Edit tour
Windows
Analysis Report
CRf9KBk4ra.exe
Overview
General Information
Sample name: | CRf9KBk4ra.exerenamed because original name is a hash value |
Original sample name: | 8b7b1adcb1ea8edff9888558ef898054.exe |
Analysis ID: | 1583170 |
MD5: | 8b7b1adcb1ea8edff9888558ef898054 |
SHA1: | 65f2ff2c3a00621a5eaa1a9e89662950659222c2 |
SHA256: | 356c2aed44aef4579e0db1c31f4162e9dfa89f04589ddb14211afbbdf621a61b |
Tags: | DCRatexeuser-abuse_ch |
Infos: | |
Detection
DCRat
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Suricata IDS alerts for network traffic
Yara detected DCRat
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Connects to a pastebin service (likely for C&C)
Creates processes via WMI
Drops PE files with benign system names
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match
Classification
- System is w10x64
- CRf9KBk4ra.exe (PID: 7316 cmdline:
"C:\Users\ user\Deskt op\CRf9KBk 4ra.exe" MD5: 8B7B1ADCB1EA8EDFF9888558EF898054) - wscript.exe (PID: 7356 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\hy perBrowser monitorNet \BYhHcZyz. vbe" MD5: FF00E0480075B095948000BDC66E81F0) - cmd.exe (PID: 7436 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\hype rBrowsermo nitorNet\c yFyzmRWbIw TjqG.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7444 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - serverwinCommon.exe (PID: 7480 cmdline:
"C:\hyperB rowsermoni torNet\ser verwinComm on.exe" MD5: BB31080A1AC450BC92BE05ED245BBCEB) - schtasks.exe (PID: 7532 cmdline:
schtasks.e xe /create /tn "MImO LbdPzolqAC trpVpcRPdP WZgM" /sc MINUTE /mo 5 /tr "'C :\Recovery \MImOLbdPz olqACtrpVp cRPdPWZg.e xe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7552 cmdline:
schtasks.e xe /create /tn "MImO LbdPzolqAC trpVpcRPdP WZg" /sc O NLOGON /tr "'C:\Reco very\MImOL bdPzolqACt rpVpcRPdPW Zg.exe'" / rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7568 cmdline:
schtasks.e xe /create /tn "MImO LbdPzolqAC trpVpcRPdP WZgM" /sc MINUTE /mo 6 /tr "'C :\Recovery \MImOLbdPz olqACtrpVp cRPdPWZg.e xe'" /rl H IGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7584 cmdline:
schtasks.e xe /create /tn "csrs sc" /sc MI NUTE /mo 1 1 /tr "'C: \Recovery\ csrss.exe' " /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7600 cmdline:
schtasks.e xe /create /tn "csrs s" /sc ONL OGON /tr " 'C:\Recove ry\csrss.e xe'" /rl H IGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7616 cmdline:
schtasks.e xe /create /tn "csrs sc" /sc MI NUTE /mo 7 /tr "'C:\ Recovery\c srss.exe'" /rl HIGHE ST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7632 cmdline:
schtasks.e xe /create /tn "MImO LbdPzolqAC trpVpcRPdP WZgM" /sc MINUTE /mo 6 /tr "'C :\Windows\ TAPI\MImOL bdPzolqACt rpVpcRPdPW Zg.exe'" / f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7648 cmdline:
schtasks.e xe /create /tn "MImO LbdPzolqAC trpVpcRPdP WZg" /sc O NLOGON /tr "'C:\Wind ows\TAPI\M ImOLbdPzol qACtrpVpcR PdPWZg.exe '" /rl HIG HEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7664 cmdline:
schtasks.e xe /create /tn "MImO LbdPzolqAC trpVpcRPdP WZgM" /sc MINUTE /mo 12 /tr "' C:\Windows \TAPI\MImO LbdPzolqAC trpVpcRPdP WZg.exe'" /rl HIGHES T /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 7696 cmdline:
"C:\Window s\System32 \cmd.exe" /C "C:\Use rs\user\Ap pData\Loca l\Temp\KPL r9FsY2g.ba t" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7704 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - w32tm.exe (PID: 7740 cmdline:
w32tm /str ipchart /c omputer:lo calhost /p eriod:5 /d ataonly /s amples:2 MD5: 81A82132737224D324A3E8DA993E2FB5) - csrss.exe (PID: 8044 cmdline:
"C:\Recove ry\csrss.e xe" MD5: BB31080A1AC450BC92BE05ED245BBCEB)
- MImOLbdPzolqACtrpVpcRPdPWZg.exe (PID: 7776 cmdline:
C:\Windows \TAPI\MImO LbdPzolqAC trpVpcRPdP WZg.exe MD5: BB31080A1AC450BC92BE05ED245BBCEB)
- MImOLbdPzolqACtrpVpcRPdPWZg.exe (PID: 7800 cmdline:
C:\Windows \TAPI\MImO LbdPzolqAC trpVpcRPdP WZg.exe MD5: BB31080A1AC450BC92BE05ED245BBCEB)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
{"SCRT": "{\"Y\":\"*\",\"b\":\",\",\"o\":\"#\",\"I\":\">\",\"S\":\";\",\"B\":\"|\",\"Q\":\"%\",\"l\":\" \",\"9\":\"!\",\"R\":\"`\",\"L\":\"~\",\"m\":\"@\",\"J\":\"$\",\"v\":\"^\",\"z\":\"(\",\"d\":\"<\",\"i\":\".\",\"y\":\"&\",\"c\":\"_\",\"N\":\"-\",\"h\":\")\"}", "PCRT": "{\"3\":\"#\",\"p\":\"!\",\"J\":\"-\",\"U\":\"`\",\"K\":\"~\",\"9\":\"$\",\"B\":\"<\",\"M\":\")\",\"4\":\">\",\"F\":\",\",\"5\":\"_\",\"T\":\"^\",\"Y\":\"|\",\"x\":\"*\",\"H\":\".\",\"a\":\"&\",\"D\":\"%\",\"e\":\"(\",\"W\":\" \",\"Q\":\"@\",\"E\":\";\"}", "TAG": "", "MUTEX": "DCR_MUTEX-rHj2kN6jEI3wEL9YYclh", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 1, "ASCFG": {"searchpath": "%UsersFolder% - Fast"}, "AS": false, "ASO": false, "AD": false}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
Click to see the 6 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
INDICATOR_SUSPICIOUS_References_SecTools_B64Encoded | Detects executables referencing many base64-encoded IR and analysis tools names | ditekSHen |
|
System Summary |
---|
Source: | Author: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: |
Source: | Author: Michael Haag: |
Persistence and Installation Behavior |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-02T06:37:09.091579+0100 | 2034194 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 141.8.192.164 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Code function: | 0_2_0037A5F4 | |
Source: | Code function: | 0_2_0038B8E0 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |