Edit tour
Windows
Analysis Report
4KjLUaW30K.exe
Overview
General Information
Sample name: | 4KjLUaW30K.exerenamed because original name is a hash value |
Original sample name: | 181d043c0617914801548f09d5b776d4.exe |
Analysis ID: | 1561676 |
MD5: | 181d043c0617914801548f09d5b776d4 |
SHA1: | 757f042065a3dc2c9f73e635b41f83591c8ad647 |
SHA256: | 501aa5f94b15b8716ef7f76e2dbdc146b436cd9e72274d6ec5dec7265706c0ad |
Tags: | DCRatexeuser-abuse_ch |
Infos: | |
Detection
DCRat
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Suricata IDS alerts for network traffic
Yara detected DCRat
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Creates processes via WMI
Disable UAC(promptonsecuredesktop)
Disables UAC (registry)
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: System File Execution Location Anomaly
Sigma detected: WScript or CScript Dropper
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: CurrentVersion NT Autorun Keys Modification
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- 4KjLUaW30K.exe (PID: 4564 cmdline:
"C:\Users\ user\Deskt op\4KjLUaW 30K.exe" MD5: 181D043C0617914801548F09D5B776D4) - schtasks.exe (PID: 1488 cmdline:
schtasks.e xe /create /tn "Syst emS" /sc M INUTE /mo 13 /tr "'C :\Recovery \System.ex e'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 5408 cmdline:
schtasks.e xe /create /tn "Syst em" /sc ON LOGON /tr "'C:\Recov ery\System .exe'" /rl HIGHEST / f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 3720 cmdline:
schtasks.e xe /create /tn "Syst emS" /sc M INUTE /mo 14 /tr "'C :\Recovery \System.ex e'" /rl HI GHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 2276 cmdline:
schtasks.e xe /create /tn "audi odga" /sc MINUTE /mo 10 /tr "' C:\Program Files (x8 6)\mozilla maintenan ce service \logs\audi odg.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 1776 cmdline:
schtasks.e xe /create /tn "audi odg" /sc O NLOGON /tr "'C:\Prog ram Files (x86)\mozi lla mainte nance serv ice\logs\a udiodg.exe '" /rl HIG HEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 6204 cmdline:
schtasks.e xe /create /tn "audi odga" /sc MINUTE /mo 7 /tr "'C :\Program Files (x86 )\mozilla maintenanc e service\ logs\audio dg.exe'" / rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 2276 cmdline:
schtasks.e xe /create /tn "mnUY CZffXdEgQl ZPiczLektp m" /sc MIN UTE /mo 8 /tr "'C:\U sers\All U sers\USOSh ared\Logs\ mnUYCZffXd EgQlZPiczL ektp.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 892 cmdline:
schtasks.e xe /create /tn "mnUY CZffXdEgQl ZPiczLektp " /sc ONLO GON /tr "' C:\Users\A ll Users\U SOShared\L ogs\mnUYCZ ffXdEgQlZP iczLektp.e xe'" /rl H IGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 5560 cmdline:
schtasks.e xe /create /tn "mnUY CZffXdEgQl ZPiczLektp m" /sc MIN UTE /mo 7 /tr "'C:\U sers\All U sers\USOSh ared\Logs\ mnUYCZffXd EgQlZPiczL ektp.exe'" /rl HIGHE ST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 6552 cmdline:
schtasks.e xe /create /tn "Shel lExperienc eHostS" /s c MINUTE / mo 5 /tr " 'C:\Users\ Public\Dow nloads\She llExperien ceHost.exe '" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 6728 cmdline:
schtasks.e xe /create /tn "Shel lExperienc eHost" /sc ONLOGON / tr "'C:\Us ers\Public \Downloads \ShellExpe rienceHost .exe'" /rl HIGHEST / f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 1488 cmdline:
schtasks.e xe /create /tn "Shel lExperienc eHostS" /s c MINUTE / mo 12 /tr "'C:\Users \Public\Do wnloads\Sh ellExperie nceHost.ex e'" /rl HI GHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 2276 cmdline:
schtasks.e xe /create /tn "dllh ostd" /sc MINUTE /mo 12 /tr "' C:\Program Files (x8 6)\windows defender\ dllhost.ex e'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 892 cmdline:
schtasks.e xe /create /tn "dllh ost" /sc O NLOGON /tr "'C:\Prog ram Files (x86)\wind ows defend er\dllhost .exe'" /rl HIGHEST / f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 5560 cmdline:
schtasks.e xe /create /tn "dllh ostd" /sc MINUTE /mo 13 /tr "' C:\Program Files (x8 6)\windows defender\ dllhost.ex e'" /rl HI GHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 6552 cmdline:
schtasks.e xe /create /tn "mnUY CZffXdEgQl ZPiczLektp m" /sc MIN UTE /mo 11 /tr "'C:\ Program Fi les (x86)\ microsoft\ Temp\EUC7A 5.tmp\mnUY CZffXdEgQl ZPiczLektp .exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 6728 cmdline:
schtasks.e xe /create /tn "mnUY CZffXdEgQl ZPiczLektp " /sc ONLO GON /tr "' C:\Program Files (x8 6)\microso ft\Temp\EU C7A5.tmp\m nUYCZffXdE gQlZPiczLe ktp.exe'" /rl HIGHES T /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 6204 cmdline:
schtasks.e xe /create /tn "mnUY CZffXdEgQl ZPiczLektp m" /sc MIN UTE /mo 7 /tr "'C:\P rogram Fil es (x86)\m icrosoft\T emp\EUC7A5 .tmp\mnUYC ZffXdEgQlZ PiczLektp. exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 2276 cmdline:
schtasks.e xe /create /tn "mnUY CZffXdEgQl ZPiczLektp m" /sc MIN UTE /mo 12 /tr "'C:\ Users\Defa ult\OneDri ve\mnUYCZf fXdEgQlZPi czLektp.ex e'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7184 cmdline:
schtasks.e xe /create /tn "mnUY CZffXdEgQl ZPiczLektp " /sc ONLO GON /tr "' C:\Users\D efault\One Drive\mnUY CZffXdEgQl ZPiczLektp .exe'" /rl HIGHEST / f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7236 cmdline:
schtasks.e xe /create /tn "mnUY CZffXdEgQl ZPiczLektp m" /sc MIN UTE /mo 6 /tr "'C:\U sers\Defau lt\OneDriv e\mnUYCZff XdEgQlZPic zLektp.exe '" /rl HIG HEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - mnUYCZffXdEgQlZPiczLektp.exe (PID: 7304 cmdline:
"C:\Users\ All Users\ USOShared\ Logs\mnUYC ZffXdEgQlZ PiczLektp. exe" MD5: 181D043C0617914801548F09D5B776D4) - wscript.exe (PID: 7844 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Loc al\Temp\70 189604-2a9 a-4ba1-809 b-49197788 5217.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - mnUYCZffXdEgQlZPiczLektp.exe (PID: 8092 cmdline:
"C:\Users\ All Users\ USOShared\ Logs\mnUYC ZffXdEgQlZ PiczLektp. exe" MD5: 181D043C0617914801548F09D5B776D4) - wscript.exe (PID: 7948 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Loc al\Temp\28 bf72c6-5a6 e-449b-a0d 6-76cd4ab5 c11d.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
- dllhost.exe (PID: 6484 cmdline:
C:\Windows \system32\ DllHost.ex e /Process id:{AB8902 B4-09CA-4B B6-B78D-A8 F59079A8D5 } MD5: 08EB78E5BE019DF044C26B14703BD1FA)
- audiodg.exe (PID: 1488 cmdline:
"C:\Progra m Files (x 86)\mozill a maintena nce servic e\logs\aud iodg.exe" MD5: 181D043C0617914801548F09D5B776D4)
- audiodg.exe (PID: 6768 cmdline:
"C:\Progra m Files (x 86)\mozill a maintena nce servic e\logs\aud iodg.exe" MD5: 181D043C0617914801548F09D5B776D4)
- dllhost.exe (PID: 7216 cmdline:
"C:\Progra m Files (x 86)\window s defender \dllhost.e xe" MD5: 181D043C0617914801548F09D5B776D4)
- dllhost.exe (PID: 7264 cmdline:
"C:\Progra m Files (x 86)\window s defender \dllhost.e xe" MD5: 181D043C0617914801548F09D5B776D4)
- mnUYCZffXdEgQlZPiczLektp.exe (PID: 7316 cmdline:
C:\Users\D efault\One Drive\mnUY CZffXdEgQl ZPiczLektp .exe MD5: 181D043C0617914801548F09D5B776D4)
- mnUYCZffXdEgQlZPiczLektp.exe (PID: 7388 cmdline:
C:\Users\D efault\One Drive\mnUY CZffXdEgQl ZPiczLektp .exe MD5: 181D043C0617914801548F09D5B776D4)
- ShellExperienceHost.exe (PID: 7484 cmdline:
C:\Users\P ublic\Down loads\Shel lExperienc eHost.exe MD5: 181D043C0617914801548F09D5B776D4)
- ShellExperienceHost.exe (PID: 7560 cmdline:
C:\Users\P ublic\Down loads\Shel lExperienc eHost.exe MD5: 181D043C0617914801548F09D5B776D4)
- System.exe (PID: 7616 cmdline:
C:\Recover y\System.e xe MD5: 181D043C0617914801548F09D5B776D4)
- System.exe (PID: 7640 cmdline:
C:\Recover y\System.e xe MD5: 181D043C0617914801548F09D5B776D4)
- System.exe (PID: 8152 cmdline:
"C:\Recove ry\System. exe" MD5: 181D043C0617914801548F09D5B776D4)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
{"SCRT": "{\"d\":\".\",\"1\":\"%\",\"I\":\"@\",\"U\":\" \",\"5\":\"(\",\"J\":\"*\",\"M\":\"&\",\"A\":\"-\",\"T\":\")\",\"C\":\",\",\"B\":\"_\",\"L\":\"^\",\"R\":\"~\",\"y\":\">\",\"i\":\"!\",\"0\":\"`\",\"V\":\"<\",\"G\":\"$\",\"E\":\"|\",\"9\":\"#\",\"3\":\";\"}", "PCRT": "{\"F\":\"&\",\"W\":\">\",\"X\":\"^\",\"2\":\"`\",\"0\":\",\",\"S\":\";\",\"u\":\"-\",\"G\":\"_\",\"J\":\"*\",\"C\":\"#\",\"Q\":\"@\",\"U\":\"<\",\"c\":\" \",\"b\":\"(\",\"d\":\"!\",\"z\":\"%\",\"T\":\"|\",\"V\":\")\",\"k\":\".\",\"R\":\"$\",\"a\":\"~\"}", "TAG": "", "MUTEX": "DCR_MUTEX-lWaBBBPi9nde67B22ADT", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 2, "ASCFG": null, "AS": false, "ASO": false, "AD": false}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
Click to see the 29 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Tim Shelton: |
Source: | Author: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: |
Source: | Author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: |
Source: | Author: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: |
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Michael Haag: |
Persistence and Installation Behavior |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-24T04:02:05.225882+0100 | 2034194 | 1 | A Network Trojan was detected | 192.168.2.5 | 49708 | 141.8.192.93 | 80 | TCP |
2024-11-24T04:02:26.104737+0100 | 2034194 | 1 | A Network Trojan was detected | 192.168.2.5 | 49732 | 141.8.192.93 | 80 | TCP |
2024-11-24T04:02:37.974159+0100 | 2034194 | 1 | A Network Trojan was detected | 192.168.2.5 | 49759 | 141.8.192.93 | 80 | TCP |
2024-11-24T04:02:49.280812+0100 | 2034194 | 1 | A Network Trojan was detected | 192.168.2.5 | 49786 | 141.8.192.93 | 80 | TCP |
2024-11-24T04:03:10.389897+0100 | 2034194 | 1 | A Network Trojan was detected | 192.168.2.5 | 49836 | 141.8.192.93 | 80 | TCP |
2024-11-24T04:03:29.339694+0100 | 2034194 | 1 | A Network Trojan was detected | 192.168.2.5 | 49878 | 141.8.192.93 | 80 | TCP |
2024-11-24T04:03:38.053776+0100 | 2034194 | 1 | A Network Trojan was detected | 192.168.2.5 | 49897 | 141.8.192.93 | 80 | TCP |
2024-11-24T04:03:44.881860+0100 | 2034194 | 1 | A Network Trojan was detected | 192.168.2.5 | 49913 | 141.8.192.93 | 80 | TCP |
2024-11-24T04:04:03.285144+0100 | 2034194 | 1 | A Network Trojan was detected | 192.168.2.5 | 49955 | 141.8.192.93 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |