Edit tour
Windows
Analysis Report
E6wUHnV51P.exe
Overview
General Information
Sample name: | E6wUHnV51P.exerenamed because original name is a hash value |
Original sample name: | b34673a6ae78f3a63160d7f87c92a6d4.exe |
Analysis ID: | 1589418 |
MD5: | b34673a6ae78f3a63160d7f87c92a6d4 |
SHA1: | 3e28a8ac30adf1ef1409d58d0b6949bb500b1a09 |
SHA256: | 5a47bbdd5a87677ce485cfa5eae97ce572dae896ec0fb306f8b4a2ad8d5f856c |
Tags: | DCRatexeuser-abuse_ch |
Infos: | |
Detection
DCRat
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Suricata IDS alerts for network traffic
Yara detected DCRat
AI detected suspicious sample
Connects to a pastebin service (likely for C&C)
Creates processes via WMI
Disable UAC(promptonsecuredesktop)
Disables UAC (registry)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Uses schtasks.exe or at.exe to add and modify task schedules
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Creates or modifies windows services
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- E6wUHnV51P.exe (PID: 7424 cmdline:
"C:\Users\ user\Deskt op\E6wUHnV 51P.exe" MD5: B34673A6AE78F3A63160D7F87C92A6D4) - schtasks.exe (PID: 7872 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs hl" /sc MI NUTE /mo 5 /tr "'C:\ Recovery\l lmdESoJWMB pGsh.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7892 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs h" /sc ONL OGON /tr " 'C:\Recove ry\llmdESo JWMBpGsh.e xe'" /rl H IGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7908 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs hl" /sc MI NUTE /mo 1 1 /tr "'C: \Recovery\ llmdESoJWM BpGsh.exe' " /rl HIGH EST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7928 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs hl" /sc MI NUTE /mo 7 /tr "'C:\ Recovery\l lmdESoJWMB pGsh.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7952 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs h" /sc ONL OGON /tr " 'C:\Recove ry\llmdESo JWMBpGsh.e xe'" /rl H IGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7968 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs hl" /sc MI NUTE /mo 6 /tr "'C:\ Recovery\l lmdESoJWMB pGsh.exe'" /rl HIGHE ST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7984 cmdline:
schtasks.e xe /create /tn "spps vcs" /sc M INUTE /mo 9 /tr "'C: \Users\Pub lic\Music\ sppsvc.exe '" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 8000 cmdline:
schtasks.e xe /create /tn "spps vc" /sc ON LOGON /tr "'C:\Users \Public\Mu sic\sppsvc .exe'" /rl HIGHEST / f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 8016 cmdline:
schtasks.e xe /create /tn "spps vcs" /sc M INUTE /mo 8 /tr "'C: \Users\Pub lic\Music\ sppsvc.exe '" /rl HIG HEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 8032 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs hl" /sc MI NUTE /mo 1 0 /tr "'C: \Program F iles (x86) \java\jre- 1.8\llmdES oJWMBpGsh. exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 8048 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs h" /sc ONL OGON /tr " 'C:\Progra m Files (x 86)\java\j re-1.8\llm dESoJWMBpG sh.exe'" / rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 8064 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs hl" /sc MI NUTE /mo 8 /tr "'C:\ Program Fi les (x86)\ java\jre-1 .8\llmdESo JWMBpGsh.e xe'" /rl H IGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 8080 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs hl" /sc MI NUTE /mo 1 3 /tr "'C: \Users\Pub lic\Accoun tPictures\ llmdESoJWM BpGsh.exe' " /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 8096 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs h" /sc ONL OGON /tr " 'C:\Users\ Public\Acc ountPictur es\llmdESo JWMBpGsh.e xe'" /rl H IGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 8112 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs hl" /sc MI NUTE /mo 1 3 /tr "'C: \Users\Pub lic\Accoun tPictures\ llmdESoJWM BpGsh.exe' " /rl HIGH EST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 8128 cmdline:
schtasks.e xe /create /tn "User OOBEBroker U" /sc MIN UTE /mo 6 /tr "'C:\W indows\Bra nding\Base brd\en-GB\ UserOOBEBr oker.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 8144 cmdline:
schtasks.e xe /create /tn "User OOBEBroker " /sc ONLO GON /tr "' C:\Windows \Branding\ Basebrd\en -GB\UserOO BEBroker.e xe'" /rl H IGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 8160 cmdline:
schtasks.e xe /create /tn "User OOBEBroker U" /sc MIN UTE /mo 12 /tr "'C:\ Windows\Br anding\Bas ebrd\en-GB \UserOOBEB roker.exe' " /rl HIGH EST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 8176 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs hl" /sc MI NUTE /mo 9 /tr "'C:\ Windows\Gl obalizatio n\llmdESoJ WMBpGsh.ex e'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7200 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs h" /sc ONL OGON /tr " 'C:\Window s\Globaliz ation\llmd ESoJWMBpGs h.exe'" /r l HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7176 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs hl" /sc MI NUTE /mo 5 /tr "'C:\ Windows\Gl obalizatio n\llmdESoJ WMBpGsh.ex e'" /rl HI GHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 6016 cmdline:
schtasks.e xe /create /tn "Runt imeBrokerR " /sc MINU TE /mo 8 / tr "'C:\Pr ogram File s (x86)\wi ndows phot o viewer\e n-GB\Runti meBroker.e xe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 600 cmdline:
schtasks.e xe /create /tn "Runt imeBroker" /sc ONLOG ON /tr "'C :\Program Files (x86 )\windows photo view er\en-GB\R untimeBrok er.exe'" / rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 6044 cmdline:
schtasks.e xe /create /tn "Runt imeBrokerR " /sc MINU TE /mo 5 / tr "'C:\Pr ogram File s (x86)\wi ndows phot o viewer\e n-GB\Runti meBroker.e xe'" /rl H IGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 5928 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs hl" /sc MI NUTE /mo 1 0 /tr "'C: \Program F iles (x86) \autoit3\l lmdESoJWMB pGsh.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 4940 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs h" /sc ONL OGON /tr " 'C:\Progra m Files (x 86)\autoit 3\llmdESoJ WMBpGsh.ex e'" /rl HI GHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 2032 cmdline:
schtasks.e xe /create /tn "llmd ESoJWMBpGs hl" /sc MI NUTE /mo 5 /tr "'C:\ Program Fi les (x86)\ autoit3\ll mdESoJWMBp Gsh.exe'" /rl HIGHES T /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 7312 cmdline:
"C:\Window s\System32 \cmd.exe" /C "C:\Use rs\user\Ap pData\Loca l\Temp\SOR B8kdlTO.ba t" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5544 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - w32tm.exe (PID: 7304 cmdline:
w32tm /str ipchart /c omputer:lo calhost /p eriod:5 /d ataonly /s amples:2 MD5: 81A82132737224D324A3E8DA993E2FB5)
- llmdESoJWMBpGsh.exe (PID: 1236 cmdline:
C:\Windows \Globaliza tion\llmdE SoJWMBpGsh .exe MD5: B34673A6AE78F3A63160D7F87C92A6D4)
- llmdESoJWMBpGsh.exe (PID: 2104 cmdline:
C:\Windows \Globaliza tion\llmdE SoJWMBpGsh .exe MD5: B34673A6AE78F3A63160D7F87C92A6D4)
- RuntimeBroker.exe (PID: 4080 cmdline:
"C:\Progra m Files (x 86)\window s photo vi ewer\en-GB \RuntimeBr oker.exe" MD5: B34673A6AE78F3A63160D7F87C92A6D4)
- sppsvc.exe (PID: 4432 cmdline:
C:\Users\P ublic\Musi c\sppsvc.e xe MD5: B34673A6AE78F3A63160D7F87C92A6D4)
- sppsvc.exe (PID: 4924 cmdline:
C:\Users\P ublic\Musi c\sppsvc.e xe MD5: B34673A6AE78F3A63160D7F87C92A6D4)
- UserOOBEBroker.exe (PID: 7072 cmdline:
C:\Windows \Branding\ Basebrd\en -GB\UserOO BEBroker.e xe MD5: B34673A6AE78F3A63160D7F87C92A6D4)
- UserOOBEBroker.exe (PID: 4444 cmdline:
C:\Windows \Branding\ Basebrd\en -GB\UserOO BEBroker.e xe MD5: B34673A6AE78F3A63160D7F87C92A6D4)
- RuntimeBroker.exe (PID: 8136 cmdline:
"C:\Progra m Files (x 86)\window s photo vi ewer\en-GB \RuntimeBr oker.exe" MD5: B34673A6AE78F3A63160D7F87C92A6D4)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
{"SCRT": "{\"L\":\",\",\"B\":\"-\",\"l\":\"<\",\"J\":\" \",\"N\":\"|\",\"p\":\"@\",\"c\":\"^\",\"a\":\"(\",\"e\":\"%\",\"X\":\"*\",\"b\":\">\",\"w\":\"#\",\"v\":\".\",\"I\":\"~\",\"j\":\"$\",\"E\":\"&\",\"o\":\")\",\"W\":\"_\",\"G\":\"!\",\"9\":\";\",\"i\":\"`\"}", "PCRT": "{\"V\":\")\",\"o\":\"$\",\"R\":\".\",\"U\":\",\",\"d\":\"-\",\"5\":\"~\",\"L\":\";\",\"0\":\">\",\"Z\":\"`\",\"W\":\"(\",\"M\":\"!\",\"Q\":\" \",\"F\":\"%\",\"T\":\"#\",\"a\":\"<\",\"w\":\"&\",\"Y\":\"^\",\"G\":\"*\",\"y\":\"@\",\"B\":\"_\",\"S\":\"|\"}", "TAG": "", "MUTEX": "DCR_MUTEX-yBnDTlojvBzmnCftkfAp", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 1, "ASCFG": {"searchpath": "%UsersFolder% - Fast"}, "AS": false, "ASO": false, "AD": false}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
Click to see the 18 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Tim Shelton: |
Source: | Author: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: |
Source: | Author: Florian Roth (Nextron Systems): |
Persistence and Installation Behavior |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-12T11:52:17.164150+0100 | 2850862 | 1 | Malware Command and Control Activity Detected | 104.21.12.142 | 80 | 192.168.2.4 | 49738 | TCP |
2025-01-12T11:53:25.730924+0100 | 2850862 | 1 | Malware Command and Control Activity Detected | 104.21.12.142 | 80 | 192.168.2.4 | 59033 | TCP |
2025-01-12T11:55:48.638710+0100 | 2850862 | 1 | Malware Command and Control Activity Detected | 104.21.12.142 | 80 | 192.168.2.4 | 59190 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: |