Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:18

General

  • Target

    e65dc6f84e8571ee0c8d0df1c15ab10c168f9e8951c0e9d61bae78ca53bb1e10.exe

  • Size

    2.0MB

  • MD5

    7557bbff187c92eb67752330d640c103

  • SHA1

    cb6d84da9ed514d1bbe319af28ae240752b18bfe

  • SHA256

    e65dc6f84e8571ee0c8d0df1c15ab10c168f9e8951c0e9d61bae78ca53bb1e10

  • SHA512

    0e3f9b5bc0accf6e7f18eaeab13a9be6c75eb4414d065aa58b3a2de05740241eea16aaff8fff3e047668a26651c6a27beabe6c2c76897d08ac69c1718b08c885

  • SSDEEP

    49152:7rYU+Yy4J8jao9UVlWAOjhRzsiYHjo++xTN:7dxVJC9UqRzsu+8N

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e65dc6f84e8571ee0c8d0df1c15ab10c168f9e8951c0e9d61bae78ca53bb1e10.exe
    "C:\Users\Admin\AppData\Local\Temp\e65dc6f84e8571ee0c8d0df1c15ab10c168f9e8951c0e9d61bae78ca53bb1e10.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2336

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2336-0-0x000007FEF5993000-0x000007FEF5994000-memory.dmp

    Filesize

    4KB

  • memory/2336-1-0x0000000000800000-0x0000000000A0A000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-2-0x000007FEF5990000-0x000007FEF637C000-memory.dmp

    Filesize

    9.9MB

  • memory/2336-3-0x0000000000550000-0x000000000055E000-memory.dmp

    Filesize

    56KB

  • memory/2336-4-0x0000000000560000-0x000000000056E000-memory.dmp

    Filesize

    56KB

  • memory/2336-5-0x000007FEF5990000-0x000007FEF637C000-memory.dmp

    Filesize

    9.9MB