File name:

SharkHack.exe

Full analysis: https://app.any.run/tasks/b061619d-0644-463f-8ec2-705bc6960435
Verdict: Malicious activity
Threats:

DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common.

Analysis date: October 30, 2024, 16:20:00
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
pastebin
rat
dcrat
remote
darkcrystal
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

D700671D6797CAC4C1DFD0843DDBDC6E

SHA1:

74A41E4748744D6611EF6467B3600B729AE740F9

SHA256:

945EF9CA875BA5D7DCBB7B58CA05957E6699BE76FD1F00902C4796EA343C3E11

SSDEEP:

98304:+FrKdnhbMptYrMaWh/Fu4r3WZS358kAjag66OUcf0E5TdYI5gMKVWaMXyQX822PY:+tjwnWIyB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • DARKCRYSTAL has been detected (SURICATA)

      • SearchApp.exe (PID: 6952)
      • SearchApp.exe (PID: 5612)
      • SearchApp.exe (PID: 4128)
      • SearchApp.exe (PID: 6124)
      • SearchApp.exe (PID: 5932)
      • SearchApp.exe (PID: 6564)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • SharkHack.exe (PID: 5748)
    • Executable content was dropped or overwritten

      • SharkHack.exe (PID: 5748)
      • Bridgecontainercomponent.exe (PID: 2428)
      • SearchApp.exe (PID: 5612)
    • Executing commands from a ".bat" file

      • wscript.exe (PID: 3128)
    • Starts CMD.EXE for commands execution

      • Bridgecontainercomponent.exe (PID: 2464)
      • wscript.exe (PID: 3128)
    • Executed via WMI

      • schtasks.exe (PID: 1700)
      • schtasks.exe (PID: 4032)
      • schtasks.exe (PID: 2888)
      • schtasks.exe (PID: 6432)
      • schtasks.exe (PID: 6312)
      • schtasks.exe (PID: 4040)
      • schtasks.exe (PID: 6624)
      • schtasks.exe (PID: 1196)
      • schtasks.exe (PID: 6224)
      • schtasks.exe (PID: 1376)
      • schtasks.exe (PID: 6572)
      • schtasks.exe (PID: 3916)
      • schtasks.exe (PID: 2708)
      • schtasks.exe (PID: 7120)
      • schtasks.exe (PID: 6404)
      • schtasks.exe (PID: 4316)
      • schtasks.exe (PID: 5048)
      • schtasks.exe (PID: 5372)
      • schtasks.exe (PID: 6100)
      • schtasks.exe (PID: 4228)
      • schtasks.exe (PID: 6276)
      • schtasks.exe (PID: 5276)
      • schtasks.exe (PID: 5588)
      • schtasks.exe (PID: 4904)
    • The process executes VB scripts

      • SearchApp.exe (PID: 5612)
      • SearchApp.exe (PID: 6952)
      • SearchApp.exe (PID: 4128)
      • SearchApp.exe (PID: 6124)
      • SearchApp.exe (PID: 6564)
      • SearchApp.exe (PID: 5932)
    • Starts itself from another location

      • Bridgecontainercomponent.exe (PID: 2428)
  • INFO

    • Checks supported languages

      • SharkHack.exe (PID: 5748)
    • The process uses the downloaded file

      • SharkHack.exe (PID: 5748)
    • Reads the computer name

      • SharkHack.exe (PID: 5748)
    • Process checks computer location settings

      • SharkHack.exe (PID: 5748)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:12:01 18:00:55+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 201216
InitializedDataSize: 98304
UninitializedDataSize: -
EntryPoint: 0x1ec40
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
181
Monitored processes
51
Malicious processes
7
Suspicious processes
6

Behavior graph

Click at the process to see the details
start sharkhack.exe wscript.exe no specs cmd.exe no specs conhost.exe no specs bridgecontainercomponent.exe no specs cmd.exe conhost.exe no specs bridgecontainercomponent.exe shellexperiencehost.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs #DARKCRYSTAL searchapp.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL searchapp.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL searchapp.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL searchapp.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL searchapp.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL searchapp.exe wscript.exe no specs wscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
204C:\WINDOWS\system32\cmd.exe /c ""C:\agentproviderServerDriverdll\IFBhvLZxnRyQUVm8kiNe.bat" "C:\Windows\SysWOW64\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
944"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\61472823-3a98-4d87-a44f-71c120ee46f9.vbs" C:\Windows\System32\wscript.exeSearchApp.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1196schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\found.000\dir_00000002.chk\fontdrvhost.exe'" /rl HIGHEST /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1376schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 7 /tr "'C:\agentproviderServerDriverdll\SearchApp.exe'" /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1700schtasks.exe /create /tn "ctfmon" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\Offline\ctfmon.exe'" /rl HIGHEST /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2312"C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mcaC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shell Experience Host
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\shellexperiencehost_cw5n1h2txyewy\shellexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\dxgi.dll
2428C:\agentproviderServerDriverdll\Bridgecontainercomponent.exeC:\agentproviderServerDriverdll\Bridgecontainercomponent.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
5.15.2.0
Modules
Images
c:\agentproviderserverdriverdll\bridgecontainercomponent.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2464"C:\agentproviderServerDriverdll\Bridgecontainercomponent.exe"C:\agentproviderServerDriverdll\Bridgecontainercomponent.execmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
5.15.2.0
Modules
Images
c:\agentproviderserverdriverdll\bridgecontainercomponent.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2708schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\Recovery\Logs\Registry.exe'" /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2888schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\found.000\dir0000.chk\winlogon.exe'" /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
16 876
Read events
16 816
Write events
60
Delete events
0

Modification events

(PID) Process:(5748) SharkHack.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbe\OpenWithProgids
Operation:writeName:VBEFile
Value:
(PID) Process:(2428) Bridgecontainercomponent.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:EnableLUA
Value:
0
(PID) Process:(2428) Bridgecontainercomponent.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:ConsentPromptBehaviorAdmin
Value:
0
(PID) Process:(2428) Bridgecontainercomponent.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:PromptOnSecureDesktop
Value:
0
(PID) Process:(2428) Bridgecontainercomponent.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
23004100430042006C006F00620000000000000000000000010000000000000000000000
(PID) Process:(2312) ShellExperienceHost.exeKey:\REGISTRY\A\{6bc3fa7e-a434-1c1b-d134-6b4184829ff4}\LocalState
Operation:writeName:PeekBadges
Value:
5B005D0000004663459CE72ADB01
(PID) Process:(2428) Bridgecontainercomponent.exeKey:HKEY_CURRENT_USER\SOFTWARE\f469511a723948c98cb7b63acdbb2edf42096529
Operation:writeName:0608fca9e57eb05b6d1f31c264c2a687f1e95f25
Value:
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
(PID) Process:(5612) SearchApp.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:EnableLUA
Value:
0
(PID) Process:(5612) SearchApp.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:ConsentPromptBehaviorAdmin
Value:
0
(PID) Process:(5612) SearchApp.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:PromptOnSecureDesktop
Value:
0
Executable files
10
Suspicious files
1
Text files
21
Unknown types
0

Dropped files

PID
Process
Filename
Type
2428Bridgecontainercomponent.exeC:\found.000\dir_00000002.chk\fontdrvhost.exeexecutable
MD5:FC1109ED3FCE1E55642C57B550376210
SHA256:C4A6418597F7832EDB836729E23DB6F2F9F0D560DBC4DDF1FEA1EA883A9711ED
5748SharkHack.exeC:\agentproviderServerDriverdll\IFBhvLZxnRyQUVm8kiNe.battext
MD5:36C98141E5014EB420B1D71E65F3BC0B
SHA256:2D9E208774B5A6DCF80C444D80714C6AC57426829C671F1A7A6C736759864D02
5748SharkHack.exeC:\agentproviderServerDriverdll\Lk2YYsPDBp3mgHA3LWyVV9VWHS.vbevbe
MD5:DA7439CAD2F3E7D67E47E8A8D7B4CC46
SHA256:E93A930BD6AB34E1923206FA3C73611EF5D988E24ADC3021098897148ABC2FD5
5748SharkHack.exeC:\agentproviderServerDriverdll\Bridgecontainercomponent.exeexecutable
MD5:FC1109ED3FCE1E55642C57B550376210
SHA256:C4A6418597F7832EDB836729E23DB6F2F9F0D560DBC4DDF1FEA1EA883A9711ED
2428Bridgecontainercomponent.exeC:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\SystemSettings.exeexecutable
MD5:FC1109ED3FCE1E55642C57B550376210
SHA256:C4A6418597F7832EDB836729E23DB6F2F9F0D560DBC4DDF1FEA1EA883A9711ED
2428Bridgecontainercomponent.exeC:\found.000\dir_00000002.chk\5b884080fd4f94text
MD5:8E171B62CDC97875C34BD3D851937BB5
SHA256:20F2C1D8CE3A83A272E8D431086F924F89693C912CFD9241BDF05586A557B815
2428Bridgecontainercomponent.exeC:\Program Files\Windows Defender\Offline\ctfmon.exeexecutable
MD5:FC1109ED3FCE1E55642C57B550376210
SHA256:C4A6418597F7832EDB836729E23DB6F2F9F0D560DBC4DDF1FEA1EA883A9711ED
2428Bridgecontainercomponent.exeC:\found.000\dir0000.chk\cc11b995f2a76dtext
MD5:960BFB474B403A6D3175A8880138F4CD
SHA256:AE90078CA69D8EB8D3E0FE4704DCCD7340177D99FD0AEF3D022A0D22622C9150
2428Bridgecontainercomponent.exeC:\agentproviderServerDriverdll\SearchApp.exeexecutable
MD5:FC1109ED3FCE1E55642C57B550376210
SHA256:C4A6418597F7832EDB836729E23DB6F2F9F0D560DBC4DDF1FEA1EA883A9711ED
2428Bridgecontainercomponent.exeC:\agentproviderServerDriverdll\38384e6a620884text
MD5:AC1EF9CFB1FAC4890A4EEC034F2CD4B6
SHA256:CAB8AB14C0DD07017EB7716D4FDD70AF1F76A457BF21B37365E11EC4AACC195B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
17
TCP/UDP connections
47
DNS requests
22
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6944
svchost.exe
GET
200
2.16.164.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6952
SearchApp.exe
GET
200
5.101.152.4:80
http://vasilikq.beget.tech/L1nc0In.php?NbV3XfJTFoPOE=yQRalE2yVd2dCtu1MN9Dag&V2YHffk=eHMUUthcoeZF2A3cZiOcBOBQRF&iN7XSvnYVzYaHouVjAbTU85r6QIxQG=CPx9PrHGTOmimBIHxQ2bP0wlkRPaCn&3b239f727a3dafe961942102126f5d2c=5774ac238a541c855773544a2ff37d57&f11f309f68b3ac25d62721f7903b0dc0=AMiRGMwQ2NmFGN5EzYygDO4gTZlRGM1UDMmhjZzIjZiRzYjBjMwYWM&NbV3XfJTFoPOE=yQRalE2yVd2dCtu1MN9Dag&V2YHffk=eHMUUthcoeZF2A3cZiOcBOBQRF&iN7XSvnYVzYaHouVjAbTU85r6QIxQG=CPx9PrHGTOmimBIHxQ2bP0wlkRPaCn
unknown
whitelisted
6232
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
4128
SearchApp.exe
GET
200
5.101.152.4:80
http://vasilikq.beget.tech/L1nc0In.php?MtCNnFUnKyEfGvXDyaFqw0=fOvUqngIYptCW&OzyAPb41vtk18BxKR3VVh91uoAnq=0WtAKjlRphZdncCuyofUOY&qBVP8DWPxOL5W10ybM2lV613gyA=VIVbbgC9yUnNSSmPbhq380DIVw&3b239f727a3dafe961942102126f5d2c=5774ac238a541c855773544a2ff37d57&f11f309f68b3ac25d62721f7903b0dc0=AMiRGMwQ2NmFGN5EzYygDO4gTZlRGM1UDMmhjZzIjZiRzYjBjMwYWM&MtCNnFUnKyEfGvXDyaFqw0=fOvUqngIYptCW&OzyAPb41vtk18BxKR3VVh91uoAnq=0WtAKjlRphZdncCuyofUOY&qBVP8DWPxOL5W10ybM2lV613gyA=VIVbbgC9yUnNSSmPbhq380DIVw
unknown
whitelisted
4128
SearchApp.exe
GET
200
5.101.152.4:80
http://vasilikq.beget.tech/L1nc0In.php?MtCNnFUnKyEfGvXDyaFqw0=fOvUqngIYptCW&OzyAPb41vtk18BxKR3VVh91uoAnq=0WtAKjlRphZdncCuyofUOY&qBVP8DWPxOL5W10ybM2lV613gyA=VIVbbgC9yUnNSSmPbhq380DIVw&3b239f727a3dafe961942102126f5d2c=5774ac238a541c855773544a2ff37d57&f11f309f68b3ac25d62721f7903b0dc0=AMiRGMwQ2NmFGN5EzYygDO4gTZlRGM1UDMmhjZzIjZiRzYjBjMwYWM&MtCNnFUnKyEfGvXDyaFqw0=fOvUqngIYptCW&OzyAPb41vtk18BxKR3VVh91uoAnq=0WtAKjlRphZdncCuyofUOY&qBVP8DWPxOL5W10ybM2lV613gyA=VIVbbgC9yUnNSSmPbhq380DIVw
unknown
whitelisted
6124
SearchApp.exe
GET
200
5.101.152.4:80
http://vasilikq.beget.tech/L1nc0In.php?XX86lk6qya1StTE2=4tXhCRgVnKpGlVzZwYF7&y9iaJzu=shH9JN9a5&Gbl7ZQjNFC37=95aFuzG3bwF5niHbHz90C8fj0jR15&3b239f727a3dafe961942102126f5d2c=5774ac238a541c855773544a2ff37d57&f11f309f68b3ac25d62721f7903b0dc0=AMiRGMwQ2NmFGN5EzYygDO4gTZlRGM1UDMmhjZzIjZiRzYjBjMwYWM&XX86lk6qya1StTE2=4tXhCRgVnKpGlVzZwYF7&y9iaJzu=shH9JN9a5&Gbl7ZQjNFC37=95aFuzG3bwF5niHbHz90C8fj0jR15
unknown
whitelisted
6944
svchost.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5612
SearchApp.exe
GET
200
5.101.152.4:80
http://vasilikq.beget.tech/L1nc0In.php?wBbpPpiC=rOXTnbLkWo&3b239f727a3dafe961942102126f5d2c=5774ac238a541c855773544a2ff37d57&f11f309f68b3ac25d62721f7903b0dc0=AMiRGMwQ2NmFGN5EzYygDO4gTZlRGM1UDMmhjZzIjZiRzYjBjMwYWM&wBbpPpiC=rOXTnbLkWo
unknown
whitelisted
5612
SearchApp.exe
GET
200
5.101.152.4:80
http://vasilikq.beget.tech/L1nc0In.php?wBbpPpiC=rOXTnbLkWo&3b239f727a3dafe961942102126f5d2c=5774ac238a541c855773544a2ff37d57&f11f309f68b3ac25d62721f7903b0dc0=AMiRGMwQ2NmFGN5EzYygDO4gTZlRGM1UDMmhjZzIjZiRzYjBjMwYWM&wBbpPpiC=rOXTnbLkWo
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1752
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6944
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6944
svchost.exe
2.16.164.9:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
6944
svchost.exe
23.32.185.131:80
www.microsoft.com
AKAMAI-AS
BR
whitelisted
5612
SearchApp.exe
104.20.3.235:443
pastebin.com
CLOUDFLARENET
shared
5612
SearchApp.exe
5.101.152.4:80
vasilikq.beget.tech
Beget LLC
RU
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 2.16.164.9
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 23.32.185.131
whitelisted
pastebin.com
  • 104.20.3.235
  • 172.67.19.24
  • 104.20.4.235
shared
vasilikq.beget.tech
  • 5.101.152.4
malicious
www.bing.com
  • 2.23.209.179
  • 2.23.209.176
  • 2.23.209.181
  • 2.23.209.182
  • 2.23.209.177
  • 2.23.209.185
  • 2.23.209.183
  • 2.23.209.160
  • 2.23.209.189
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.160.22
  • 40.126.32.74
  • 40.126.32.138
  • 40.126.32.136
  • 20.190.160.17
  • 20.190.160.14
  • 40.126.32.134
  • 40.126.32.133
whitelisted
th.bing.com
  • 2.23.209.158
  • 2.23.209.189
  • 2.23.209.161
  • 2.23.209.185
  • 2.23.209.193
  • 2.23.209.150
  • 2.23.209.148
  • 2.23.209.177
  • 2.23.209.176
whitelisted

Threats

PID
Process
Class
Message
2172
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Online Pastebin Text Storage
5612
SearchApp.exe
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
6952
SearchApp.exe
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
4128
SearchApp.exe
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
6124
SearchApp.exe
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
6564
SearchApp.exe
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
5932
SearchApp.exe
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
1 ETPRO signatures available at the full report
No debug info