Overview
overview
10Static
static
10[CRACKED B...at.exe
windows7-x64
3[CRACKED B...at.exe
windows10-2004-x64
6[CRACKED B...xa.dll
windows7-x64
3[CRACKED B...xa.dll
windows10-2004-x64
3[CRACKED B...BC.exe
windows7-x64
1[CRACKED B...BC.exe
windows10-2004-x64
1[CRACKED B...BT.exe
windows7-x64
1[CRACKED B...BT.exe
windows10-2004-x64
1[CRACKED B...LC.exe
windows7-x64
1[CRACKED B...LC.exe
windows10-2004-x64
1[CRACKED B...lt.exe
windows7-x64
3[CRACKED B...lt.exe
windows10-2004-x64
3[CRACKED B...C3.dll
windows7-x64
3[CRACKED B...C3.dll
windows10-2004-x64
3[CRACKED B...xt.dll
windows7-x64
3[CRACKED B...xt.dll
windows10-2004-x64
3[CRACKED B...64.dll
windows7-x64
1[CRACKED B...64.dll
windows10-2004-x64
3[CRACKED B...on.exe
windows7-x64
3[CRACKED B...on.exe
windows10-2004-x64
3[CRACKED B...ip.exe
windows7-x64
3[CRACKED B...ip.exe
windows10-2004-x64
3[CRACKED B...ib.dll
windows7-x64
1[CRACKED B...ib.dll
windows10-2004-x64
1[CRACKED B...le.exe
windows7-x64
7[CRACKED B...le.exe
windows10-2004-x64
7[CRACKED B...or.exe
windows7-x64
7[CRACKED B...or.exe
windows10-2004-x64
7[CRACKED B...nc.vbe
windows7-x64
1[CRACKED B...nc.vbe
windows10-2004-x64
1[CRACKED B...ss.exe
windows7-x64
1[CRACKED B...ss.exe
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
25/03/2025, 06:47
Behavioral task
behavioral1
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/DCRat.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/DCRat.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/7zxa.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/7zxa.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRBC.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRBC.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRBT.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRBT.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRLC.exe
Resource
win7-20250207-en
Behavioral task
behavioral10
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRLC.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/Default.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/Default.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/NCC3.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/NCC3.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/RarExt.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/RarExt.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/RarExt64.dll
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/RarExt64.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral19
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/WinCon.exe
Resource
win7-20250207-en
Behavioral task
behavioral20
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/WinCon.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/Zip.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/Zip.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dnlib.dll
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dnlib.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dotNET_Reactor.Console.exe
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dotNET_Reactor.Console.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dotNET_Reactor.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/dotNET_Reactor.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/enc.vbe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/enc.vbe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/mpress.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/mpress.exe
Resource
win10v2004-20250314-en
General
-
Target
[CRACKED BY L1nc0In] NEW DCRat/DCRat/data/DCRLC.exe
-
Size
23KB
-
MD5
a1bccb81f525f46b8e0994157f0dbb58
-
SHA1
70ad20203e56b1fed9827d87c8cc8ba09008a49f
-
SHA256
574f0612cef481f5bde5667586f1bf1c4df4b7672cd6093b6a8f3b2cadc10725
-
SHA512
9fe2dc5e4f621142d43b0ec8ced708b6fcd41c70b5432315ac98de632ab4a9e95bafb93dd30415b877ed6b2351697389cedd9285bdda7e53545e933b6c8de3be
-
SSDEEP
384:Yc/k09yBB7RBADETZc3+QrB4EXZcs7xaaMrbTywSUIk:07XmES+QrB4EXZX7/cnnSk
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2232 1820 DCRLC.exe 31 PID 1820 wrote to memory of 2232 1820 DCRLC.exe 31 PID 1820 wrote to memory of 2232 1820 DCRLC.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\[CRACKED BY L1nc0In] NEW DCRat\DCRat\data\DCRLC.exe"C:\Users\Admin\AppData\Local\Temp\[CRACKED BY L1nc0In] NEW DCRat\DCRat\data\DCRLC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1820 -s 5202⤵PID:2232
-