| File name: | cock.rar |
| Full analysis: | https://app.any.run/tasks/b58a813f-133b-435b-b6be-a164ecbfb6a0 |
| Verdict: | Malicious activity |
| Threats: | DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common. |
| Analysis date: | September 12, 2024, 18:41:04 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | 9E458F8F04BCFC5E875F0CCF7A412A44 |
| SHA1: | 593D33C2299968D83599A940110E34B1A329A9AE |
| SHA256: | 5DBF886C130730B0F77C4C2CEE4051292CFA24D10D017EA7DB191F7F97306D8E |
| SSDEEP: | 49152:iStEFv8kzlCBIWKyPk7mKEedLAGlqBIgQMzmEaGJfWA5llBI48yFhk+MTpw5Scj5:gFv8kzAbLedLAGgn9aCWA5Tbx7BMlw5H |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 208 | wmic path win32_computersystemproduct get uuid | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: WMI Commandline Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 368 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1076 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\cock.rar | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| 1448 | "C:\Users\admin\Desktop\EagleSpy v5\EagleSpy v5\EagleSpy V5.exe" | C:\Users\admin\Desktop\EagleSpy v5\EagleSpy v5\EagleSpy V5.exe | — | explorer.exe | |||||||||||
User: admin Company: EagleSpy Integrity Level: MEDIUM Description: EagleSpy Exit code: 99999 Version: 5.0.0.0 Modules
| |||||||||||||||
| 1556 | "C:\Users\admin\Desktop\EagleSpy v5\EagleSpy v5\res\Lib\testkey.scr" /S | C:\Users\admin\Desktop\EagleSpy v5\EagleSpy v5\res\Lib\testkey.scr | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2016 | wmic cpu get processorid | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: WMI Commandline Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2804 | getmac | C:\Windows\System32\getmac.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Displays NIC MAC information Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2820 | "C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver "-an=C:\Users\admin\Desktop\EagleSpy v5.part5.rar" "-an=C:\Users\admin\Desktop\EagleSpy v5.part4.rar" "-an=C:\Users\admin\Desktop\EagleSpy v5.part3.rar" "-an=C:\Users\admin\Desktop\EagleSpy v5.part1.rar" -- "C:\Users\admin\Desktop\EagleSpy v5.part2.rar" "C:\Users\admin\Desktop\EagleSpy v5\" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| 3032 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3308 | "C:\blockproviderPerfSvc\SystemSettings.exe" | C:\blockproviderPerfSvc\SystemSettings.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Version: 16.10.31418.88 Modules
DcRat(PID) Process(3308) SystemSettings.exe C2 (1)http://188.120.245.193/Cpu/to/7/3TestTo/baseEternal/UniversalPythonimage/LowWindows6/protonauthApi/Temporary01/cdnTemp/wp/line4ProcessDb/ImageJs_updateDefaultLinuxFlower Options Version5.0.4 PluginConfigs 0{SYSTEMDRIVE}/Users/ 1false 2true 3true 4true 5true 6true 7true 8true 9true 10true 11true 12true 13true 14true Plugins (3)TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDALI7+mQAAAAAAAAAAOAAIiALAQgAAAgBAAAGAAAAAAAAricBAAAgAAAAQAEAAABAAAAgAAAAAgAABAAAAAAAAAAEAAAAAAAAAACAAQAAAgAArNABAAMAQIUA... TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAMXZ72QAAAAAAAAAAOAAIiALAQgAAPIAAAAGAAAAAAAAThABAAAgAAAAIAEAAABAAAAgAAAAAgAABAAAAAAAAAAEAAAAAAAAAABgAQAAAgAARYYBAAMAQIUA... TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAAKX/2QAAAAAAAAAAOAAIiALAQgAAEYBAAAGAAAAAAAA7mUBAAAgAAAAgAEAAABAAAAgAAAAAgAABAAAAAAAAAAEAAAAAAAAAADAAQAAAgAAm0ACAAMAQIUA... | |||||||||||||||
| (PID) Process: | (1076) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip | |||
| (PID) Process: | (1076) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\cock.rar | |||
| (PID) Process: | (1076) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (1076) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (1076) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (1076) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (2820) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2820) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2820) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (2820) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2820 | WinRAR.exe | C:\Users\admin\Desktop\EagleSpy v5\EagleSpy v5\EagleSpy V5.exe | — | |
MD5:— | SHA256:— | |||
| 2820 | WinRAR.exe | C:\Users\admin\Desktop\EagleSpy v5\EagleSpy v5\Cryptolens.Licensing.dll | executable | |
MD5:F20CB7BA70247BF54E0F52BF705F5699 | SHA256:87ADAAE9DADBB59CF050B6688D4BB1DBC6C7F2B3E9DDC6C41CB6CE7A086CBE63 | |||
| 2820 | WinRAR.exe | C:\Users\admin\Desktop\EagleSpy v5\EagleSpy v5\Newtonsoft.Json.dll | executable | |
MD5:6815034209687816D8CF401877EC8133 | SHA256:7F912B28A07C226E0BE3ACFB2F57F050538ABA0100FA1F0BF2C39F1A1F1DA814 | |||
| 2820 | WinRAR.exe | C:\Users\admin\Desktop\EagleSpy v5\EagleSpy v5\NAudio.dll | executable | |
MD5:6CA17ABCCAE3050F391401B2955F9333 | SHA256:3AD5D09B4C8C3146D15955A564A9F1A57D7C795B189A25C6F722A738D95EF89C | |||
| 2820 | WinRAR.exe | C:\Users\admin\Desktop\EagleSpy v5\EagleSpy v5\Newtonsoft.Json.xml | xml | |
MD5:AD1A946CDBE4FC83907CF558FB80A37F | SHA256:E3C9CB0CBF4B3BE20B6030F3A4872EDD81E042048D2D19732EAC3EEB9779DC0B | |||
| 2820 | WinRAR.exe | C:\Users\admin\Desktop\EagleSpy v5\EagleSpy v5\res\Audio\2.wav | binary | |
MD5:9B15A3D6EA1205C555F91893859BDB7A | SHA256:40504BE5DA4002ABAD4B6B6B54DE0B966A3B9A5F4F24793B3AC9FC90E6CBE2CC | |||
| 2820 | WinRAR.exe | C:\Users\admin\Desktop\EagleSpy v5\EagleSpy v5\res\Audio\3.wav | binary | |
MD5:269E4F85692280ED9C59CB1C40517007 | SHA256:258C0A0B95163A9379E6BD7E95CEA5F47B96CE2816692016DAB5DAFA73AA1FE9 | |||
| 2820 | WinRAR.exe | C:\Users\admin\Desktop\EagleSpy v5\EagleSpy v5\res\Audio\5.wav | wav | |
MD5:33794366BB58C3AF5E464B0A974CC182 | SHA256:19DFFF92A123AC883F38BF617D530C6CD222ABF5540E3F215C9A44F6FCBA0D60 | |||
| 2820 | WinRAR.exe | C:\Users\admin\Desktop\EagleSpy v5\EagleSpy v5\res\Audio\4.wav | wav | |
MD5:87F33DC8407B25DEAF98AC120E1883D6 | SHA256:A3B05031FC5D69766F5C59923495A1158D0624D4D168070BC74B7F315405B127 | |||
| 2820 | WinRAR.exe | C:\Users\admin\Desktop\EagleSpy v5\EagleSpy v5\res\Audio\6.wav | binary | |
MD5:A812F51D703FF92C95DD481FE270782F | SHA256:4AC90B06262E1D8DD6FC3F25E09ACD47619D159A46C763DC8298616910C0FE3A | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3672 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | DE | binary | 407 b | whitelisted |
3308 | SystemSettings.exe | POST | 200 | 188.120.245.193:80 | http://188.120.245.193/Cpu/to/7/3TestTo/baseEternal/UniversalPythonimage/LowWindows6/protonauthApi/Temporary01/cdnTemp/wp/line4ProcessDb/ImageJs_updateDefaultLinuxFlower.php | RU | binary | 152 b | unknown |
3308 | SystemSettings.exe | POST | 200 | 188.120.245.193:80 | http://188.120.245.193/Cpu/to/7/3TestTo/baseEternal/UniversalPythonimage/LowWindows6/protonauthApi/Temporary01/cdnTemp/wp/line4ProcessDb/ImageJs_updateDefaultLinuxFlower.php | RU | binary | 152 b | unknown |
3308 | SystemSettings.exe | POST | 200 | 188.120.245.193:80 | http://188.120.245.193/Cpu/to/7/3TestTo/baseEternal/UniversalPythonimage/LowWindows6/protonauthApi/Temporary01/cdnTemp/wp/line4ProcessDb/ImageJs_updateDefaultLinuxFlower.php | RU | binary | 1.35 Kb | unknown |
3672 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | DE | binary | 419 b | whitelisted |
3424 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | US | binary | 471 b | whitelisted |
3308 | SystemSettings.exe | POST | 200 | 188.120.245.193:80 | http://188.120.245.193/Cpu/to/7/3TestTo/baseEternal/UniversalPythonimage/LowWindows6/protonauthApi/Temporary01/cdnTemp/wp/line4ProcessDb/ImageJs_updateDefaultLinuxFlower.php | RU | text | 4 b | unknown |
3308 | SystemSettings.exe | POST | 200 | 188.120.245.193:80 | http://188.120.245.193/Cpu/to/7/3TestTo/baseEternal/UniversalPythonimage/LowWindows6/protonauthApi/Temporary01/cdnTemp/wp/line4ProcessDb/ImageJs_updateDefaultLinuxFlower.php | RU | binary | 152 b | unknown |
3308 | SystemSettings.exe | POST | 200 | 188.120.245.193:80 | http://188.120.245.193/Cpu/to/7/3TestTo/baseEternal/UniversalPythonimage/LowWindows6/protonauthApi/Temporary01/cdnTemp/wp/line4ProcessDb/ImageJs_updateDefaultLinuxFlower.php | RU | binary | 152 b | unknown |
608 | svchost.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | DE | binary | 973 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
608 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6268 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2120 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
608 | svchost.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
3260 | svchost.exe | 40.113.103.199:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3424 | svchost.exe | 40.126.32.133:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3424 | svchost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
3672 | SIHClient.exe | 52.165.165.26:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3308 | SystemSettings.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
3308 | SystemSettings.exe | A Network Trojan was detected | REMOTE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
3308 | SystemSettings.exe | Misc activity | SUSPICIOUS [ANY.RUN] Possible DarkCrystal Rat Encrypted Connection |
3308 | SystemSettings.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] DarkCrystal Rat Exfiltration (POST) |
3308 | SystemSettings.exe | A Network Trojan was detected | REMOTE [ANY.RUN] DarkCrystal Rat Exfiltration (POST) |