Edit tour
Windows
Analysis Report
ogVinh0jhq.exe
Overview
General Information
Sample name: | ogVinh0jhq.exerenamed because original name is a hash value |
Original sample name: | 11233270109a3d109a5e332c13c47f86.exe |
Analysis ID: | 1583534 |
MD5: | 11233270109a3d109a5e332c13c47f86 |
SHA1: | 37a57b1b1850ac7927f827d8748627b3007a798c |
SHA256: | 757ddfaea3c3fe1d283195f096eebe58fb45d87359773e3a53a983d5b78a6f04 |
Tags: | DCRatexeuser-abuse_ch |
Infos: | |
Detection
DCRat
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DCRat
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Connects to a pastebin service (likely for C&C)
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Creates processes via WMI
Found many strings related to Crypto-Wallets (likely being stolen)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: System File Execution Location Anomaly
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: CurrentVersion NT Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- ogVinh0jhq.exe (PID: 7456 cmdline:
"C:\Users\ user\Deskt op\ogVinh0 jhq.exe" MD5: 11233270109A3D109A5E332C13C47F86) - powershell.exe (PID: 7588 cmdline:
"powershel l" -Comman d Add-MpPr eference - ExclusionP ath 'C:\Us ers\user\D esktop\ogV inh0jhq.ex e' MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7604 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7596 cmdline:
"powershel l" -Comman d Add-MpPr eference - ExclusionP ath 'C:/Us ers/user/A ppData/Loc al/Microso ft/Windows /Explorer\ RuntimeBro ker.exe' MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7620 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - ogVinh0jhq.exe (PID: 7844 cmdline:
"C:\Users\ user\Deskt op\ogVinh0 jhq.exe" MD5: 11233270109A3D109A5E332C13C47F86) - powershell.exe (PID: 8104 cmdline:
"powershel l" -Comman d Add-MpPr eference - ExclusionP ath 'C:\Us ers\user\D esktop\ogV inh0jhq.ex e' MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 8120 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 8112 cmdline:
"powershel l" -Comman d Add-MpPr eference - ExclusionP ath 'C:/Us ers/user/A ppData/Loc al/Microso ft/Windows /Explorer\ ITlIQtTGhE yfMRHaLp.e xe' MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 8132 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WmiPrvSE.exe (PID: 2992 cmdline:
C:\Windows \system32\ wbem\wmipr vse.exe -s ecured -Em bedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51) - cmd.exe (PID: 5960 cmdline:
"C:\Window s\System32 \cmd.exe" /C "C:\Use rs\user\Ap pData\Loca l\Temp\TJH XkWh8sx.ba t" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6160 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - w32tm.exe (PID: 4464 cmdline:
w32tm /str ipchart /c omputer:lo calhost /p eriod:5 /d ataonly /s amples:2 MD5: 81A82132737224D324A3E8DA993E2FB5) - ogVinh0jhq.exe (PID: 7480 cmdline:
"C:\Users\ user\Deskt op\ogVinh0 jhq.exe" MD5: 11233270109A3D109A5E332C13C47F86)
- RuntimeBroker.exe (PID: 7812 cmdline:
C:/Users/u ser/AppDat a/Local/Mi crosoft/Wi ndows/Expl orer\Runti meBroker.e xe MD5: 11233270109A3D109A5E332C13C47F86)
- RuntimeBroker.exe (PID: 7836 cmdline:
C:/Users/u ser/AppDat a/Local/Mi crosoft/Wi ndows/Expl orer\Runti meBroker.e xe MD5: 11233270109A3D109A5E332C13C47F86)
- ITlIQtTGhEyfMRHaLp.exe (PID: 8036 cmdline:
C:/Users/u ser/AppDat a/Local/Mi crosoft/Wi ndows/Expl orer\ITlIQ tTGhEyfMRH aLp.exe MD5: 11233270109A3D109A5E332C13C47F86)
- ITlIQtTGhEyfMRHaLp.exe (PID: 8048 cmdline:
C:/Users/u ser/AppDat a/Local/Mi crosoft/Wi ndows/Expl orer\ITlIQ tTGhEyfMRH aLp.exe MD5: 11233270109A3D109A5E332C13C47F86)
- RuntimeBroker.exe (PID: 7456 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\W indows\Exp lorer\Runt imeBroker. exe" MD5: 11233270109A3D109A5E332C13C47F86)
- ITlIQtTGhEyfMRHaLp.exe (PID: 3652 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\W indows\Exp lorer\ITlI QtTGhEyfMR HaLp.exe" MD5: 11233270109A3D109A5E332C13C47F86)
- RuntimeBroker.exe (PID: 1436 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\W indows\Exp lorer\Runt imeBroker. exe" MD5: 11233270109A3D109A5E332C13C47F86)
- ITlIQtTGhEyfMRHaLp.exe (PID: 5696 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\W indows\Exp lorer\ITlI QtTGhEyfMR HaLp.exe" MD5: 11233270109A3D109A5E332C13C47F86)
- RuntimeBroker.exe (PID: 4592 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\W indows\Exp lorer\Runt imeBroker. exe" MD5: 11233270109A3D109A5E332C13C47F86)
- ITlIQtTGhEyfMRHaLp.exe (PID: 6536 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\W indows\Exp lorer\ITlI QtTGhEyfMR HaLp.exe" MD5: 11233270109A3D109A5E332C13C47F86)
- ITlIQtTGhEyfMRHaLp.exe (PID: 7640 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\W indows\Exp lorer\ITlI QtTGhEyfMR HaLp.exe" MD5: 11233270109A3D109A5E332C13C47F86)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
{"SCRT": "{\"w\":\".\",\"U\":\">\",\"y\":\"*\",\"v\":\" \",\"L\":\"`\",\"N\":\"~\",\"3\":\"#\",\"o\":\"$\",\"Y\":\"(\",\"i\":\"!\",\"m\":\"@\",\"F\":\"-\",\"R\":\";\",\"J\":\"|\",\"Q\":\"%\",\"S\":\",\",\"H\":\"<\",\"c\":\"&\",\"j\":\")\",\"M\":\"^\",\"b\":\"_\"}", "PCRT": "{\"B\":\"!\",\"U\":\"`\",\"C\":\"$\",\"Z\":\"(\",\"T\":\";\",\"X\":\"*\",\"S\":\"%\",\"N\":\"@\",\"Q\":\"^\",\"0\":\".\",\"M\":\"|\",\"3\":\"<\",\"n\":\">\",\"F\":\")\",\"W\":\"&\",\"l\":\" \",\"V\":\"-\",\"E\":\"#\",\"2\":\",\",\"J\":\"~\",\"p\":\"_\"}", "TAG": "", "MUTEX": "DCR_MUTEX-kOjrauLw58cHzMGU5vna", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 3, "AURD": "{SYSTEMDRIVE}/Users/{USERNAME}/AppData/Local/Microsoft/Windows/Explorer", "ASCFG": {"savebrowsersdatatosinglefile": false, "ignorepartiallyemptydata": false, "cookies": true, "passwords": true, "forms": true, "cc": true, "history": false, "telegram": true, "steam": true, "discord": true, "filezilla": true, "screenshot": true, "clipboard": true, "sysinfo": true, "searchpath": "%SystemDrive% - Slow"}, "AS": true, "ASO": true, "AD": false}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
Click to see the 40 entries |
System Summary |
---|
Source: | Author: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-03T00:27:13.768439+0100 | 2034194 | 1 | A Network Trojan was detected | 192.168.2.4 | 49733 | 141.8.192.151 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-03T00:27:43.567663+0100 | 2850862 | 1 | Malware Command and Control Activity Detected | 141.8.192.151 | 80 | 192.168.2.4 | 49743 | TCP |
2025-01-03T00:28:46.568351+0100 | 2850862 | 1 | Malware Command and Control Activity Detected | 141.8.192.151 | 80 | 192.168.2.4 | 50015 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | DNS query: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |