Overview
overview
10Static
static
10[CRACKED B...at.exe
windows7-x64
3[CRACKED B...at.exe
windows10-2004-x64
6[CRACKED B...xa.dll
windows7-x64
3[CRACKED B...xa.dll
windows10-2004-x64
3[CRACKED B...BC.exe
windows7-x64
1[CRACKED B...BC.exe
windows10-2004-x64
1[CRACKED B...BT.exe
windows7-x64
1[CRACKED B...BT.exe
windows10-2004-x64
1[CRACKED B...LC.exe
windows7-x64
1[CRACKED B...LC.exe
windows10-2004-x64
1[CRACKED B...lt.exe
windows7-x64
3[CRACKED B...lt.exe
windows10-2004-x64
3[CRACKED B...C3.dll
windows7-x64
3[CRACKED B...C3.dll
windows10-2004-x64
3[CRACKED B...xt.dll
windows7-x64
3[CRACKED B...xt.dll
windows10-2004-x64
3[CRACKED B...64.dll
windows7-x64
1[CRACKED B...64.dll
windows10-2004-x64
3[CRACKED B...on.exe
windows7-x64
3[CRACKED B...on.exe
windows10-2004-x64
3[CRACKED B...ip.exe
windows7-x64
3[CRACKED B...ip.exe
windows10-2004-x64
3[CRACKED B...ib.dll
windows7-x64
1[CRACKED B...ib.dll
windows10-2004-x64
1[CRACKED B...le.exe
windows7-x64
7[CRACKED B...le.exe
windows10-2004-x64
7[CRACKED B...or.exe
windows7-x64
7[CRACKED B...or.exe
windows10-2004-x64
7[CRACKED B...nc.vbe
windows7-x64
1[CRACKED B...nc.vbe
windows10-2004-x64
1[CRACKED B...ss.exe
windows7-x64
1[CRACKED B...ss.exe
windows10-2004-x64
3Analysis
-
max time kernel
144s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 06:47
Behavioral task
behavioral1
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/DCRat.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/DCRat.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/7zxa.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/7zxa.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRBC.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRBC.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRBT.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRBT.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRLC.exe
Resource
win7-20250207-en
Behavioral task
behavioral10
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRLC.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/Default.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/Default.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/NCC3.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/NCC3.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/RarExt.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/RarExt.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/RarExt64.dll
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/RarExt64.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral19
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/WinCon.exe
Resource
win7-20250207-en
Behavioral task
behavioral20
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/WinCon.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/Zip.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/Zip.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dnlib.dll
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dnlib.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dotNET_Reactor.Console.exe
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dotNET_Reactor.Console.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dotNET_Reactor.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dotNET_Reactor.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/enc.vbe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/enc.vbe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/mpress.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/mpress.exe
Resource
win10v2004-20250314-en
General
-
Target
[CRACKED BY L1nc0In] NEW DCRat/DCRat/DCRat.exe
-
Size
72KB
-
MD5
2c7d37e90dd8ab57d06dad5bc7956885
-
SHA1
da789c107c4c68b8250b6589e45e5a3cf7a9a143
-
SHA256
5ede5d774ab65f25357cf5a1fa5e354f6f2a9868651a0fa717485802b21b1939
-
SHA512
e74ae891771bfd9c6fcdfbe8e4f33f0d5f7c3457cd84b257500cdaf8fa8b16fe458a18db9b3a60591465982fc2871f4c3f2e7541c765f00a0516f805e7e9ca0f
-
SSDEEP
768:P7Zw33FNUf6Nhd/fQ1l+0vM0iT9HvMB90d24:zZ2FWSNhd/4131i89p4
Malware Config
Signatures
-
Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
flow ioc pid Process 27 https://t.me/DarkCrystalRAT/33?embed=1&mode=tme 116 javaw.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DCRat.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4508 WMIC.exe Token: SeSecurityPrivilege 4508 WMIC.exe Token: SeTakeOwnershipPrivilege 4508 WMIC.exe Token: SeLoadDriverPrivilege 4508 WMIC.exe Token: SeSystemProfilePrivilege 4508 WMIC.exe Token: SeSystemtimePrivilege 4508 WMIC.exe Token: SeProfSingleProcessPrivilege 4508 WMIC.exe Token: SeIncBasePriorityPrivilege 4508 WMIC.exe Token: SeCreatePagefilePrivilege 4508 WMIC.exe Token: SeBackupPrivilege 4508 WMIC.exe Token: SeRestorePrivilege 4508 WMIC.exe Token: SeShutdownPrivilege 4508 WMIC.exe Token: SeDebugPrivilege 4508 WMIC.exe Token: SeSystemEnvironmentPrivilege 4508 WMIC.exe Token: SeRemoteShutdownPrivilege 4508 WMIC.exe Token: SeUndockPrivilege 4508 WMIC.exe Token: SeManageVolumePrivilege 4508 WMIC.exe Token: 33 4508 WMIC.exe Token: 34 4508 WMIC.exe Token: 35 4508 WMIC.exe Token: 36 4508 WMIC.exe Token: SeIncreaseQuotaPrivilege 4508 WMIC.exe Token: SeSecurityPrivilege 4508 WMIC.exe Token: SeTakeOwnershipPrivilege 4508 WMIC.exe Token: SeLoadDriverPrivilege 4508 WMIC.exe Token: SeSystemProfilePrivilege 4508 WMIC.exe Token: SeSystemtimePrivilege 4508 WMIC.exe Token: SeProfSingleProcessPrivilege 4508 WMIC.exe Token: SeIncBasePriorityPrivilege 4508 WMIC.exe Token: SeCreatePagefilePrivilege 4508 WMIC.exe Token: SeBackupPrivilege 4508 WMIC.exe Token: SeRestorePrivilege 4508 WMIC.exe Token: SeShutdownPrivilege 4508 WMIC.exe Token: SeDebugPrivilege 4508 WMIC.exe Token: SeSystemEnvironmentPrivilege 4508 WMIC.exe Token: SeRemoteShutdownPrivilege 4508 WMIC.exe Token: SeUndockPrivilege 4508 WMIC.exe Token: SeManageVolumePrivilege 4508 WMIC.exe Token: 33 4508 WMIC.exe Token: 34 4508 WMIC.exe Token: 35 4508 WMIC.exe Token: 36 4508 WMIC.exe Token: SeIncreaseQuotaPrivilege 4116 WMIC.exe Token: SeSecurityPrivilege 4116 WMIC.exe Token: SeTakeOwnershipPrivilege 4116 WMIC.exe Token: SeLoadDriverPrivilege 4116 WMIC.exe Token: SeSystemProfilePrivilege 4116 WMIC.exe Token: SeSystemtimePrivilege 4116 WMIC.exe Token: SeProfSingleProcessPrivilege 4116 WMIC.exe Token: SeIncBasePriorityPrivilege 4116 WMIC.exe Token: SeCreatePagefilePrivilege 4116 WMIC.exe Token: SeBackupPrivilege 4116 WMIC.exe Token: SeRestorePrivilege 4116 WMIC.exe Token: SeShutdownPrivilege 4116 WMIC.exe Token: SeDebugPrivilege 4116 WMIC.exe Token: SeSystemEnvironmentPrivilege 4116 WMIC.exe Token: SeRemoteShutdownPrivilege 4116 WMIC.exe Token: SeUndockPrivilege 4116 WMIC.exe Token: SeManageVolumePrivilege 4116 WMIC.exe Token: 33 4116 WMIC.exe Token: 34 4116 WMIC.exe Token: 35 4116 WMIC.exe Token: 36 4116 WMIC.exe Token: SeIncreaseQuotaPrivilege 4116 WMIC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 116 javaw.exe 116 javaw.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 5396 wrote to memory of 116 5396 DCRat.exe 86 PID 5396 wrote to memory of 116 5396 DCRat.exe 86 PID 116 wrote to memory of 2024 116 javaw.exe 91 PID 116 wrote to memory of 2024 116 javaw.exe 91 PID 2024 wrote to memory of 4508 2024 cmd.exe 93 PID 2024 wrote to memory of 4508 2024 cmd.exe 93 PID 116 wrote to memory of 2360 116 javaw.exe 94 PID 116 wrote to memory of 2360 116 javaw.exe 94 PID 116 wrote to memory of 2412 116 javaw.exe 96 PID 116 wrote to memory of 2412 116 javaw.exe 96 PID 2412 wrote to memory of 4116 2412 cmd.exe 98 PID 2412 wrote to memory of 4116 2412 cmd.exe 98 PID 116 wrote to memory of 1892 116 javaw.exe 99 PID 116 wrote to memory of 1892 116 javaw.exe 99 PID 1892 wrote to memory of 2820 1892 cmd.exe 101 PID 1892 wrote to memory of 2820 1892 cmd.exe 101 PID 116 wrote to memory of 6136 116 javaw.exe 102 PID 116 wrote to memory of 6136 116 javaw.exe 102 PID 6136 wrote to memory of 1368 6136 cmd.exe 104 PID 6136 wrote to memory of 1368 6136 cmd.exe 104 PID 116 wrote to memory of 5528 116 javaw.exe 106 PID 116 wrote to memory of 5528 116 javaw.exe 106 PID 5528 wrote to memory of 740 5528 cmd.exe 108 PID 5528 wrote to memory of 740 5528 cmd.exe 108 PID 116 wrote to memory of 2068 116 javaw.exe 109 PID 116 wrote to memory of 2068 116 javaw.exe 109 PID 2068 wrote to memory of 876 2068 cmd.exe 111 PID 2068 wrote to memory of 876 2068 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\[CRACKED BY L1nc0In] NEW DCRat\DCRat\DCRat.exe"C:\Users\Admin\AppData\Local\Temp\[CRACKED BY L1nc0In] NEW DCRat\DCRat\DCRat.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5396 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Dprism.dirtyopts=false -Dfile.encoding=UTF-8 -classpath "lib\.;lib\..;lib\IIlIllIIlIllllIIIlIIlllIIIIIlIlllIIIIllllllIlIIlllIlIlIlllIIIlIIllIIIIlIllIlIlIlIlIlIIlllIlllIIllIIllIlIlllIlIIlllIIIIll.jar;lib\IIllIIIIIlIlIIlIIIllIllllIIIlllIIIlIlIIlIlIllllIIlIIllIlIlIllIIIIIlIlllllllIIIIlIIlIIllIIIlIlIlllIIIIllllIllIIIIIIlIllII.jar;lib\IlIIIIllIIIIIIIIIllIlIllIIIlIIllIIlIIllIIlIlIIIIIIIIIIlllIIlIllIIIlIlIllIllIlIlIlIlIllIlIllIlllIIllIlIllIlIIlllIIIIIlIlI.jar;lib\IlIlIIIIIIlIIIIIIllIlIIlIllIllIlIIIlIllllIlIlllIIlIIllIllIIlIlllIIIllllIlIllIIIIIIIIIlIIlIllIIllIIlIllIIIIlIIllIllllIlIl.jar;lib\IllIIIIIIIlllIIIlIlIllIIIIIllIllIlIIlIllIlIIlIllIIlIlIlIlllllllIIlllllllIIlIIIlIlIlIIlIllllIlllIIllllIIlllllIllIIIlIlIlI.jar;lib\IllIIIIIIlIIIIIlIllIIIIlIlIIIIlIIllIIllIIlIlllIlIlIlIIIlllllIlllIllIIIlllllIlIlIlIlllIlIIllIlIIlIlIIllIlIIllIlIlIIIlIIIl.jar;lib\IlllIIlllllIIllIIIlIIlIlIlIllllIlllIllllIIIIIlIllIIIIllIIlllIllIlIlIlIIIIllIllIIllllllIllIIlllIIIlIllllIlIllIIIIIIIIlIll.jar;lib\lIIIIIIllIllllllIIlllIlIIIIlIIllllIIIIIIIIllIIIIIlIIIIIIIlllIIIIIIlIIIlIlIlIlIlIllIllIlIllIlIlIIllIlIIIIlllIllIIllIIlIIl.jar;lib\lIIlIIlllIIIIIIlllIllIIIlIlIllIlllIlIllIllllIllIIIlIlIIIlIllIllIIlllIlllllIIIlIIlIIlIIIlIlllIIllIIIIlllIIIIlIIlllIlllllI.jar;lib\lIlllIIlIIlllIIllIIIlIIIIIlIlIlIIIIlIllIIlllIlllIllIlllIlIlIlllIIllIIllIIIlIllIIIlllIlllllIlIlIIlIIIIIllllIlIllIIllIllII.jar;lib\lIllllIllIlIIlIlIlllIIIllIIIIlIIllIllllIIlIIIIIlIIIlIIIIIIIIIIIIIIllIllIIlIlIlIlllllIlllllIIIIIIlIlIIIlIIllllIlIIIlIlllI.jar;lib\lIlllllIIlIllIllllIIIIlIIlIIIIIllIlllIIlIIllIllIIIlIIlllIllIIlllIIIlllIllllllllllIlIIIlIIlIllIIllIlllIlIlIIIIIIlllllIIlI.jar;lib\llIIIlllIIIllIIIIllIllIIlIIIlIllIlIIIIlIlIlIIllIIIlIIIlIIlllIIlIlIIIlIllllIIIIlIllIllllIlllIIlIIIIllIlIlIIlIIIllllllllIl.jar;lib\llIlIlIIIIIIllIllIIllIIlIlIlIllIIlllllIIlIIIIlIIIIIllIlIlIIIlIlIllllIlIlllIIlllIllIIIlIllllIIIllllIlllllIIIIIIllIlIIlIIl.jar;lib\llIlIlIIlllIllIlllIlIIIlIIIIlllIIIllIllllIIIIIIIIlllIlIIlllIIllIIllIlIIIllIIIIlIIlIllllIlIlllIllIIIIlIIlllIlIlIllIIlIllI.jar;lib\llIlIllIllIllIlIlllIlllIIIllllllIlIIlIllIlIlIlllIllIIIIIlllIIlIIlIllllIIIlllIllIIlIIIIIIlIlIIllIIIIlIlllIllIIlIlllIIIllI.jar" org.develnext.jphp.ext.javafx.FXLauncher2⤵
- Mark of the Web detected: This indicates that the page was originally saved or cloned.
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\wbem\wmic.exe baseboard get Manufacturer3⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\wmic.exe baseboard get Manufacturer4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c USERPROFILE3⤵PID:2360
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\wbem\wmic.exe baseboard get Product3⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\wmic.exe baseboard get Product4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\wbem\wmic.exe CPU get ProcessorId3⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\wmic.exe CPU get ProcessorId4⤵PID:2820
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\wbem\wmic.exe diskdrive where 'Index=0' get 'serialnumber'3⤵
- Suspicious use of WriteProcessMemory
PID:6136 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\wmic.exe diskdrive where 'Index=0' get 'serialnumber'4⤵PID:1368
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\wbem\wmic.exe Path Win32_VideoController Get VideoProcessor3⤵
- Suspicious use of WriteProcessMemory
PID:5528 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\wmic.exe Path Win32_VideoController Get VideoProcessor4⤵PID:740
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\wbem\wmic.exe diskdrive where 'Index=0' get 'size'3⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\wmic.exe diskdrive where 'Index=0' get 'size'4⤵PID:876
-
-
-