File name:

0bc68db77e687fa52b2f367994c5bc6f.exe

Full analysis: https://app.any.run/tasks/ce7937fd-de16-4bd8-9e64-eb212aad8bfa
Verdict: Malicious activity
Threats:

DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common.

Analysis date: December 14, 2024, 02:51:38
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
rat
dcrat
remote
darkcrystal
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

0BC68DB77E687FA52B2F367994C5BC6F

SHA1:

ECF69C28AA53920F6279AD29D5BC9BB02542E841

SHA256:

3055D261F05A0656B1B92D9FA8ED3A72111A3A5C6D036D13D3D3A304CA99B987

SSDEEP:

98304:ZFrKdQD56mtoFgfhJiJ5zPHY+Pewr+XMg27aQ4Y27ieBxu++LAYj6gNIKe3y7kls:ZudcpA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 6548)
      • wscript.exe (PID: 4596)
      • wscript.exe (PID: 420)
      • wscript.exe (PID: 2324)
      • wscript.exe (PID: 7032)
      • wscript.exe (PID: 5876)
      • wscript.exe (PID: 6336)
      • wscript.exe (PID: 6536)
      • wscript.exe (PID: 4944)
      • wscript.exe (PID: 3040)
      • wscript.exe (PID: 6872)
      • wscript.exe (PID: 3540)
      • wscript.exe (PID: 3524)
      • wscript.exe (PID: 6608)
      • wscript.exe (PID: 1864)
      • wscript.exe (PID: 6436)
      • wscript.exe (PID: 4872)
      • wscript.exe (PID: 6960)
      • wscript.exe (PID: 3724)
      • wscript.exe (PID: 1616)
      • wscript.exe (PID: 736)
    • UAC/LUA settings modification

      • SavesintoHost.exe (PID: 7156)
      • dllhost.exe (PID: 5316)
      • dllhost.exe (PID: 6540)
      • dllhost.exe (PID: 7096)
      • dllhost.exe (PID: 2928)
      • dllhost.exe (PID: 6784)
      • dllhost.exe (PID: 2292)
      • dllhost.exe (PID: 5828)
      • dllhost.exe (PID: 6520)
      • dllhost.exe (PID: 4128)
      • dllhost.exe (PID: 6712)
      • dllhost.exe (PID: 6480)
    • Changes the login/logoff helper path in the registry

      • SavesintoHost.exe (PID: 7156)
    • Changes the autorun value in the registry

      • SavesintoHost.exe (PID: 7156)
    • DARKCRYSTAL has been detected (SURICATA)

      • dllhost.exe (PID: 5316)
      • dllhost.exe (PID: 6540)
      • dllhost.exe (PID: 7096)
      • dllhost.exe (PID: 2928)
      • dllhost.exe (PID: 6784)
      • dllhost.exe (PID: 2292)
      • dllhost.exe (PID: 5828)
      • dllhost.exe (PID: 6520)
      • dllhost.exe (PID: 4128)
      • dllhost.exe (PID: 6712)
      • dllhost.exe (PID: 6480)
    • Deletes a file (SCRIPT)

      • wscript.exe (PID: 420)
      • wscript.exe (PID: 7032)
      • wscript.exe (PID: 6336)
      • wscript.exe (PID: 6536)
      • wscript.exe (PID: 6872)
      • wscript.exe (PID: 3524)
      • wscript.exe (PID: 6608)
      • wscript.exe (PID: 4872)
      • wscript.exe (PID: 6960)
      • wscript.exe (PID: 736)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • 0bc68db77e687fa52b2f367994c5bc6f.exe (PID: 6468)
      • SavesintoHost.exe (PID: 7156)
    • The process executes VB scripts

      • 0bc68db77e687fa52b2f367994c5bc6f.exe (PID: 6468)
      • dllhost.exe (PID: 5316)
      • dllhost.exe (PID: 6540)
      • dllhost.exe (PID: 7096)
      • dllhost.exe (PID: 2928)
      • dllhost.exe (PID: 6784)
      • dllhost.exe (PID: 2292)
      • dllhost.exe (PID: 5828)
      • dllhost.exe (PID: 6520)
      • dllhost.exe (PID: 4128)
      • dllhost.exe (PID: 6712)
      • dllhost.exe (PID: 6480)
    • Reads security settings of Internet Explorer

      • 0bc68db77e687fa52b2f367994c5bc6f.exe (PID: 6468)
      • ShellExperienceHost.exe (PID: 1540)
      • SavesintoHost.exe (PID: 7156)
      • dllhost.exe (PID: 5316)
      • dllhost.exe (PID: 6540)
      • dllhost.exe (PID: 7096)
      • dllhost.exe (PID: 2928)
      • dllhost.exe (PID: 6784)
      • dllhost.exe (PID: 2292)
      • dllhost.exe (PID: 5828)
      • dllhost.exe (PID: 6520)
      • dllhost.exe (PID: 4128)
      • dllhost.exe (PID: 6712)
      • dllhost.exe (PID: 6480)
    • Executable content was dropped or overwritten

      • 0bc68db77e687fa52b2f367994c5bc6f.exe (PID: 6468)
      • SavesintoHost.exe (PID: 7156)
      • dllhost.exe (PID: 5316)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 6548)
      • wscript.exe (PID: 420)
      • wscript.exe (PID: 7032)
      • wscript.exe (PID: 6336)
      • wscript.exe (PID: 6536)
      • wscript.exe (PID: 6872)
      • wscript.exe (PID: 3524)
      • wscript.exe (PID: 6608)
      • wscript.exe (PID: 4872)
      • wscript.exe (PID: 6960)
      • wscript.exe (PID: 736)
    • Starts CMD.EXE for commands execution

      • wscript.exe (PID: 6548)
      • SavesintoHost.exe (PID: 7156)
    • Executing commands from a ".bat" file

      • wscript.exe (PID: 6548)
      • SavesintoHost.exe (PID: 7156)
    • Executed via WMI

      • schtasks.exe (PID: 3060)
      • schtasks.exe (PID: 3544)
      • schtasks.exe (PID: 4136)
      • schtasks.exe (PID: 5592)
      • schtasks.exe (PID: 3876)
      • schtasks.exe (PID: 5748)
      • schtasks.exe (PID: 6516)
      • schtasks.exe (PID: 6496)
      • schtasks.exe (PID: 5588)
      • schtasks.exe (PID: 3552)
      • schtasks.exe (PID: 4052)
      • schtasks.exe (PID: 4604)
      • schtasks.exe (PID: 6460)
      • schtasks.exe (PID: 6720)
      • schtasks.exe (PID: 1380)
      • schtasks.exe (PID: 7048)
      • schtasks.exe (PID: 6632)
      • schtasks.exe (PID: 6868)
      • schtasks.exe (PID: 6768)
      • schtasks.exe (PID: 1356)
      • schtasks.exe (PID: 7016)
      • schtasks.exe (PID: 4428)
      • schtasks.exe (PID: 2008)
      • schtasks.exe (PID: 644)
      • schtasks.exe (PID: 1792)
      • schtasks.exe (PID: 6872)
      • schtasks.exe (PID: 7004)
      • schtasks.exe (PID: 6520)
      • schtasks.exe (PID: 6336)
      • schtasks.exe (PID: 3288)
      • schtasks.exe (PID: 448)
      • schtasks.exe (PID: 3144)
      • schtasks.exe (PID: 6608)
      • schtasks.exe (PID: 6564)
      • schtasks.exe (PID: 3060)
      • schtasks.exe (PID: 4136)
      • schtasks.exe (PID: 6460)
      • schtasks.exe (PID: 6540)
      • schtasks.exe (PID: 2736)
      • schtasks.exe (PID: 6296)
      • schtasks.exe (PID: 932)
      • schtasks.exe (PID: 2928)
      • schtasks.exe (PID: 6516)
      • schtasks.exe (PID: 4740)
      • schtasks.exe (PID: 7012)
      • schtasks.exe (PID: 3612)
      • schtasks.exe (PID: 628)
      • schtasks.exe (PID: 644)
      • schtasks.exe (PID: 7016)
      • schtasks.exe (PID: 6784)
      • schtasks.exe (PID: 4428)
    • Probably delay the execution using 'w32tm.exe'

      • cmd.exe (PID: 6908)
    • Reads the date of Windows installation

      • SavesintoHost.exe (PID: 7156)
      • dllhost.exe (PID: 5316)
      • dllhost.exe (PID: 6540)
      • dllhost.exe (PID: 7096)
      • dllhost.exe (PID: 2928)
      • dllhost.exe (PID: 6784)
      • dllhost.exe (PID: 2292)
      • dllhost.exe (PID: 5828)
      • dllhost.exe (PID: 6520)
      • dllhost.exe (PID: 4128)
      • dllhost.exe (PID: 6712)
      • dllhost.exe (PID: 6480)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 4596)
      • wscript.exe (PID: 420)
      • wscript.exe (PID: 7032)
      • wscript.exe (PID: 2324)
      • wscript.exe (PID: 6336)
      • wscript.exe (PID: 5876)
      • wscript.exe (PID: 6536)
      • wscript.exe (PID: 4944)
      • wscript.exe (PID: 3040)
      • wscript.exe (PID: 6872)
      • wscript.exe (PID: 3524)
      • wscript.exe (PID: 3540)
      • wscript.exe (PID: 6608)
      • wscript.exe (PID: 1864)
      • wscript.exe (PID: 4872)
      • wscript.exe (PID: 6436)
      • wscript.exe (PID: 6960)
      • wscript.exe (PID: 3724)
      • wscript.exe (PID: 1616)
      • wscript.exe (PID: 736)
      • wscript.exe (PID: 6980)
      • wscript.exe (PID: 6584)
    • Uses WMI to retrieve WMI-managed resources (SCRIPT)

      • wscript.exe (PID: 420)
      • wscript.exe (PID: 7032)
      • wscript.exe (PID: 6336)
      • wscript.exe (PID: 6536)
      • wscript.exe (PID: 6872)
      • wscript.exe (PID: 3524)
      • wscript.exe (PID: 6608)
      • wscript.exe (PID: 4872)
      • wscript.exe (PID: 6960)
      • wscript.exe (PID: 736)
      • wscript.exe (PID: 6980)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 420)
      • wscript.exe (PID: 7032)
      • wscript.exe (PID: 6336)
      • wscript.exe (PID: 6536)
      • wscript.exe (PID: 6872)
      • wscript.exe (PID: 3524)
      • wscript.exe (PID: 6608)
      • wscript.exe (PID: 4872)
      • wscript.exe (PID: 6960)
      • wscript.exe (PID: 736)
  • INFO

    • Drops encrypted VBS script (Microsoft Script Encoder)

      • 0bc68db77e687fa52b2f367994c5bc6f.exe (PID: 6468)
      • wscript.exe (PID: 6548)
    • The sample compiled with english language support

      • 0bc68db77e687fa52b2f367994c5bc6f.exe (PID: 6468)
      • SavesintoHost.exe (PID: 7156)
      • dllhost.exe (PID: 5316)
    • Process checks computer location settings

      • 0bc68db77e687fa52b2f367994c5bc6f.exe (PID: 6468)
      • SavesintoHost.exe (PID: 7156)
      • dllhost.exe (PID: 5316)
      • dllhost.exe (PID: 6540)
      • dllhost.exe (PID: 7096)
      • dllhost.exe (PID: 2928)
      • dllhost.exe (PID: 6784)
      • dllhost.exe (PID: 2292)
      • dllhost.exe (PID: 5828)
      • dllhost.exe (PID: 6520)
      • dllhost.exe (PID: 4128)
      • dllhost.exe (PID: 6712)
      • dllhost.exe (PID: 6480)
    • The process uses the downloaded file

      • wscript.exe (PID: 6548)
      • 0bc68db77e687fa52b2f367994c5bc6f.exe (PID: 6468)
      • SavesintoHost.exe (PID: 7156)
      • dllhost.exe (PID: 5316)
      • dllhost.exe (PID: 6540)
      • dllhost.exe (PID: 7096)
      • dllhost.exe (PID: 2928)
      • dllhost.exe (PID: 6784)
      • dllhost.exe (PID: 2292)
      • dllhost.exe (PID: 5828)
      • dllhost.exe (PID: 6520)
      • dllhost.exe (PID: 4128)
      • dllhost.exe (PID: 6712)
      • dllhost.exe (PID: 6480)
    • Checks supported languages

      • 0bc68db77e687fa52b2f367994c5bc6f.exe (PID: 6468)
      • ShellExperienceHost.exe (PID: 1540)
      • SavesintoHost.exe (PID: 7156)
      • dllhost.exe (PID: 5316)
      • dllhost.exe (PID: 6540)
      • dllhost.exe (PID: 7096)
      • dllhost.exe (PID: 2928)
      • dllhost.exe (PID: 6784)
      • dllhost.exe (PID: 2292)
      • dllhost.exe (PID: 5828)
      • dllhost.exe (PID: 6520)
      • dllhost.exe (PID: 4128)
      • dllhost.exe (PID: 6712)
      • dllhost.exe (PID: 6480)
    • Reads the computer name

      • 0bc68db77e687fa52b2f367994c5bc6f.exe (PID: 6468)
      • SavesintoHost.exe (PID: 7156)
      • ShellExperienceHost.exe (PID: 1540)
      • dllhost.exe (PID: 5316)
      • dllhost.exe (PID: 6540)
      • dllhost.exe (PID: 7096)
      • dllhost.exe (PID: 2928)
      • dllhost.exe (PID: 6784)
      • dllhost.exe (PID: 2292)
      • dllhost.exe (PID: 5828)
      • dllhost.exe (PID: 6520)
      • dllhost.exe (PID: 4128)
      • dllhost.exe (PID: 6712)
      • dllhost.exe (PID: 6480)
    • Process checks whether UAC notifications are on

      • SavesintoHost.exe (PID: 7156)
      • dllhost.exe (PID: 5316)
      • dllhost.exe (PID: 6540)
      • dllhost.exe (PID: 7096)
      • dllhost.exe (PID: 2928)
      • dllhost.exe (PID: 6784)
      • dllhost.exe (PID: 2292)
      • dllhost.exe (PID: 5828)
      • dllhost.exe (PID: 6520)
      • dllhost.exe (PID: 4128)
      • dllhost.exe (PID: 6712)
      • dllhost.exe (PID: 6480)
    • Reads Environment values

      • SavesintoHost.exe (PID: 7156)
      • dllhost.exe (PID: 5316)
      • dllhost.exe (PID: 6540)
      • dllhost.exe (PID: 7096)
      • dllhost.exe (PID: 2928)
      • dllhost.exe (PID: 6784)
      • dllhost.exe (PID: 2292)
      • dllhost.exe (PID: 5828)
      • dllhost.exe (PID: 6520)
      • dllhost.exe (PID: 4128)
      • dllhost.exe (PID: 6712)
      • dllhost.exe (PID: 6480)
    • Reads the machine GUID from the registry

      • SavesintoHost.exe (PID: 7156)
      • dllhost.exe (PID: 5316)
      • dllhost.exe (PID: 6540)
      • dllhost.exe (PID: 7096)
      • dllhost.exe (PID: 2928)
      • dllhost.exe (PID: 6784)
      • dllhost.exe (PID: 2292)
      • dllhost.exe (PID: 5828)
      • dllhost.exe (PID: 6520)
      • dllhost.exe (PID: 4128)
      • dllhost.exe (PID: 6712)
      • dllhost.exe (PID: 6480)
    • Creates files in the program directory

      • SavesintoHost.exe (PID: 7156)
    • Create files in a temporary directory

      • SavesintoHost.exe (PID: 7156)
      • dllhost.exe (PID: 5316)
      • dllhost.exe (PID: 6540)
      • dllhost.exe (PID: 7096)
      • dllhost.exe (PID: 2928)
      • dllhost.exe (PID: 6784)
      • dllhost.exe (PID: 2292)
      • dllhost.exe (PID: 5828)
      • dllhost.exe (PID: 6520)
      • dllhost.exe (PID: 4128)
      • dllhost.exe (PID: 6712)
      • dllhost.exe (PID: 6480)
    • Checks proxy server information

      • dllhost.exe (PID: 5316)
      • dllhost.exe (PID: 6540)
      • dllhost.exe (PID: 7096)
      • dllhost.exe (PID: 2928)
      • dllhost.exe (PID: 6784)
      • dllhost.exe (PID: 2292)
      • dllhost.exe (PID: 5828)
      • dllhost.exe (PID: 6520)
      • dllhost.exe (PID: 4128)
      • dllhost.exe (PID: 6712)
      • dllhost.exe (PID: 6480)
    • Disables trace logs

      • dllhost.exe (PID: 5316)
      • dllhost.exe (PID: 6540)
      • dllhost.exe (PID: 7096)
      • dllhost.exe (PID: 2928)
      • dllhost.exe (PID: 6784)
      • dllhost.exe (PID: 2292)
      • dllhost.exe (PID: 5828)
      • dllhost.exe (PID: 6520)
      • dllhost.exe (PID: 4128)
      • dllhost.exe (PID: 6712)
      • dllhost.exe (PID: 6480)
    • Reads Microsoft Office registry keys

      • dllhost.exe (PID: 5316)
      • dllhost.exe (PID: 6540)
      • dllhost.exe (PID: 7096)
      • dllhost.exe (PID: 2928)
      • dllhost.exe (PID: 6784)
      • dllhost.exe (PID: 2292)
      • dllhost.exe (PID: 5828)
      • dllhost.exe (PID: 6520)
      • dllhost.exe (PID: 4128)
      • dllhost.exe (PID: 6712)
      • dllhost.exe (PID: 6480)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 5.1
ImageVersion: -
OSVersion: 5.1
EntryPoint: 0x1ec40
UninitializedDataSize: -
InitializedDataSize: 114176
CodeSize: 201216
LinkerVersion: 14
PEType: PE32
ImageFileCharacteristics: Executable, 32-bit
TimeStamp: 2020:12:01 18:00:55+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
223
Monitored processes
95
Malicious processes
33
Suspicious processes
11

Behavior graph

Click at the process to see the details
start 0bc68db77e687fa52b2f367994c5bc6f.exe no specs 0bc68db77e687fa52b2f367994c5bc6f.exe wscript.exe no specs wscript.exe no specs cmd.exe no specs conhost.exe no specs savesintohost.exe shellexperiencehost.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs w32tm.exe no specs #DARKCRYSTAL dllhost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL dllhost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL dllhost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL dllhost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL dllhost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL dllhost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL dllhost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL dllhost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL dllhost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL dllhost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL dllhost.exe wscript.exe no specs wscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6340"C:\Users\admin\AppData\Local\Temp\0bc68db77e687fa52b2f367994c5bc6f.exe" C:\Users\admin\AppData\Local\Temp\0bc68db77e687fa52b2f367994c5bc6f.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\0bc68db77e687fa52b2f367994c5bc6f.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6468"C:\Users\admin\AppData\Local\Temp\0bc68db77e687fa52b2f367994c5bc6f.exe" C:\Users\admin\AppData\Local\Temp\0bc68db77e687fa52b2f367994c5bc6f.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\0bc68db77e687fa52b2f367994c5bc6f.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.3996_none_d954cb49e10154a6\gdiplus.dll
6548"C:\WINDOWS\System32\WScript.exe" "C:\comSurrogatecontainercomponentRef\4Vp3r4P.vbe" C:\Windows\SysWOW64\wscript.exe0bc68db77e687fa52b2f367994c5bc6f.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\syswow64\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6580"C:\WINDOWS\System32\WScript.exe" "C:\comSurrogatecontainercomponentRef\file.vbs" C:\Windows\SysWOW64\wscript.exe0bc68db77e687fa52b2f367994c5bc6f.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\syswow64\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7092C:\WINDOWS\system32\cmd.exe /c ""C:\comSurrogatecontainercomponentRef\QZY1IZ9a6YLs5.bat" "C:\Windows\SysWOW64\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7104\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7156"C:\comSurrogatecontainercomponentRef\SavesintoHost.exe"C:\comSurrogatecontainercomponentRef\SavesintoHost.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
5.15.2.0
Modules
Images
c:\comsurrogatecontainercomponentref\savesintohost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1540"C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mcaC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shell Experience Host
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\shellexperiencehost_cw5n1h2txyewy\shellexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\wincorlib.dll
3060schtasks.exe /create /tn "uhssvcu" /sc MINUTE /mo 6 /tr "'C:\Users\Administrator\Searches\uhssvc.exe'" /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3544schtasks.exe /create /tn "uhssvc" /sc ONLOGON /tr "'C:\Users\Administrator\Searches\uhssvc.exe'" /rl HIGHEST /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
40 510
Read events
40 367
Write events
143
Delete events
0

Modification events

(PID) Process:(6468) 0bc68db77e687fa52b2f367994c5bc6f.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbe\OpenWithProgids
Operation:writeName:VBEFile
Value:
(PID) Process:(6468) 0bc68db77e687fa52b2f367994c5bc6f.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
Operation:writeName:VBSFile
Value:
(PID) Process:(7156) SavesintoHost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:EnableLUA
Value:
0
(PID) Process:(7156) SavesintoHost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:ConsentPromptBehaviorAdmin
Value:
0
(PID) Process:(7156) SavesintoHost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:PromptOnSecureDesktop
Value:
0
(PID) Process:(7156) SavesintoHost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
23004100430042006C006F00620000000000000000000000010000000000000000000000
(PID) Process:(7156) SavesintoHost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:uhssvc
Value:
"C:\Users\Administrator\Searches\uhssvc.exe"
(PID) Process:(7156) SavesintoHost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:uhssvc
Value:
"C:\Users\Administrator\Searches\uhssvc.exe"
(PID) Process:(7156) SavesintoHost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Operation:writeName:Shell
Value:
explorer.exe, "C:\Users\Administrator\Searches\uhssvc.exe"
(PID) Process:(7156) SavesintoHost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:TextInputHost
Value:
"C:\found.000\dir_00000002.chk\TextInputHost.exe"
Executable files
19
Suspicious files
1
Text files
43
Unknown types
0

Dropped files

PID
Process
Filename
Type
7156SavesintoHost.exeC:\Recovery\Logs\conhost.exeexecutable
MD5:3AA1BBD17D68B0B67B7423F1FE09B05B
SHA256:7362F82084BCDF47B0927674AD678F66214E8D4F2783A0B9338EE4EB773C3474
7156SavesintoHost.exeC:\Recovery\OEM\backgroundTaskHost.exeexecutable
MD5:3AA1BBD17D68B0B67B7423F1FE09B05B
SHA256:7362F82084BCDF47B0927674AD678F66214E8D4F2783A0B9338EE4EB773C3474
64680bc68db77e687fa52b2f367994c5bc6f.exeC:\comSurrogatecontainercomponentRef\QZY1IZ9a6YLs5.battext
MD5:CBBA91293FED3DFB5A3A0CD0EC53B505
SHA256:062CFF19B7BE8C7D9C9941F75B9225982EB3799A766EE73659251F7D0C0B299D
7156SavesintoHost.exeC:\Users\Default\conhost.exeexecutable
MD5:3AA1BBD17D68B0B67B7423F1FE09B05B
SHA256:7362F82084BCDF47B0927674AD678F66214E8D4F2783A0B9338EE4EB773C3474
7156SavesintoHost.exeC:\Users\Administrator\Searches\uhssvc.exeexecutable
MD5:3AA1BBD17D68B0B67B7423F1FE09B05B
SHA256:7362F82084BCDF47B0927674AD678F66214E8D4F2783A0B9338EE4EB773C3474
7156SavesintoHost.exeC:\Program Files (x86)\Windows Photo Viewer\en-US\5940a34987c991text
MD5:E6AACB8739BD6CD9C9FC1809FD111DA9
SHA256:0D2D26922FA56377EC26B8CFBB0754406932BFB818101EC96356F55936E09D0D
7156SavesintoHost.exeC:\Users\Administrator\Searches\105eec298f1910text
MD5:217119E3A1D8A722AF7DEF05A433814A
SHA256:33CE25F3CACA5289C95C5282B943B92EF0C0AA997705705FA1B659B7A9D5EA19
64680bc68db77e687fa52b2f367994c5bc6f.exeC:\comSurrogatecontainercomponentRef\file.vbstext
MD5:677CC4360477C72CB0CE00406A949C61
SHA256:F1CCCB5AE4AA51D293BD3C7D2A1A04CB7847D22C5DB8E05AC64E9A6D7455AA0B
7156SavesintoHost.exeC:\Program Files\FileZilla FTP Client\6ccacd8608530ftext
MD5:91AA995215567883807255BF0D6456C6
SHA256:D451286190ADE3E239FF355932AE6D06438A8CAD35B06ED1AD7167A482F1EB99
7156SavesintoHost.exeC:\Recovery\Logs\088424020bedd6text
MD5:C8E04249233FFD559FB79BC8FC0731CB
SHA256:B286B18354DF779C06A1535938A4BA158038C8DEBA8EAEDDCED6A8FC8D5F6DF2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
31
TCP/UDP connections
43
DNS requests
18
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6240
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6784
dllhost.exe
GET
403
141.8.192.138:80
http://a1063683.xsph.ru/2172ee40.php?b8iGMjUCh5MwKlDv612ZkbtAGVbC=LnYUai7vd4T1HtV1TOfhQ9BUiTAPi&1H=IWRxctCG9d&ihdsYIxG6enMmDwHirNcCMk8XDE1ec=QfEwA0R1ZMvKxeJ&c890477b200ba1ffc8ef461f54aaad3b=c3ccc9b0173ab12b589ddb5b569d75e1&61cb0d9d4a37c6ca1c8fa3a413f36a41=gYxEWNxQmZxcDOjJmNihTZzImNkRzNiFzMldjMzQWYhhTNmhzYjNWO&b8iGMjUCh5MwKlDv612ZkbtAGVbC=LnYUai7vd4T1HtV1TOfhQ9BUiTAPi&1H=IWRxctCG9d&ihdsYIxG6enMmDwHirNcCMk8XDE1ec=QfEwA0R1ZMvKxeJ
unknown
whitelisted
6092
svchost.exe
GET
200
23.32.238.107:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6092
svchost.exe
GET
200
23.38.73.129:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.32.238.107:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.38.73.129:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6540
dllhost.exe
GET
403
141.8.192.138:80
http://a1063683.xsph.ru/2172ee40.php?r8a0kQpoJS8QvdWcZUHKR=kqGAKP7nL3uZ8yHLgdSbuyHYY5&c890477b200ba1ffc8ef461f54aaad3b=c3ccc9b0173ab12b589ddb5b569d75e1&61cb0d9d4a37c6ca1c8fa3a413f36a41=gYxEWNxQmZxcDOjJmNihTZzImNkRzNiFzMldjMzQWYhhTNmhzYjNWO&r8a0kQpoJS8QvdWcZUHKR=kqGAKP7nL3uZ8yHLgdSbuyHYY5
unknown
whitelisted
6784
dllhost.exe
GET
403
141.8.192.138:80
http://a1063683.xsph.ru/2172ee40.php?b8iGMjUCh5MwKlDv612ZkbtAGVbC=LnYUai7vd4T1HtV1TOfhQ9BUiTAPi&1H=IWRxctCG9d&ihdsYIxG6enMmDwHirNcCMk8XDE1ec=QfEwA0R1ZMvKxeJ&c890477b200ba1ffc8ef461f54aaad3b=c3ccc9b0173ab12b589ddb5b569d75e1&61cb0d9d4a37c6ca1c8fa3a413f36a41=gYxEWNxQmZxcDOjJmNihTZzImNkRzNiFzMldjMzQWYhhTNmhzYjNWO&b8iGMjUCh5MwKlDv612ZkbtAGVbC=LnYUai7vd4T1HtV1TOfhQ9BUiTAPi&1H=IWRxctCG9d&ihdsYIxG6enMmDwHirNcCMk8XDE1ec=QfEwA0R1ZMvKxeJ
unknown
whitelisted
2292
dllhost.exe
GET
403
141.8.192.138:80
http://a1063683.xsph.ru/2172ee40.php?po2s2XjvHV=NylNghq6bnZL052yyYKRxnZ&Gfb1MTRRwohFGFJExFOoQcBwAjvX=D5kYtHAFzuHWHYMXwrtOFdrZvlndo0&i3Tst7qW7I88VGRIDzYN=BI1kNKnIdgb8HicypdZGVvFHfWS&c890477b200ba1ffc8ef461f54aaad3b=c3ccc9b0173ab12b589ddb5b569d75e1&61cb0d9d4a37c6ca1c8fa3a413f36a41=gYxEWNxQmZxcDOjJmNihTZzImNkRzNiFzMldjMzQWYhhTNmhzYjNWO&po2s2XjvHV=NylNghq6bnZL052yyYKRxnZ&Gfb1MTRRwohFGFJExFOoQcBwAjvX=D5kYtHAFzuHWHYMXwrtOFdrZvlndo0&i3Tst7qW7I88VGRIDzYN=BI1kNKnIdgb8HicypdZGVvFHfWS
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
23.32.238.107:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6092
svchost.exe
23.32.238.107:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.38.73.129:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6092
svchost.exe
23.38.73.129:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
2.19.80.27:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.32.238.107
  • 23.32.238.112
whitelisted
www.microsoft.com
  • 23.38.73.129
  • 95.101.149.131
whitelisted
google.com
  • 172.217.18.110
whitelisted
www.bing.com
  • 2.19.80.27
  • 2.19.80.89
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.74
  • 40.126.32.136
  • 40.126.32.68
  • 40.126.32.138
  • 20.190.160.22
  • 40.126.32.134
  • 20.190.160.14
  • 40.126.32.140
whitelisted
go.microsoft.com
  • 184.30.17.189
whitelisted
a1063683.xsph.ru
  • 141.8.192.138
whitelisted
arc.msn.com
  • 20.103.156.88
whitelisted

Threats

PID
Process
Class
Message
Misc activity
ET INFO Observed DNS Query to xsph .ru Domain
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
No debug info