Edit tour
Windows
Analysis Report
jmBb9uY1B8.exe
Overview
General Information
Sample name: | jmBb9uY1B8.exerenamed because original name is a hash value |
Original sample name: | 5d232371c6b04bf6e609ee14fc06f3f6.exe |
Analysis ID: | 1584524 |
MD5: | 5d232371c6b04bf6e609ee14fc06f3f6 |
SHA1: | d6b7e0e98b0bd964ce6b2256f7c3f52ea2ec39ba |
SHA256: | 05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1 |
Tags: | DCRatexeuser-abuse_ch |
Infos: | |
Detection
DCRat
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Suricata IDS alerts for network traffic
Yara detected DCRat
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Creates processes via WMI
Disable UAC(promptonsecuredesktop)
Disables UAC (registry)
Drops executable to a common third party application directory
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Creates or modifies windows services
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
PE file contains executable resources (Code or Archives)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match
Classification
- System is w10x64
- jmBb9uY1B8.exe (PID: 6784 cmdline:
"C:\Users\ user\Deskt op\jmBb9uY 1B8.exe" MD5: 5D232371C6B04BF6E609EE14FC06F3F6) - schtasks.exe (PID: 7232 cmdline:
schtasks.e xe /create /tn "Runt imeBrokerR " /sc MINU TE /mo 6 / tr "'C:\Re covery\Run timeBroker .exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7280 cmdline:
schtasks.e xe /create /tn "Runt imeBroker" /sc ONLOG ON /tr "'C :\Recovery \RuntimeBr oker.exe'" /rl HIGHE ST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7300 cmdline:
schtasks.e xe /create /tn "Runt imeBrokerR " /sc MINU TE /mo 7 / tr "'C:\Re covery\Run timeBroker .exe'" /rl HIGHEST / f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7320 cmdline:
schtasks.e xe /create /tn "Sgrm BrokerS" / sc MINUTE /mo 7 /tr "'C:\Windo ws\twain_3 2\SgrmBrok er.exe'" / f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7340 cmdline:
schtasks.e xe /create /tn "Sgrm Broker" /s c ONLOGON /tr "'C:\W indows\twa in_32\Sgrm Broker.exe '" /rl HIG HEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7356 cmdline:
schtasks.e xe /create /tn "Sgrm BrokerS" / sc MINUTE /mo 6 /tr "'C:\Windo ws\twain_3 2\SgrmBrok er.exe'" / rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7384 cmdline:
schtasks.e xe /create /tn "siho sts" /sc M INUTE /mo 7 /tr "'C: \Users\All Users\sih ost.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7400 cmdline:
schtasks.e xe /create /tn "siho st" /sc ON LOGON /tr "'C:\Users \All Users \sihost.ex e'" /rl HI GHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7416 cmdline:
schtasks.e xe /create /tn "siho sts" /sc M INUTE /mo 14 /tr "'C :\Users\Al l Users\si host.exe'" /rl HIGHE ST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7432 cmdline:
schtasks.e xe /create /tn "MwDx nowBVCiAiI llnkPsM" / sc MINUTE /mo 12 /tr "'C:\Wind ows\PLA\Te mplates\Mw DxnowBVCiA iIllnkPs.e xe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7448 cmdline:
schtasks.e xe /create /tn "MwDx nowBVCiAiI llnkPs" /s c ONLOGON /tr "'C:\W indows\PLA \Templates \MwDxnowBV CiAiIllnkP s.exe'" /r l HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7464 cmdline:
schtasks.e xe /create /tn "MwDx nowBVCiAiI llnkPsM" / sc MINUTE /mo 10 /tr "'C:\Wind ows\PLA\Te mplates\Mw DxnowBVCiA iIllnkPs.e xe'" /rl H IGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7480 cmdline:
schtasks.e xe /create /tn "MwDx nowBVCiAiI llnkPsM" / sc MINUTE /mo 11 /tr "'C:\Prog ram Files (x86)\inte rnet explo rer\en-GB\ MwDxnowBVC iAiIllnkPs .exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7496 cmdline:
schtasks.e xe /create /tn "MwDx nowBVCiAiI llnkPs" /s c ONLOGON /tr "'C:\P rogram Fil es (x86)\i nternet ex plorer\en- GB\MwDxnow BVCiAiIlln kPs.exe'" /rl HIGHES T /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7512 cmdline:
schtasks.e xe /create /tn "MwDx nowBVCiAiI llnkPsM" / sc MINUTE /mo 6 /tr "'C:\Progr am Files ( x86)\inter net explor er\en-GB\M wDxnowBVCi AiIllnkPs. exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7528 cmdline:
schtasks.e xe /create /tn "MwDx nowBVCiAiI llnkPsM" / sc MINUTE /mo 6 /tr "'C:\Windo ws\IME\IME TC\HELP\Mw DxnowBVCiA iIllnkPs.e xe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7544 cmdline:
schtasks.e xe /create /tn "MwDx nowBVCiAiI llnkPs" /s c ONLOGON /tr "'C:\W indows\IME \IMETC\HEL P\MwDxnowB VCiAiIllnk Ps.exe'" / rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7560 cmdline:
schtasks.e xe /create /tn "MwDx nowBVCiAiI llnkPsM" / sc MINUTE /mo 12 /tr "'C:\Wind ows\IME\IM ETC\HELP\M wDxnowBVCi AiIllnkPs. exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7576 cmdline:
schtasks.e xe /create /tn "MwDx nowBVCiAiI llnkPsM" / sc MINUTE /mo 10 /tr "'C:\Reco very\MwDxn owBVCiAiIl lnkPs.exe' " /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7592 cmdline:
schtasks.e xe /create /tn "MwDx nowBVCiAiI llnkPs" /s c ONLOGON /tr "'C:\R ecovery\Mw DxnowBVCiA iIllnkPs.e xe'" /rl H IGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7608 cmdline:
schtasks.e xe /create /tn "MwDx nowBVCiAiI llnkPsM" / sc MINUTE /mo 14 /tr "'C:\Reco very\MwDxn owBVCiAiIl lnkPs.exe' " /rl HIGH EST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7624 cmdline:
schtasks.e xe /create /tn "Star tMenuExper ienceHostS " /sc MINU TE /mo 10 /tr "'C:\P rogram Fil es (x86)\j downloader \StartMenu Experience Host.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7640 cmdline:
schtasks.e xe /create /tn "Star tMenuExper ienceHost" /sc ONLOG ON /tr "'C :\Program Files (x86 )\jdownloa der\StartM enuExperie nceHost.ex e'" /rl HI GHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7656 cmdline:
schtasks.e xe /create /tn "Star tMenuExper ienceHostS " /sc MINU TE /mo 9 / tr "'C:\Pr ogram File s (x86)\jd ownloader\ StartMenuE xperienceH ost.exe'" /rl HIGHES T /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7672 cmdline:
schtasks.e xe /create /tn "MwDx nowBVCiAiI llnkPsM" / sc MINUTE /mo 12 /tr "'C:\Wind ows\Panthe r\setup.ex e\MwDxnowB VCiAiIllnk Ps.exe'" / f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7688 cmdline:
schtasks.e xe /create /tn "MwDx nowBVCiAiI llnkPs" /s c ONLOGON /tr "'C:\W indows\Pan ther\setup .exe\MwDxn owBVCiAiIl lnkPs.exe' " /rl HIGH EST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7704 cmdline:
schtasks.e xe /create /tn "MwDx nowBVCiAiI llnkPsM" / sc MINUTE /mo 13 /tr "'C:\Wind ows\Panthe r\setup.ex e\MwDxnowB VCiAiIllnk Ps.exe'" / rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - MwDxnowBVCiAiIllnkPs.exe (PID: 7744 cmdline:
"C:\Progra m Files (x 86)\intern et explore r\en-GB\Mw DxnowBVCiA iIllnkPs.e xe" MD5: 5D232371C6B04BF6E609EE14FC06F3F6)
- MwDxnowBVCiAiIllnkPs.exe (PID: 7804 cmdline:
C:\Windows \Panther\s etup.exe\M wDxnowBVCi AiIllnkPs. exe MD5: 5D232371C6B04BF6E609EE14FC06F3F6)
- MwDxnowBVCiAiIllnkPs.exe (PID: 7820 cmdline:
C:\Windows \Panther\s etup.exe\M wDxnowBVCi AiIllnkPs. exe MD5: 5D232371C6B04BF6E609EE14FC06F3F6)
- RuntimeBroker.exe (PID: 7856 cmdline:
C:\Recover y\RuntimeB roker.exe MD5: 5D232371C6B04BF6E609EE14FC06F3F6)
- RuntimeBroker.exe (PID: 7872 cmdline:
C:\Recover y\RuntimeB roker.exe MD5: 5D232371C6B04BF6E609EE14FC06F3F6)
- SgrmBroker.exe (PID: 7928 cmdline:
C:\Windows \twain_32\ SgrmBroker .exe MD5: 5D232371C6B04BF6E609EE14FC06F3F6)
- SgrmBroker.exe (PID: 7964 cmdline:
C:\Windows \twain_32\ SgrmBroker .exe MD5: 5D232371C6B04BF6E609EE14FC06F3F6)
- sihost.exe (PID: 7980 cmdline:
"C:\Users\ All Users\ sihost.exe " MD5: 5D232371C6B04BF6E609EE14FC06F3F6)
- sihost.exe (PID: 7992 cmdline:
"C:\Users\ All Users\ sihost.exe " MD5: 5D232371C6B04BF6E609EE14FC06F3F6)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
{"SCRT": "{\"2\":\",\",\"m\":\"#\",\"M\":\"!\",\"N\":\"&\",\"0\":\"*\",\"6\":\")\",\"o\":\"`\",\"y\":\"@\",\"9\":\"(\",\"W\":\"$\",\"d\":\"|\",\"I\":\"-\",\"l\":\".\",\"C\":\">\",\"k\":\"<\",\"J\":\"^\",\"x\":\"~\",\"5\":\"%\",\"i\":\";\",\"a\":\"_\",\"w\":\" \"}", "PCRT": "{\"B\":\"&\",\"F\":\"!\",\"D\":\"_\",\"R\":\"%\",\"h\":\"|\",\"l\":\"`\",\"Q\":\";\",\"E\":\"~\",\"n\":\"@\",\"U\":\" \",\"s\":\"-\",\"C\":\")\",\"Z\":\"<\",\"a\":\"$\",\"S\":\">\",\"z\":\"(\",\"p\":\"*\",\"0\":\".\",\"V\":\",\",\"d\":\"#\",\"g\":\"^\"}", "TAG": "", "MUTEX": "DCR_MUTEX-aQsTso1bC14ju6vHfjNs", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 1, "ASCFG": {"searchpath": "%UsersFolder% - Fast"}, "AS": false, "ASO": false, "AD": false}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_3 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
Click to see the 23 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
INDICATOR_SUSPICIOUS_References_SecTools_B64Encoded | Detects executables referencing many base64-encoded IR and analysis tools names | ditekSHen |
|
System Summary |
---|
Source: | Author: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: |
Persistence and Installation Behavior |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T18:57:05.858307+0100 | 2034194 | 1 | A Network Trojan was detected | 192.168.2.4 | 49739 | 5.101.152.15 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T18:57:52.937988+0100 | 2850862 | 1 | Malware Command and Control Activity Detected | 5.101.152.15 | 80 | 192.168.2.4 | 49750 | TCP |
2025-01-05T18:59:20.434384+0100 | 2850862 | 1 | Malware Command and Control Activity Detected | 5.101.152.15 | 80 | 192.168.2.4 | 50031 | TCP |
2025-01-05T19:00:36.572534+0100 | 2850862 | 1 | Malware Command and Control Activity Detected | 5.101.152.15 | 80 | 192.168.2.4 | 50044 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 31_2_00007FFD9BA97DB1 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | ASN Name: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |