| File name: | Malware.2024.12.24.7z |
| Full analysis: | https://app.any.run/tasks/ab55d07b-4944-4d98-811c-b7a8293c8758 |
| Verdict: | Malicious activity |
| Threats: | DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common. |
| Analysis date: | June 02, 2025, 05:39:41 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-7z-compressed |
| File info: | 7-zip archive data, version 0.4 |
| MD5: | 5DAAC17067A28DAA7C65449923069387 |
| SHA1: | 9136626E9E75126163A3BE7FEF95DCA7C8E0277D |
| SHA256: | 19B4FA4A282D95E524BFAB06495337C5E0D3A5A3E54B60DEE968923916E2F358 |
| SSDEEP: | 24576:3TwYfpQv9vL/qqdNE6D/UO9JAhEvDltXLoLgvaWCG71pcUgL1UzCvH7Ob:DwYhQv9vL/qqdNE6D/UO9JAhEvDnXLo8 |
| .7z | | | 7-Zip compressed archive (v0.4) (57.1) |
|---|---|---|
| .7z | | | 7-Zip compressed archive (gen) (42.8) |
| FileVersion: | 7z v0.04 |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 240 | schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\found.000\dir_00000002.chk\dwm.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 472 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 516 | schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\Logs\WmiPrvSE.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 632 | "C:\Users\admin\Desktop\2024-12-24\JaffaCakes118_40603df340cee8c3d00939469470a28acbf64401ec12d32ba68fe54e7f04c6d4-40603df340cee8c3d00939469470a28acbf64401ec12d32ba68fe54e7f04c6d4.exe" | C:\Users\admin\Desktop\2024-12-24\JaffaCakes118_40603df340cee8c3d00939469470a28acbf64401ec12d32ba68fe54e7f04c6d4-40603df340cee8c3d00939469470a28acbf64401ec12d32ba68fe54e7f04c6d4.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 10 Modules
| |||||||||||||||
| 644 | w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 | C:\Windows\System32\w32tm.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Time Service Diagnostic Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 656 | schtasks.exe /create /tn "Memory CompressionM" /sc MINUTE /mo 12 /tr "'C:\providercommon\Memory Compression.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 660 | "C:\Users\Public\Desktop\csrss.exe" | C:\Users\Public\Desktop\csrss.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Version: 1.1.1o Modules
| |||||||||||||||
| 704 | "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe' | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | DllCommonsvc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 776 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 780 | schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Windows\AppReadiness\winlogon.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6028) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface |
| Operation: | write | Name: | ShowPassword |
Value: 0 | |||
| (PID) Process: | (6028) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
| (PID) Process: | (6028) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
| (PID) Process: | (6028) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (6028) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\Malware.2024.12.24.7z | |||
| (PID) Process: | (6028) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (6028) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (6028) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (6028) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (6028) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin |
| Operation: | write | Name: | Placement |
Value: 2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5984 | WinRAR.exe | C:\Users\admin\Desktop\2024-12-24\JaffaCakes118_40603df340cee8c3d00939469470a28acbf64401ec12d32ba68fe54e7f04c6d4-40603df340cee8c3d00939469470a28acbf64401ec12d32ba68fe54e7f04c6d4 | executable | |
MD5:20043020E5B82CE7E3D69C407A85E50C | SHA256:40603DF340CEE8C3D00939469470A28ACBF64401EC12D32BA68FE54E7F04C6D4 | |||
| 7268 | DllCommonsvc.exe | C:\found.000\dir_00000002.chk\9e60a5f7a3bd80 | text | |
MD5:98BC68F1E886206900DE317F44E0E2CD | SHA256:4B71BC9B2DA4305090BD5DF52FB88B30D81CE9777464A84F36FA2FB43CD531B0 | |||
| 7268 | DllCommonsvc.exe | C:\Windows\ImmersiveControlPanel\SystemSettings\View\0a1fd5f707cd16 | text | |
MD5:E59B3E4AE43FCC0E9148321CA7B1D5D2 | SHA256:BBF1319780A1430A012E2E43BC74DB293E75A1333A9FD7DFF878EBDDD5E34A74 | |||
| 7268 | DllCommonsvc.exe | C:\found.000\dir_00000002.chk\SystemSettings.exe | executable | |
MD5:BD31E94B4143C4CE49C17D3AF46BCAD0 | SHA256:B5199D3EB28E7DE8EC4A5DE66CB339A03D90B297E2292473BADAAB98ADE15C63 | |||
| 7268 | DllCommonsvc.exe | C:\providercommon\0a1fd5f707cd16 | text | |
MD5:8EF877F96B1D50BA6B7473AF2BE61AB1 | SHA256:6607795DA3C121F3F08943DE7FF38C4A3A0384AB9CFE1626566D606888D35CB5 | |||
| 8048 | JaffaCakes118_40603df340cee8c3d00939469470a28acbf64401ec12d32ba68fe54e7f04c6d4-40603df340cee8c3d00939469470a28acbf64401ec12d32ba68fe54e7f04c6d4.exe | C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe | binary | |
MD5:8088241160261560A02C84025D107592 | SHA256:2072CC9A4A3B84D4C5178AB41C5588EEA7D0103E3928E34D64F17BF97F3D1CC1 | |||
| 7268 | DllCommonsvc.exe | C:\providercommon\sppsvc.exe | executable | |
MD5:BD31E94B4143C4CE49C17D3AF46BCAD0 | SHA256:B5199D3EB28E7DE8EC4A5DE66CB339A03D90B297E2292473BADAAB98ADE15C63 | |||
| 8048 | JaffaCakes118_40603df340cee8c3d00939469470a28acbf64401ec12d32ba68fe54e7f04c6d4-40603df340cee8c3d00939469470a28acbf64401ec12d32ba68fe54e7f04c6d4.exe | C:\providercommon\1zu9dW.bat | text | |
MD5:6783C3EE07C7D151CEAC57F1F9C8BED7 | SHA256:8AB782F0F327A2021530E7230D3AEE8ABBECB7EED59482A3A46E78B9E3862322 | |||
| 7268 | DllCommonsvc.exe | C:\Windows\Installer\{833D52CC-AEFF-3DF3-AE28-372C5BC15088}\services.exe | executable | |
MD5:BD31E94B4143C4CE49C17D3AF46BCAD0 | SHA256:B5199D3EB28E7DE8EC4A5DE66CB339A03D90B297E2292473BADAAB98ADE15C63 | |||
| 7268 | DllCommonsvc.exe | C:\Windows\Microsoft.NET\Framework\v1.0.3705\spoolsv.exe | executable | |
MD5:BD31E94B4143C4CE49C17D3AF46BCAD0 | SHA256:B5199D3EB28E7DE8EC4A5DE66CB339A03D90B297E2292473BADAAB98ADE15C63 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
1812 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
1812 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
6208 | RUXIMICS.exe | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
3760 | svchost.exe | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3760 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 20.190.159.73:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 2.23.77.188:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to access raw user content on GitHub |