Overview
overview
10Static
static
10DCRat/DCRat.exe
windows7-x64
DCRat/DCRat.exe
windows10-2004-x64
6DCRat/data/7zxa.dll
windows7-x64
3DCRat/data/7zxa.dll
windows10-2004-x64
3DCRat/data/DCRBC.exe
windows7-x64
1DCRat/data/DCRBC.exe
windows10-2004-x64
1DCRat/data/DCRBT.exe
windows7-x64
1DCRat/data/DCRBT.exe
windows10-2004-x64
1DCRat/data/DCRLC.exe
windows7-x64
1DCRat/data/DCRLC.exe
windows10-2004-x64
1DCRat/data...lt.exe
windows7-x64
3DCRat/data...lt.exe
windows10-2004-x64
3DCRat/data/NCC3.dll
windows7-x64
3DCRat/data/NCC3.dll
windows10-2004-x64
3DCRat/data/RarExt.dll
windows7-x64
3DCRat/data/RarExt.dll
windows10-2004-x64
3DCRat/data...64.dll
windows7-x64
1DCRat/data...64.dll
windows10-2004-x64
3DCRat/data/WinCon.exe
windows7-x64
3DCRat/data/WinCon.exe
windows10-2004-x64
3DCRat/data/Zip.exe
windows7-x64
3DCRat/data/Zip.exe
windows10-2004-x64
3DCRat/data/dnlib.dll
windows7-x64
1DCRat/data/dnlib.dll
windows10-2004-x64
1DCRat/data...le.exe
windows7-x64
7DCRat/data...le.exe
windows10-2004-x64
7DCRat/data...or.exe
windows7-x64
7DCRat/data...or.exe
windows10-2004-x64
7DCRat/data/enc.vbe
windows7-x64
1DCRat/data/enc.vbe
windows10-2004-x64
1DCRat/data/mpress.exe
windows7-x64
1DCRat/data/mpress.exe
windows10-2004-x64
3Analysis
-
max time kernel
576s -
max time network
438s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 02:16
Behavioral task
behavioral1
Sample
DCRat/DCRat.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DCRat/DCRat.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
DCRat/data/7zxa.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
DCRat/data/7zxa.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
DCRat/data/DCRBC.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
DCRat/data/DCRBC.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
DCRat/data/DCRBT.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
DCRat/data/DCRBT.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
DCRat/data/DCRLC.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
DCRat/data/DCRLC.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
DCRat/data/Default.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
DCRat/data/Default.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
DCRat/data/NCC3.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
DCRat/data/NCC3.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
DCRat/data/RarExt.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
DCRat/data/RarExt.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
DCRat/data/RarExt64.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
DCRat/data/RarExt64.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
DCRat/data/WinCon.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
DCRat/data/WinCon.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
DCRat/data/Zip.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
DCRat/data/Zip.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
DCRat/data/dnlib.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
DCRat/data/dnlib.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
DCRat/data/dotNET_Reactor.Console.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
DCRat/data/dotNET_Reactor.Console.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
DCRat/data/dotNET_Reactor.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
DCRat/data/dotNET_Reactor.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
DCRat/data/enc.vbe
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
DCRat/data/enc.vbe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
DCRat/data/mpress.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
DCRat/data/mpress.exe
Resource
win10v2004-20250217-en
General
-
Target
DCRat/DCRat.exe
-
Size
72KB
-
MD5
2c7d37e90dd8ab57d06dad5bc7956885
-
SHA1
da789c107c4c68b8250b6589e45e5a3cf7a9a143
-
SHA256
5ede5d774ab65f25357cf5a1fa5e354f6f2a9868651a0fa717485802b21b1939
-
SHA512
e74ae891771bfd9c6fcdfbe8e4f33f0d5f7c3457cd84b257500cdaf8fa8b16fe458a18db9b3a60591465982fc2871f4c3f2e7541c765f00a0516f805e7e9ca0f
-
SSDEEP
768:P7Zw33FNUf6Nhd/fQ1l+0vM0iT9HvMB90d24:zZ2FWSNhd/4131i89p4
Malware Config
Signatures
-
Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
flow ioc pid Process 18 https://t.me/DarkCrystalRAT/33?embed=1&mode=tme 888 javaw.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DCRat.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1408 WMIC.exe Token: SeSecurityPrivilege 1408 WMIC.exe Token: SeTakeOwnershipPrivilege 1408 WMIC.exe Token: SeLoadDriverPrivilege 1408 WMIC.exe Token: SeSystemProfilePrivilege 1408 WMIC.exe Token: SeSystemtimePrivilege 1408 WMIC.exe Token: SeProfSingleProcessPrivilege 1408 WMIC.exe Token: SeIncBasePriorityPrivilege 1408 WMIC.exe Token: SeCreatePagefilePrivilege 1408 WMIC.exe Token: SeBackupPrivilege 1408 WMIC.exe Token: SeRestorePrivilege 1408 WMIC.exe Token: SeShutdownPrivilege 1408 WMIC.exe Token: SeDebugPrivilege 1408 WMIC.exe Token: SeSystemEnvironmentPrivilege 1408 WMIC.exe Token: SeRemoteShutdownPrivilege 1408 WMIC.exe Token: SeUndockPrivilege 1408 WMIC.exe Token: SeManageVolumePrivilege 1408 WMIC.exe Token: 33 1408 WMIC.exe Token: 34 1408 WMIC.exe Token: 35 1408 WMIC.exe Token: 36 1408 WMIC.exe Token: SeIncreaseQuotaPrivilege 1408 WMIC.exe Token: SeSecurityPrivilege 1408 WMIC.exe Token: SeTakeOwnershipPrivilege 1408 WMIC.exe Token: SeLoadDriverPrivilege 1408 WMIC.exe Token: SeSystemProfilePrivilege 1408 WMIC.exe Token: SeSystemtimePrivilege 1408 WMIC.exe Token: SeProfSingleProcessPrivilege 1408 WMIC.exe Token: SeIncBasePriorityPrivilege 1408 WMIC.exe Token: SeCreatePagefilePrivilege 1408 WMIC.exe Token: SeBackupPrivilege 1408 WMIC.exe Token: SeRestorePrivilege 1408 WMIC.exe Token: SeShutdownPrivilege 1408 WMIC.exe Token: SeDebugPrivilege 1408 WMIC.exe Token: SeSystemEnvironmentPrivilege 1408 WMIC.exe Token: SeRemoteShutdownPrivilege 1408 WMIC.exe Token: SeUndockPrivilege 1408 WMIC.exe Token: SeManageVolumePrivilege 1408 WMIC.exe Token: 33 1408 WMIC.exe Token: 34 1408 WMIC.exe Token: 35 1408 WMIC.exe Token: 36 1408 WMIC.exe Token: SeIncreaseQuotaPrivilege 3200 WMIC.exe Token: SeSecurityPrivilege 3200 WMIC.exe Token: SeTakeOwnershipPrivilege 3200 WMIC.exe Token: SeLoadDriverPrivilege 3200 WMIC.exe Token: SeSystemProfilePrivilege 3200 WMIC.exe Token: SeSystemtimePrivilege 3200 WMIC.exe Token: SeProfSingleProcessPrivilege 3200 WMIC.exe Token: SeIncBasePriorityPrivilege 3200 WMIC.exe Token: SeCreatePagefilePrivilege 3200 WMIC.exe Token: SeBackupPrivilege 3200 WMIC.exe Token: SeRestorePrivilege 3200 WMIC.exe Token: SeShutdownPrivilege 3200 WMIC.exe Token: SeDebugPrivilege 3200 WMIC.exe Token: SeSystemEnvironmentPrivilege 3200 WMIC.exe Token: SeRemoteShutdownPrivilege 3200 WMIC.exe Token: SeUndockPrivilege 3200 WMIC.exe Token: SeManageVolumePrivilege 3200 WMIC.exe Token: 33 3200 WMIC.exe Token: 34 3200 WMIC.exe Token: 35 3200 WMIC.exe Token: 36 3200 WMIC.exe Token: SeIncreaseQuotaPrivilege 3200 WMIC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 888 javaw.exe 888 javaw.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 5008 wrote to memory of 888 5008 DCRat.exe 86 PID 5008 wrote to memory of 888 5008 DCRat.exe 86 PID 888 wrote to memory of 2912 888 javaw.exe 90 PID 888 wrote to memory of 2912 888 javaw.exe 90 PID 2912 wrote to memory of 1408 2912 cmd.exe 92 PID 2912 wrote to memory of 1408 2912 cmd.exe 92 PID 888 wrote to memory of 3960 888 javaw.exe 94 PID 888 wrote to memory of 3960 888 javaw.exe 94 PID 888 wrote to memory of 4512 888 javaw.exe 96 PID 888 wrote to memory of 4512 888 javaw.exe 96 PID 4512 wrote to memory of 3200 4512 cmd.exe 98 PID 4512 wrote to memory of 3200 4512 cmd.exe 98 PID 888 wrote to memory of 724 888 javaw.exe 99 PID 888 wrote to memory of 724 888 javaw.exe 99 PID 724 wrote to memory of 2888 724 cmd.exe 101 PID 724 wrote to memory of 2888 724 cmd.exe 101 PID 888 wrote to memory of 2544 888 javaw.exe 102 PID 888 wrote to memory of 2544 888 javaw.exe 102 PID 2544 wrote to memory of 4608 2544 cmd.exe 104 PID 2544 wrote to memory of 4608 2544 cmd.exe 104 PID 888 wrote to memory of 2392 888 javaw.exe 105 PID 888 wrote to memory of 2392 888 javaw.exe 105 PID 2392 wrote to memory of 1184 2392 cmd.exe 107 PID 2392 wrote to memory of 1184 2392 cmd.exe 107 PID 888 wrote to memory of 3396 888 javaw.exe 108 PID 888 wrote to memory of 3396 888 javaw.exe 108 PID 3396 wrote to memory of 1464 3396 cmd.exe 110 PID 3396 wrote to memory of 1464 3396 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\DCRat\DCRat.exe"C:\Users\Admin\AppData\Local\Temp\DCRat\DCRat.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Dprism.dirtyopts=false -Dfile.encoding=UTF-8 -classpath "lib\.;lib\..;lib\IIlIllIIlIllllIIIlIIlllIIIIIlIlllIIIIllllllIlIIlllIlIlIlllIIIlIIllIIIIlIllIlIlIlIlIlIIlllIlllIIllIIllIlIlllIlIIlllIIIIll.jar;lib\IIllIIIIIlIlIIlIIIllIllllIIIlllIIIlIlIIlIlIllllIIlIIllIlIlIllIIIIIlIlllllllIIIIlIIlIIllIIIlIlIlllIIIIllllIllIIIIIIlIllII.jar;lib\IlIIIIllIIIIIIIIIllIlIllIIIlIIllIIlIIllIIlIlIIIIIIIIIIlllIIlIllIIIlIlIllIllIlIlIlIlIllIlIllIlllIIllIlIllIlIIlllIIIIIlIlI.jar;lib\IlIlIIIIIIlIIIIIIllIlIIlIllIllIlIIIlIllllIlIlllIIlIIllIllIIlIlllIIIllllIlIllIIIIIIIIIlIIlIllIIllIIlIllIIIIlIIllIllllIlIl.jar;lib\IllIIIIIIIlllIIIlIlIllIIIIIllIllIlIIlIllIlIIlIllIIlIlIlIlllllllIIlllllllIIlIIIlIlIlIIlIllllIlllIIllllIIlllllIllIIIlIlIlI.jar;lib\IllIIIIIIlIIIIIlIllIIIIlIlIIIIlIIllIIllIIlIlllIlIlIlIIIlllllIlllIllIIIlllllIlIlIlIlllIlIIllIlIIlIlIIllIlIIllIlIlIIIlIIIl.jar;lib\IlllIIlllllIIllIIIlIIlIlIlIllllIlllIllllIIIIIlIllIIIIllIIlllIllIlIlIlIIIIllIllIIllllllIllIIlllIIIlIllllIlIllIIIIIIIIlIll.jar;lib\lIIIIIIllIllllllIIlllIlIIIIlIIllllIIIIIIIIllIIIIIlIIIIIIIlllIIIIIIlIIIlIlIlIlIlIllIllIlIllIlIlIIllIlIIIIlllIllIIllIIlIIl.jar;lib\lIIlIIlllIIIIIIlllIllIIIlIlIllIlllIlIllIllllIllIIIlIlIIIlIllIllIIlllIlllllIIIlIIlIIlIIIlIlllIIllIIIIlllIIIIlIIlllIlllllI.jar;lib\lIlllIIlIIlllIIllIIIlIIIIIlIlIlIIIIlIllIIlllIlllIllIlllIlIlIlllIIllIIllIIIlIllIIIlllIlllllIlIlIIlIIIIIllllIlIllIIllIllII.jar;lib\lIllllIllIlIIlIlIlllIIIllIIIIlIIllIllllIIlIIIIIlIIIlIIIIIIIIIIIIIIllIllIIlIlIlIlllllIlllllIIIIIIlIlIIIlIIllllIlIIIlIlllI.jar;lib\lIlllllIIlIllIllllIIIIlIIlIIIIIllIlllIIlIIllIllIIIlIIlllIllIIlllIIIlllIllllllllllIlIIIlIIlIllIIllIlllIlIlIIIIIIlllllIIlI.jar;lib\llIIIlllIIIllIIIIllIllIIlIIIlIllIlIIIIlIlIlIIllIIIlIIIlIIlllIIlIlIIIlIllllIIIIlIllIllllIlllIIlIIIIllIlIlIIlIIIllllllllIl.jar;lib\llIlIlIIIIIIllIllIIllIIlIlIlIllIIlllllIIlIIIIlIIIIIllIlIlIIIlIlIllllIlIlllIIlllIllIIIlIllllIIIllllIlllllIIIIIIllIlIIlIIl.jar;lib\llIlIlIIlllIllIlllIlIIIlIIIIlllIIIllIllllIIIIIIIIlllIlIIlllIIllIIllIlIIIllIIIIlIIlIllllIlIlllIllIIIIlIIlllIlIlIllIIlIllI.jar;lib\llIlIllIllIllIlIlllIlllIIIllllllIlIIlIllIlIlIlllIllIIIIIlllIIlIIlIllllIIIlllIllIIlIIIIIIlIlIIllIIIIlIlllIllIIlIlllIIIllI.jar" org.develnext.jphp.ext.javafx.FXLauncher2⤵
- Mark of the Web detected: This indicates that the page was originally saved or cloned.
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\wbem\wmic.exe baseboard get Manufacturer3⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\wmic.exe baseboard get Manufacturer4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c USERPROFILE3⤵PID:3960
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\wbem\wmic.exe baseboard get Product3⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\wmic.exe baseboard get Product4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\wbem\wmic.exe CPU get ProcessorId3⤵
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\wmic.exe CPU get ProcessorId4⤵PID:2888
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\wbem\wmic.exe diskdrive where 'Index=0' get 'serialnumber'3⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\wmic.exe diskdrive where 'Index=0' get 'serialnumber'4⤵PID:4608
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\wbem\wmic.exe Path Win32_VideoController Get VideoProcessor3⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\wmic.exe Path Win32_VideoController Get VideoProcessor4⤵PID:1184
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\wbem\wmic.exe diskdrive where 'Index=0' get 'size'3⤵
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\wmic.exe diskdrive where 'Index=0' get 'size'4⤵PID:1464
-
-
-