Edit tour
Windows
Analysis Report
onlysteal.exe
Overview
General Information
Detection
DCRat
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DCRat
.NET source code contains potential unpacker
.NET source code contains very large strings
AI detected suspicious sample
Drops PE files with benign system names
Drops executable to a common third party application directory
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Suspicious Program Location with Network Connections
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- onlysteal.exe (PID: 716 cmdline:
"C:\Users\ user\Deskt op\onlyste al.exe" MD5: 8F81AC89B9F6DBCCF07A86AF59FAA6BA) - wscript.exe (PID: 6284 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\In torefnet\w F0tJ2zNcma fpzDn9Ons. vbe" MD5: FF00E0480075B095948000BDC66E81F0) - cmd.exe (PID: 5880 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Into refnet\Te6 0v9QbFjSF8 KEQUR.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5292 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - hyperBlockCrtCommon.exe (PID: 2016 cmdline:
"C:\Intore fnet/hyper BlockCrtCo mmon.exe" MD5: 88475FFCF70BAFDA27644064BD214F2A) - cmd.exe (PID: 2420 cmdline:
"C:\Window s\System32 \cmd.exe" /C "C:\Use rs\user\Ap pData\Loca l\Temp\fmC yxdZe80.ba t" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 1976 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - chcp.com (PID: 2268 cmdline:
chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32) - PING.EXE (PID: 5952 cmdline:
ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D) - SgrmBroker.exe (PID: 7160 cmdline:
"C:\Users\ Default\St art Menu\P rograms\Sg rmBroker.e xe" MD5: 88475FFCF70BAFDA27644064BD214F2A) - cmd.exe (PID: 5656 cmdline:
"C:\Window s\System32 \cmd.exe" /C "C:\Use rs\user\Ap pData\Loca l\Temp\zuh vZR4ed0.ba t" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 2720 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - chcp.com (PID: 3300 cmdline:
chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32) - w32tm.exe (PID: 4156 cmdline:
w32tm /str ipchart /c omputer:lo calhost /p eriod:5 /d ataonly /s amples:2 MD5: 81A82132737224D324A3E8DA993E2FB5) - SgrmBroker.exe (PID: 1488 cmdline:
"C:\Users\ Default\St art Menu\P rograms\Sg rmBroker.e xe" MD5: 88475FFCF70BAFDA27644064BD214F2A) - cmd.exe (PID: 4236 cmdline:
"C:\Window s\System32 \cmd.exe" /C "C:\Use rs\user\Ap pData\Loca l\Temp\szc APjpm25.ba t" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 1112 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - chcp.com (PID: 6368 cmdline:
chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32) - PING.EXE (PID: 4888 cmdline:
ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D) - SgrmBroker.exe (PID: 1864 cmdline:
"C:\Users\ Default\St art Menu\P rograms\Sg rmBroker.e xe" MD5: 88475FFCF70BAFDA27644064BD214F2A) - cmd.exe (PID: 3220 cmdline:
"C:\Window s\System32 \cmd.exe" /C "C:\Use rs\user\Ap pData\Loca l\Temp\Y6U f3masa9.ba t" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5360 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - chcp.com (PID: 6256 cmdline:
chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32) - w32tm.exe (PID: 796 cmdline:
w32tm /str ipchart /c omputer:lo calhost /p eriod:5 /d ataonly /s amples:2 MD5: 81A82132737224D324A3E8DA993E2FB5) - SgrmBroker.exe (PID: 5372 cmdline:
"C:\Users\ Default\St art Menu\P rograms\Sg rmBroker.e xe" MD5: 88475FFCF70BAFDA27644064BD214F2A)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
{"C2 url": "http://185.216.71.25/PollgeoprocessorprotectbasewordpresswpLocal"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Tim Shelton: |
Source: | Author: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Tim Shelton: |
Source: | Author: Michael Haag: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-03T09:10:33.122779+0100 | 2048095 | 1 | A Network Trojan was detected | 192.168.2.6 | 49746 | 185.216.71.25 | 80 | TCP |
2025-01-03T09:11:00.557774+0100 | 2048095 | 1 | A Network Trojan was detected | 192.168.2.6 | 49377 | 185.216.71.25 | 80 | TCP |
2025-01-03T09:11:59.621339+0100 | 2048095 | 1 | A Network Trojan was detected | 192.168.2.6 | 49431 | 185.216.71.25 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_0023A69B | |
Source: | Code function: | 0_2_0024C220 | |
Source: | Code function: | 0_2_0025B348 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 5_2_00007FFD3488C6ED | |
Source: | Code function: | 5_2_00007FFD34A64540 | |
Source: | Code function: | 11_2_00007FFD348AC6ED | |
Source: | Code function: | 17_2_00007FFD348CC6ED | |
Source: | Code function: | 22_2_00007FFD3489C6ED | |
Source: | Code function: | 27_2_00007FFD3489C6ED |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Process created: |
Source: | TCP traffic: |
Source: | ASN Name: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Long String: | ||
Source: | Long String: |
Source: | COM Object queried: | Jump to behavior |
Source: | Code function: | 0_2_00236FAA |
Source: | Code function: | 0_2_0023848E | |
Source: | Code function: | 0_2_002400B7 | |
Source: | Code function: | 0_2_00244088 | |
Source: | Code function: | 0_2_002340FE | |
Source: | Code function: | 0_2_00247153 | |
Source: | Code function: | 0_2_002551C9 | |
Source: | Code function: | 0_2_002332F7 | |
Source: | Code function: | 0_2_002462CA | |
Source: | Code function: | 0_2_002443BF | |
Source: | Code function: | 0_2_0023C426 | |
Source: | Code function: | 0_2_0023F461 | |
Source: | Code function: | 0_2_0025D440 | |
Source: | Code function: | 0_2_002477EF | |
Source: | Code function: | 0_2_0023286B | |
Source: | Code function: | 0_2_0025D8EE | |
Source: | Code function: | 0_2_0023E9B7 | |
Source: | Code function: | 0_2_002619F4 | |
Source: | Code function: | 0_2_00246CDC | |
Source: | Code function: | 0_2_00243E0B | |
Source: | Code function: | 0_2_00254F9A | |
Source: | Code function: | 0_2_0023EFE2 | |
Source: | Code function: | 5_2_00007FFD34891D55 | |
Source: | Code function: | 5_2_00007FFD34881EC3 | |
Source: | Code function: | 5_2_00007FFD348F08E1 | |
Source: | Code function: | 11_2_00007FFD348B1D55 | |
Source: | Code function: | 11_2_00007FFD348A1EC3 | |
Source: | Code function: | 11_2_00007FFD349108E1 | |
Source: | Code function: | 11_2_00007FFD348A5BF2 | |
Source: | Code function: | 11_2_00007FFD34A80AED | |
Source: | Code function: | 11_2_00007FFD34A8209D | |
Source: | Code function: | 17_2_00007FFD348D1D55 | |
Source: | Code function: | 17_2_00007FFD348C1EC3 | |
Source: | Code function: | 17_2_00007FFD349308E1 | |
Source: | Code function: | 17_2_00007FFD348C5BF2 | |
Source: | Code function: | 22_2_00007FFD348A1D55 | |
Source: | Code function: | 22_2_00007FFD34891EC3 | |
Source: | Code function: | 22_2_00007FFD349008E1 | |
Source: | Code function: | 22_2_00007FFD34A70AED | |
Source: | Code function: | 22_2_00007FFD34A7209D | |
Source: | Code function: | 27_2_00007FFD3490337B | |
Source: | Code function: | 27_2_00007FFD34902AF3 | |
Source: | Code function: | 27_2_00007FFD349029F2 | |
Source: | Code function: | 27_2_00007FFD349027ED | |
Source: | Code function: | 27_2_00007FFD34891EC3 | |
Source: | Code function: | 27_2_00007FFD348A1D55 | |
Source: | Code function: | 27_2_00007FFD349008E1 | |
Source: | Code function: | 27_2_00007FFD34A70AED | |
Source: | Code function: | 27_2_00007FFD34A7209D | |
Source: | Code function: | 27_2_00007FFD348A2961 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Base64 encoded string: |