| File name: | Server.exe |
| Full analysis: | https://app.any.run/tasks/f48fa5b7-c7be-48f1-8785-afe83bd16275 |
| Verdict: | Malicious activity |
| Threats: | DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common. |
| Analysis date: | April 26, 2025, 00:50:16 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
| MD5: | A071FA60D299DB1949ABB7C2B93E6BF4 |
| SHA1: | 6D3CF5D0ADDA91CFAEE746F4800CD21EA4753584 |
| SHA256: | 022BBC0ED556E8C2965D791FC035D6D9E956B12FB552BB8C2D4243317326104E |
| SSDEEP: | 98304:62gq++D7D3r2nm5z+27PrVgbg2GYx7SecvUg5ODqquf2dzlJnbPWtV8sCQB2PT4v:sul |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (63.1) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (23.8) |
| .dll | | | Win32 Dynamic Link Library (generic) (5.6) |
| .exe | | | Win32 Executable (generic) (3.8) |
| .exe | | | Generic Win/DOS Executable (1.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2025:02:17 15:50:21+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 11 |
| CodeSize: | 2396160 |
| InitializedDataSize: | 2048 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x24af2e |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | |
| FileVersion: | 1.0.0.0 |
| InternalName: | Server1.exe |
| LegalCopyright: | |
| OriginalFileName: | Server1.exe |
| ProductVersion: | 1.0.0.0 |
| AssemblyVersion: | 1.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 516 | "C:\Program Files\Java\jre1.8.0_271\StartMenuExperienceHost.exe" | C:\Program Files\Java\jre1.8.0_271\StartMenuExperienceHost.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.2.7.1277 Modules
| |||||||||||||||
| 728 | schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Multimedia Platform\cmd.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 900 | schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 12 /tr "'C:\found.000\dir0000.chk\cmd.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 960 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\fgpibhpf\fgpibhpf.cmdline" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Chainbrowsermonitor.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Visual C# Command Line Compiler Exit code: 0 Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| 1056 | chcp 65001 | C:\Windows\System32\chcp.com | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Change CodePage Utility Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1280 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1324 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1812 | schtasks.exe /create /tn "slui" /sc ONLOGON /tr "'C:\Users\All Users\Documents\slui.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2088 | ping -n 10 localhost | C:\Windows\System32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: TCP/IP Ping Command Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2140 | "C:\BridgeMs\Chainbrowsermonitor.exe" | C:\BridgeMs\Chainbrowsermonitor.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.2.7.1277 Modules
| |||||||||||||||
| (PID) Process: | (7416) Server.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
| (PID) Process: | (7536) Server1.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbe\OpenWithProgids |
| Operation: | write | Name: | VBEFile |
Value: | |||
| (PID) Process: | (8100) Chainbrowsermonitor.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\e1126e1ed8ac015af4f7d38fbac6a5fe330cdeb4 |
| Operation: | write | Name: | f4ffed6450cc9f11936205a4bc12f56e8163b66c |
Value: H4sIAAAAAAAEAIWOQWtCMRCE/8rDs4ToxeJNbUUKD4QiHlwpMVnf2zbJlk2i/nyjePDQ0tMO7Mw3sxsspgCbhJIAZt43D/nKtgSMucrkCym84GB4966FOzGhWZLH+n03JwPwJThSL0p/jicjAE8HAAqmuxlskcQ3ZOlTOtkn0pFLdEprDeBI6tXK9t81EdzffVuKjs+paYvPFNCRadbe5CNL+Cf529KPbCS3GMvb5QeFMFpcccpPkLmQ67Ct+UVvKB6klqMEjpRZ7r79FRkWyy1EAQAA | |||
| (PID) Process: | (8100) Chainbrowsermonitor.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | slui |
Value: "C:\Users\All Users\Documents\slui.exe" | |||
| (PID) Process: | (8100) Chainbrowsermonitor.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | slui |
Value: "C:\Users\All Users\Documents\slui.exe" | |||
| (PID) Process: | (8100) Chainbrowsermonitor.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon |
| Operation: | write | Name: | Shell |
Value: explorer.exe, "C:\Users\All Users\Documents\slui.exe" | |||
| (PID) Process: | (8100) Chainbrowsermonitor.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Chainbrowsermonitor |
Value: "C:\BridgeMs\Chainbrowsermonitor.exe" | |||
| (PID) Process: | (8100) Chainbrowsermonitor.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Chainbrowsermonitor |
Value: "C:\BridgeMs\Chainbrowsermonitor.exe" | |||
| (PID) Process: | (8100) Chainbrowsermonitor.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon |
| Operation: | write | Name: | Shell |
Value: explorer.exe, "C:\Users\All Users\Documents\slui.exe", "C:\Program Files\Java\jre1.8.0_271\lib\images\cursors\uhssvc.exe", "C:\found.000\dir0000.chk\cmd.exe", "C:\Program Files\Windows Multimedia Platform\cmd.exe", "C:\Program Files\Java\jre1.8.0_271\StartMenuExperienceHost.exe", "C:\BridgeMs\Chainbrowsermonitor.exe" | |||
| (PID) Process: | (8100) Chainbrowsermonitor.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | uhssvc |
Value: "C:\Program Files\Java\jre1.8.0_271\lib\images\cursors\uhssvc.exe" | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7752 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Server.exe_1847831f7d7af7711f7f7b0b237748acbb3da1_6699ed85_d9061a60-c1bf-483d-bda4-6b0a8e2e6ba2\Report.wer | — | |
MD5:— | SHA256:— | |||
| 7752 | WerFault.exe | C:\Users\admin\AppData\Local\CrashDumps\Server.exe.7520.dmp | — | |
MD5:— | SHA256:— | |||
| 7940 | Chainbrowsermonitor.exe | C:\Users\admin\Desktop\zmTEsTaV.log | executable | |
MD5:BBDE7073BAAC996447F749992D65FFBA | SHA256:1FAE639DF1C497A54C9F42A8366EDAE3C0A6FEB4EB917ECAD9323EF8D87393E8 | |||
| 7416 | Server.exe | C:\Users\admin\AppData\Local\Temp\Server1.exe | executable | |
MD5:36B12A9B796A9FA64E8E29DA34D0DF38 | SHA256:35C08471684E1F0F8C27E342DE27BA18A20611BC87B580F03636BFCB03D03CEE | |||
| 7536 | Server1.exe | C:\BridgeMs\wZMeQSART5vxQUuEzwnVz3yo5uvssvPn5j6.bat | text | |
MD5:1FACE37F023E44F0B4FEF02366D4EAF7 | SHA256:6F0D6C459E4A8F3B94CFD54EE56B353A83EA9E2F80BD0E764A75A7E16AF797F1 | |||
| 8100 | Chainbrowsermonitor.exe | C:\Users\admin\Desktop\PbyUpxto.log | executable | |
MD5:F4B38D0F95B7E844DD288B441EBC9AAF | SHA256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97 | |||
| 7536 | Server1.exe | C:\BridgeMs\Chainbrowsermonitor.exe | executable | |
MD5:0DC023F9F826FB2668E53A2E8CC384D3 | SHA256:6C02A9FFAA2F8B8F468C9DFACCB3459AB94C6572193ACA8DF36D0AF6D80584C6 | |||
| 7752 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WERD13D.tmp.WERInternalMetadata.xml | binary | |
MD5:B9AE65D3446CD7D7AC7DA8D9CFEBE77E | SHA256:0D3019A317E128AFE6EB36511093B8CD2F986583156EFF5A5B318C38639C3900 | |||
| 7536 | Server1.exe | C:\BridgeMs\xGhnO77DJDwrNgPYYjWz6KGAjI3dbP3q0vY.vbe | binary | |
MD5:67B634872DA61FFC251423BC87B77EE3 | SHA256:B804F3C3FA6C197938586767CDA32C28A33748D30708677806E24145C6C8C22C | |||
| 7416 | Server.exe | C:\Users\admin\AppData\Local\Temp\Server.exe | executable | |
MD5:DD6667DB55ACAEFA2D7E99DCF5D97A26 | SHA256:CE8FD5EC0B2EE4E5D87D35622EEAA022EE971801C97BCB3726CA6EBE4B576238 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2104 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 23.48.23.143:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 304 | 52.149.20.212:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
— | — | GET | 200 | 52.149.20.212:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
6816 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 40.69.42.241:443 | https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping | unknown | — | — | — |
6816 | SIHClient.exe | GET | 200 | 23.48.23.166:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
6816 | SIHClient.exe | GET | 200 | 23.48.23.166:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | whitelisted |
6816 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6816 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2104 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1196 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2104 | svchost.exe | 23.48.23.143:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2104 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 20.190.159.0:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2104 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |