File name:

DcRat 1.0.7 个人修改版.rar

Full analysis: https://app.any.run/tasks/fcd2b171-8488-4eb9-b289-d4bfcf0175f9
Verdict: Malicious activity
Threats:

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

Analysis date: July 06, 2024, 21:26:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
asyncrat
limerat
trojan
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

7976A102F3F13170096A83FBE5F86DAB

SHA1:

EE6942A430F8E89AF207393A25F4FDA103F988E5

SHA256:

AB6711F82F53F14AB98577F70941B104267FBC06F401A06A4504C5A5B409A973

SSDEEP:

196608:oZoVA8JB73SKhdsf9DJPNYBES0ETupbeno:oZP8JBeKhk9JPWF0Eno

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • WinRAR.exe (PID: 3344)
      • DcRat 1.0.7 个人修改版.exe (PID: 540)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3344)
      • DcRat 1.0.7 个人修改版.exe (PID: 540)
    • ASYNCRAT has been detected (YARA)

      • DcRat 1.0.7 个人修改版.exe (PID: 540)
      • Client.exe (PID: 3672)
    • LimeRAT is detected

      • Client.exe (PID: 3672)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 3344)
    • Executable content was dropped or overwritten

      • DcRat 1.0.7 个人修改版.exe (PID: 540)
    • Reads settings of System Certificates

      • Client.exe (PID: 3672)
    • Reads security settings of Internet Explorer

      • DcRat 1.0.7 个人修改版.exe (PID: 540)
    • Reads the Internet Settings

      • DcRat 1.0.7 个人修改版.exe (PID: 540)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3344)
    • Manual execution by a user

      • DcRat 1.0.7 个人修改版.exe (PID: 540)
      • Client.exe (PID: 3672)
    • Checks supported languages

      • DcRat 1.0.7 个人修改版.exe (PID: 540)
      • Client.exe (PID: 3672)
    • Reads the computer name

      • DcRat 1.0.7 个人修改版.exe (PID: 540)
      • Client.exe (PID: 3672)
    • Reads Microsoft Office registry keys

      • DcRat 1.0.7 个人修改版.exe (PID: 540)
    • Reads the machine GUID from the registry

      • DcRat 1.0.7 个人修改版.exe (PID: 540)
      • Client.exe (PID: 3672)
    • Reads Environment values

      • DcRat 1.0.7 个人修改版.exe (PID: 540)
      • Client.exe (PID: 3672)
    • Creates files or folders in the user directory

      • DcRat 1.0.7 个人修改版.exe (PID: 540)
    • Reads the software policy settings

      • Client.exe (PID: 3672)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

AsyncRat

(PID) Process(3672) Client.exe
C2 (1)127.0.0.1
Ports (1)2048
Version1.0.7 个人修改版
Options
AutoRunfalse
MutexDcRatMutex_qwqdanchun
InstallFolder%AppData%
Certificates
Cert1MIICVzCCAcCgAwIBAgIVALY1OZ5x62bQr7lmG9mvM+4XD+N7MA0GCSqGSIb3DQEBDQUAMH4xJDAiBgNVBAMMG0RjUmF0IDEuMC43IOS4quS6uuS/ruaUueeJiDEbMBkGA1UECwwSQm9iJ3MgQ29uc3RydWN0aW9uMR8wHQYDVQQKDBZCb2IncyBDb25zdHJ1Y3Rpb24gTExDMQswCQYDVQQHDAJOVjELMAkGA1UEBhMCVVMwHhcNMjIxMTA3MTQzODM4WhcNMzMwODE2MTQzODM4WjAdMRswGQYDVQQDDBJC...
Server_SignaturevavuWj7rwnKcXOQSYxydY8Uhjgtl55+jnwTI1ZZvd/jq+fPaNddZ16QfP8MdGyvU46wcReqhxo+sraMgF9lWlAuypVDrFZYzMXZgxYliskRkTGSKDHAy4orCac6BbYdJ7R0giPPEcQKlzXkXkdAScpoE/JWaOQD4pNPsx5LQ01g=
Keys
AES5b07bd913a3d9acfdbdba7af716e6da8de55e0278dfbc9c474eb5b8606c80ea7
SaltQ3JlYXRlZEJ5aWNlLXd6bC4u
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe #ASYNCRAT dcrat 1.0.7 个人修改版.exe #ASYNCRAT client.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
540"C:\Users\admin\Desktop\DcRat 1.0.7 个人修改版.exe" C:\Users\admin\Desktop\DcRat 1.0.7 个人修改版.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
DcRat 1.0.7 个人修改版
Version:
1.0.7.0
Modules
Images
c:\users\admin\desktop\dcrat 1.0.7 个人修改版.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3344"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\DcRat 1.0.7 个人修改版.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3672"C:\Users\admin\Desktop\Client.exe" C:\Users\admin\Desktop\Client.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Version:
1.0.7.0
Modules
Images
c:\users\admin\desktop\client.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
AsyncRat
(PID) Process(3672) Client.exe
C2 (1)127.0.0.1
Ports (1)2048
Version1.0.7 个人修改版
Options
AutoRunfalse
MutexDcRatMutex_qwqdanchun
InstallFolder%AppData%
Certificates
Cert1MIICVzCCAcCgAwIBAgIVALY1OZ5x62bQr7lmG9mvM+4XD+N7MA0GCSqGSIb3DQEBDQUAMH4xJDAiBgNVBAMMG0RjUmF0IDEuMC43IOS4quS6uuS/ruaUueeJiDEbMBkGA1UECwwSQm9iJ3MgQ29uc3RydWN0aW9uMR8wHQYDVQQKDBZCb2IncyBDb25zdHJ1Y3Rpb24gTExDMQswCQYDVQQHDAJOVjELMAkGA1UEBhMCVVMwHhcNMjIxMTA3MTQzODM4WhcNMzMwODE2MTQzODM4WjAdMRswGQYDVQQDDBJC...
Server_SignaturevavuWj7rwnKcXOQSYxydY8Uhjgtl55+jnwTI1ZZvd/jq+fPaNddZ16QfP8MdGyvU46wcReqhxo+sraMgF9lWlAuypVDrFZYzMXZgxYliskRkTGSKDHAy4orCac6BbYdJ7R0giPPEcQKlzXkXkdAScpoE/JWaOQD4pNPsx5LQ01g=
Keys
AES5b07bd913a3d9acfdbdba7af716e6da8de55e0278dfbc9c474eb5b8606c80ea7
SaltQ3JlYXRlZEJ5aWNlLXd6bC4u
Total events
17 106
Read events
17 000
Write events
100
Delete events
6

Modification events

(PID) Process:(3344) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3344) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3344) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3344) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3344) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3344) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(3344) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\DcRat 1.0.7 个人修改版.rar
(PID) Process:(3344) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3344) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3344) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
26
Suspicious files
448
Text files
9
Unknown types
19

Dropped files

PID
Process
Filename
Type
3344WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3344.268\Plugins\ip2region.db
MD5:
SHA256:
3344WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3344.268\ClientsFolder\D050D116CBC42AACA698\Information\Information.txttext
MD5:B85CAEB7CA06F4798ABC35B8416E207F
SHA256:A5197546EEE284146BD7DB651638FBC7A6996AD6B66E2012099B512097B5F494
3344WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3344.268\Plugins\Discord.pdbpdb
MD5:A4F75F4D6281D0EFE8EE373F80956269
SHA256:16A41EFB3C985B64B2E0CAAF5685A6A051399BDE9E19962AC7F86FA463F0351E
3344WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3344.268\Plugins\Keylogger.exeexecutable
MD5:6E6ADFBCCF11F61475D9EF512D5A446D
SHA256:94386DCBE53D380E0804E2A092B60DE01C2D45FA3140CD645E930CFFD0F095F7
3344WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3344.268\Plugins\Extra.dllexecutable
MD5:AACFD5D2AE2E725972100FF9A1EE8C1C
SHA256:263405A794EFDFBF8E8555B502B6FC02ED4AA0721AF12D34CDB9424D3311BDE1
3344WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3344.268\Plugins\Fun.dllexecutable
MD5:551E31627AC81F80690BF376F6EFCE2C
SHA256:6903E56E6B105942C994A9F0588DB1EC148A8F7DE53288B0437BB679FBC5C9E6
3344WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3344.268\Plugins\Discord.dllexecutable
MD5:F395CFA16CD537FB9F2B93ECDD949D4C
SHA256:65099A26DCB5D1571BD35E05186BA5FC8DAC35795F59F00B085B55BAADAE6AB2
3344WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3344.268\Plugins\FileManager.pdbpdb
MD5:D2050D9985DFE696820F955B36148CC1
SHA256:262EA13B9BAD211437CB577B1897A5C6B57B2A59E916C3DE40B4975D49AE5B77
3344WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3344.268\Plugins\FileManager.dllexecutable
MD5:657A7D8AE378EF31662A6DA97D1F46B3
SHA256:DA969B6965E388F1C6884D8616BA31837A6FA4953362AE288B95737C1DD5A96D
3344WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3344.268\Plugins\Extra.pdbpdb
MD5:B60C4B08E1E7720350DE99FE52575F59
SHA256:03E6BE2E97D6A6E700DBCA1A7451644039A5C59A023827F00046D9B69D38E1E5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
13
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1372
svchost.exe
GET
304
23.50.131.206:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
unknown
1372
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
1372
svchost.exe
GET
200
23.48.23.166:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
1060
svchost.exe
GET
304
199.232.210.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a9f83325acc8ca75
unknown
unknown
480
lsass.exe
GET
200
199.232.210.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?cfa3fea8103cb675
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1372
svchost.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2564
svchost.exe
239.255.255.250:3702
whitelisted
1060
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1372
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
1372
svchost.exe
23.50.131.206:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
1372
svchost.exe
23.48.23.166:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
1372
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1060
svchost.exe
199.232.210.172:80
ctldl.windowsupdate.com
FASTLY
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
ctldl.windowsupdate.com
  • 23.50.131.206
  • 23.50.131.202
  • 23.50.131.210
  • 23.50.131.209
  • 199.232.210.172
  • 199.232.214.172
whitelisted
crl.microsoft.com
  • 23.48.23.166
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted

Threats

No threats detected
No debug info