Overview
overview
10Static
static
10[CRACKED B...at.exe
windows7-x64
3[CRACKED B...at.exe
windows10-2004-x64
6[CRACKED B...xa.dll
windows7-x64
3[CRACKED B...xa.dll
windows10-2004-x64
3[CRACKED B...BC.exe
windows7-x64
1[CRACKED B...BC.exe
windows10-2004-x64
1[CRACKED B...BT.exe
windows7-x64
1[CRACKED B...BT.exe
windows10-2004-x64
1[CRACKED B...LC.exe
windows7-x64
1[CRACKED B...LC.exe
windows10-2004-x64
1[CRACKED B...lt.exe
windows7-x64
3[CRACKED B...lt.exe
windows10-2004-x64
3[CRACKED B...C3.dll
windows7-x64
3[CRACKED B...C3.dll
windows10-2004-x64
3[CRACKED B...xt.dll
windows7-x64
3[CRACKED B...xt.dll
windows10-2004-x64
3[CRACKED B...64.dll
windows7-x64
1[CRACKED B...64.dll
windows10-2004-x64
3[CRACKED B...on.exe
windows7-x64
3[CRACKED B...on.exe
windows10-2004-x64
3[CRACKED B...ip.exe
windows7-x64
3[CRACKED B...ip.exe
windows10-2004-x64
3[CRACKED B...ib.dll
windows7-x64
1[CRACKED B...ib.dll
windows10-2004-x64
1[CRACKED B...le.exe
windows7-x64
7[CRACKED B...le.exe
windows10-2004-x64
7[CRACKED B...or.exe
windows7-x64
7[CRACKED B...or.exe
windows10-2004-x64
7[CRACKED B...nc.vbe
windows7-x64
1[CRACKED B...nc.vbe
windows10-2004-x64
1[CRACKED B...ss.exe
windows7-x64
1[CRACKED B...ss.exe
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/03/2025, 06:47
Behavioral task
behavioral1
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/DCRat.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/DCRat.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/7zxa.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/7zxa.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRBC.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRBC.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRBT.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRBT.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRLC.exe
Resource
win7-20250207-en
Behavioral task
behavioral10
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRLC.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/Default.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/Default.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/NCC3.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/NCC3.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/RarExt.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/RarExt.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/RarExt64.dll
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/RarExt64.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral19
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/WinCon.exe
Resource
win7-20250207-en
Behavioral task
behavioral20
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/WinCon.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/Zip.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/Zip.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dnlib.dll
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dnlib.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dotNET_Reactor.Console.exe
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dotNET_Reactor.Console.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dotNET_Reactor.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dotNET_Reactor.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/enc.vbe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/enc.vbe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/mpress.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/mpress.exe
Resource
win10v2004-20250314-en
General
-
Target
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRBT.exe
-
Size
23KB
-
MD5
32e2bc4f79c776b542f6775895beaf21
-
SHA1
38e1d82f7cd869d1a016a94dc747110e44e80ae2
-
SHA256
98ec5492a2f0aeba5b39a9f41498d98c73643bf6d8d177e5831fb0ad6e6f8521
-
SHA512
4ed797827b33fc922b1385c7b4e1cfdc12f7e00c8969b7ed6eeb6aa82f2656fa7f73c90c67ee1a1fdff2ac654504e214d4255eb37251736d30fa694e0b3094e9
-
SSDEEP
384:Ik67YLzFJSKaj1A5l055eRethRv1WGqvSqRehTLONKwzI:P3JJ/V5lU5e8thRNwvI5LSKw0
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2932 2680 DCRBT.exe 31 PID 2680 wrote to memory of 2932 2680 DCRBT.exe 31 PID 2680 wrote to memory of 2932 2680 DCRBT.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\[CRACKED BY L1nc0In] NEW DCRat\DCRat\data\DCRBT.exe"C:\Users\Admin\AppData\Local\Temp\[CRACKED BY L1nc0In] NEW DCRat\DCRat\data\DCRBT.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2680 -s 5042⤵PID:2932
-