw.dll
windows7-x64
3DCrat-Crac...pw.dll
windows10-2004-x64
3DCrat-Crac...c2.dll
windows7-x64
1DCrat-Crac...c2.dll
windows10-2004-x64
1DCrat-Crack/Stub.ps1
windows7-x64
3DCrat-Crack/Stub.ps1
windows10-2004-x64
3DCrat-Crac...et.dll
windows7-x64
1DCrat-Crac...et.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 12:30
Behavioral task
behavioral1
Sample
DCrat-Crack/DCrat-main Crack.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DCrat-Crack/DCrat-main Crack.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DCrat-Crack/Plugin/cam.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
DCrat-Crack/Plugin/cam.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
DCrat-Crack/Plugin/ch.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
DCrat-Crack/Plugin/ch.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
DCrat-Crack/Plugin/mic.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
DCrat-Crack/Plugin/mic.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
DCrat-Crack/Plugin/plg.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
DCrat-Crack/Plugin/plg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
DCrat-Crack/Plugin/pw.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
DCrat-Crack/Plugin/pw.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
DCrat-Crack/Plugin/sc2.dll
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
DCrat-Crack/Plugin/sc2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
DCrat-Crack/Stub.ps1
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
DCrat-Crack/Stub.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
DCrat-Crack/WinMM.Net.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
DCrat-Crack/WinMM.Net.dll
Resource
win10v2004-20241007-en
General
-
Target
DCrat-Crack/Stub.ps1
-
Size
399KB
-
MD5
3575abf7ab346ec4039138fad1fab4b7
-
SHA1
c5c7b08cfcb707cab339d966e36de6c3c97bd7f5
-
SHA256
ed79411707d5a9925f1146e595983804e4eeafe35e72eb51703908eff13cc073
-
SHA512
2044d78e20a4d7b8acbc0ebf61c38176314ccf02a0b009b161530b78658444faed8304a628938514d98effe5ebdd81275e1328f65d98ec3f2e545f9c9de56179
-
SSDEEP
12288:YbidABkcrO7qU+1gtxPXEx8V0IC0FcUYpm+0DGG+ld+HkZCpC654tDarkic:s
Malware Config
Signatures
-
pid Process 1600 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1600 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1600 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\DCrat-Crack\Stub.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600