Edit tour
Windows
Analysis Report
VDoUCMbcmz.exe
Overview
General Information
Sample name: | VDoUCMbcmz.exerenamed because original name is a hash value |
Original sample name: | 95ce095073ce57e823674de34b621cdb.exe |
Analysis ID: | 1587270 |
MD5: | 95ce095073ce57e823674de34b621cdb |
SHA1: | 129a46af1ad0ad1a15f6f3df3e1ee5e1147ae004 |
SHA256: | b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72 |
Tags: | DCRatexeuser-abuse_ch |
Infos: | |
Detection
DCRat
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Suricata IDS alerts for network traffic
Yara detected DCRat
AI detected suspicious sample
Creates processes via WMI
Drops PE files to the user root directory
Drops PE files with benign system names
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Files With System Process Name In Unsuspected Locations
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the user directory
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- VDoUCMbcmz.exe (PID: 5556 cmdline:
"C:\Users\ user\Deskt op\VDoUCMb cmz.exe" MD5: 95CE095073CE57E823674DE34B621CDB) - schtasks.exe (PID: 6408 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 7 / tr "'C:\Pr ogram File s (x86)\wi ndows defe nder\opMiS byjgBskypP puTlJgIZ.e xe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 2836 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZ" /sc ONLOG ON /tr "'C :\Program Files (x86 )\windows defender\o pMiSbyjgBs kypPpuTlJg IZ.exe'" / rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 3816 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 11 /tr "'C:\P rogram Fil es (x86)\w indows def ender\opMi SbyjgBskyp PpuTlJgIZ. exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 4564 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 9 / tr "'C:\Pr ogram File s (x86)\co mmon files \Java\Java Update\op MiSbyjgBsk ypPpuTlJgI Z.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7136 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZ" /sc ONLOG ON /tr "'C :\Program Files (x86 )\common f iles\Java\ Java Updat e\opMiSbyj gBskypPpuT lJgIZ.exe' " /rl HIGH EST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 348 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 13 /tr "'C:\P rogram Fil es (x86)\c ommon file s\Java\Jav a Update\o pMiSbyjgBs kypPpuTlJg IZ.exe'" / rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 2704 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 13 /tr "'C:\U sers\user\ opMiSbyjgB skypPpuTlJ gIZ.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 2920 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZ" /sc ONLOG ON /tr "'C :\Users\us er\opMiSby jgBskypPpu TlJgIZ.exe '" /rl HIG HEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 1496 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 9 / tr "'C:\Us ers\user\o pMiSbyjgBs kypPpuTlJg IZ.exe'" / rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 5756 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 8 / tr "'C:\Us ers\user\D ownloads\o pMiSbyjgBs kypPpuTlJg IZ.exe'" / f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 5276 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZ" /sc ONLOG ON /tr "'C :\Users\us er\Downloa ds\opMiSby jgBskypPpu TlJgIZ.exe '" /rl HIG HEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 4460 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 10 /tr "'C:\U sers\user\ Downloads\ opMiSbyjgB skypPpuTlJ gIZ.exe'" /rl HIGHES T /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 6352 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 13 /tr "'C:\P rogram Fil es\Windows Security\ BrowserCor e\en-US\op MiSbyjgBsk ypPpuTlJgI Z.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 6564 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZ" /sc ONLOG ON /tr "'C :\Program Files\Wind ows Securi ty\Browser Core\en-US \opMiSbyjg BskypPpuTl JgIZ.exe'" /rl HIGHE ST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 5472 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 13 /tr "'C:\P rogram Fil es\Windows Security\ BrowserCor e\en-US\op MiSbyjgBsk ypPpuTlJgI Z.exe'" /r l HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 5508 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 12 /tr "'C:\P rogram Fil es (x86)\m ozilla mai ntenance s ervice\log s\opMiSbyj gBskypPpuT lJgIZ.exe' " /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 616 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZ" /sc ONLOG ON /tr "'C :\Program Files (x86 )\mozilla maintenanc e service\ logs\opMiS byjgBskypP puTlJgIZ.e xe'" /rl H IGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 5408 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 9 / tr "'C:\Pr ogram File s (x86)\mo zilla main tenance se rvice\logs \opMiSbyjg BskypPpuTl JgIZ.exe'" /rl HIGHE ST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 2860 cmdline:
schtasks.e xe /create /tn "VDoU CMbcmzV" / sc MINUTE /mo 10 /tr "'C:\Reco very\VDoUC Mbcmz.exe' " /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 5452 cmdline:
schtasks.e xe /create /tn "VDoU CMbcmz" /s c ONLOGON /tr "'C:\R ecovery\VD oUCMbcmz.e xe'" /rl H IGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 5484 cmdline:
schtasks.e xe /create /tn "VDoU CMbcmzV" / sc MINUTE /mo 11 /tr "'C:\Reco very\VDoUC Mbcmz.exe' " /rl HIGH EST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 2676 cmdline:
schtasks.e xe /create /tn "smss s" /sc MIN UTE /mo 11 /tr "'C:\ Recovery\s mss.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 3712 cmdline:
schtasks.e xe /create /tn "smss " /sc ONLO GON /tr "' C:\Recover y\smss.exe '" /rl HIG HEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 6576 cmdline:
schtasks.e xe /create /tn "smss s" /sc MIN UTE /mo 7 /tr "'C:\R ecovery\sm ss.exe'" / rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 3288 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 7 / tr "'C:\Wi ndows\BitL ockerDisco veryVolume Contents\o pMiSbyjgBs kypPpuTlJg IZ.exe'" / f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 6204 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZ" /sc ONLOG ON /tr "'C :\Windows\ BitLockerD iscoveryVo lumeConten ts\opMiSby jgBskypPpu TlJgIZ.exe '" /rl HIG HEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 1600 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 8 / tr "'C:\Wi ndows\BitL ockerDisco veryVolume Contents\o pMiSbyjgBs kypPpuTlJg IZ.exe'" / rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 1480 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 5 / tr "'C:\Wi ndows\Temp \Crashpad\ opMiSbyjgB skypPpuTlJ gIZ.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 4788 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZ" /sc ONLOG ON /tr "'C :\Windows\ Temp\Crash pad\opMiSb yjgBskypPp uTlJgIZ.ex e'" /rl HI GHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 3128 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 8 / tr "'C:\Wi ndows\Temp \Crashpad\ opMiSbyjgB skypPpuTlJ gIZ.exe'" /rl HIGHES T /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 5252 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 13 /tr "'C:\W indows\Ins taller\{AC 76BA86-103 3-1033-776 0-BC15014E A700}\opMi SbyjgBskyp PpuTlJgIZ. exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 1732 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZ" /sc ONLOG ON /tr "'C :\Windows\ Installer\ {AC76BA86- 1033-1033- 7760-BC150 14EA700}\o pMiSbyjgBs kypPpuTlJg IZ.exe'" / rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 4508 cmdline:
schtasks.e xe /create /tn "opMi SbyjgBskyp PpuTlJgIZo " /sc MINU TE /mo 11 /tr "'C:\W indows\Ins taller\{AC 76BA86-103 3-1033-776 0-BC15014E A700}\opMi SbyjgBskyp PpuTlJgIZ. exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 5276 cmdline:
schtasks.e xe /create /tn "lsas sl" /sc MI NUTE /mo 9 /tr "'C:\ Users\Defa ult\NetHoo d\lsass.ex e'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
- opMiSbyjgBskypPpuTlJgIZ.exe (PID: 2684 cmdline:
"C:\Progra m Files (x 86)\mozill a maintena nce servic e\logs\opM iSbyjgBsky pPpuTlJgIZ .exe" MD5: 95CE095073CE57E823674DE34B621CDB)
- opMiSbyjgBskypPpuTlJgIZ.exe (PID: 6728 cmdline:
"C:\Progra m Files (x 86)\mozill a maintena nce servic e\logs\opM iSbyjgBsky pPpuTlJgIZ .exe" MD5: 95CE095073CE57E823674DE34B621CDB)
- VDoUCMbcmz.exe (PID: 4352 cmdline:
C:\Recover y\VDoUCMbc mz.exe MD5: 95CE095073CE57E823674DE34B621CDB)
- VDoUCMbcmz.exe (PID: 1848 cmdline:
C:\Recover y\VDoUCMbc mz.exe MD5: 95CE095073CE57E823674DE34B621CDB)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
{"SCRT": "{\"M\":\"$\",\"x\":\"<\",\"C\":\"!\",\"b\":\";\",\"A\":\"%\",\"N\":\"*\",\"m\":\"-\",\"V\":\"~\",\"0\":\"`\",\"U\":\"@\",\"Z\":\"|\",\"6\":\")\",\"d\":\"(\",\"h\":\">\",\"W\":\",\",\"S\":\" \",\"y\":\"#\",\"l\":\"_\",\"5\":\"^\",\"I\":\".\",\"v\":\"&\"}", "PCRT": "{\"n\":\"$\",\"F\":\"!\",\"Q\":\"%\",\"B\":\",\",\"N\":\"<\",\"W\":\")\",\"J\":\" \",\"I\":\"_\",\"U\":\">\",\"V\":\"(\",\"s\":\"*\",\"d\":\"#\",\"G\":\";\",\"9\":\".\",\"v\":\"@\",\"2\":\"-\",\"H\":\"&\",\"0\":\"^\",\"l\":\"`\",\"C\":\"|\",\"c\":\"~\"}", "TAG": "", "MUTEX": "DCR_MUTEX-CcB2eNkC6QXTKoqoyIu3", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 1, "ASCFG": {"searchpath": "%UsersFolder% - Fast"}, "AS": false, "ASO": false, "AD": false}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_3 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
Click to see the 11 entries |
System Summary |
---|
Source: | Author: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Persistence and Installation Behavior |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T02:17:07.461625+0100 | 2034194 | 1 | A Network Trojan was detected | 192.168.2.5 | 49704 | 5.101.152.15 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T02:17:19.711696+0100 | 2850862 | 1 | Malware Command and Control Activity Detected | 5.101.152.15 | 80 | 192.168.2.5 | 49707 | TCP |
2025-01-10T02:18:41.266792+0100 | 2850862 | 1 | Malware Command and Control Activity Detected | 5.101.152.15 | 80 | 192.168.2.5 | 49770 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior |
Source: | Static PE information: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | ASN Name: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |