| File name: | MinecraftFpsMod.exe |
| Full analysis: | https://app.any.run/tasks/b3fc1edf-c062-4125-b76c-93a963f4711f |
| Verdict: | Malicious activity |
| Threats: | DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common. |
| Analysis date: | September 12, 2024, 13:36:38 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 73D7E637CD16F1F807930FA6442436DF |
| SHA1: | 26C13B2C29065485CE1858D85D9DC792C06ED052 |
| SHA256: | CD0F7FB1020A931C98C7C258241F06292CB9B7CAB8E9ACDB4010F4D56F076EF6 |
| SSDEEP: | 98304:ar7ayGJ6kHOScyi35C6FCsVe+u3HzdT3RV4nGPU1lnlakMbayrnk+WEMaI8aInoS:tJXHL |
| .exe | | | Win32 Executable Borland Delphi 7 (90.7) |
|---|---|---|
| .exe | | | InstallShield setup (5.8) |
| .exe | | | Win32 Executable Delphi generic (1.9) |
| .exe | | | Win32 Executable (generic) (0.6) |
| .exe | | | Win16/32 Executable Delphi generic (0.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 1992:06:19 22:22:17+00:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 629760 |
| InitializedDataSize: | 6340096 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x9ab80 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Chinese (Simplified) |
| CharacterSet: | Unicode |
| FileVersion: | 1.0.0.0 |
| FileDescription: | 易语言程序 |
| ProductName: | 易语言程序 |
| ProductVersion: | 1.0.0.0 |
| LegalCopyright: | 作者版权所有 请尊重并使用正版 |
| Comments: | 本程序使用易语言编写(http://www.eyuyan.com) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 488 | schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\MsAgentBrowserdhcp\dllhost.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1044 | schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Public\Libraries\smss.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1076 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1292 | schtasks.exe /create /tn "BridgesurrogateB" /sc MINUTE /mo 9 /tr "'C:\MsAgentBrowserdhcp\Bridgesurrogate.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1776 | w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 | C:\Windows\System32\w32tm.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Time Service Diagnostic Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2228 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2256 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2384 | "C:\MsAgentBrowserdhcp/Bridgesurrogate.exe" | C:\MsAgentBrowserdhcp\Bridgesurrogate.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.2.7.1277 Modules
| |||||||||||||||
| 2460 | schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MsAgentBrowserdhcp\spoolsv.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2580 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (5712) MinecraftFpsMod.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
| (PID) Process: | (5712) MinecraftFpsMod.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | ????? |
Value: C:\ProgramData\Synaptics\Synaptics.exe | |||
| (PID) Process: | (5712) MinecraftFpsMod.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A7803901000010901EF8A46ECE11A7FF00AA003CA9F6AC000000 | |||
| (PID) Process: | (5712) MinecraftFpsMod.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts |
| Operation: | write | Name: | LastUpdate |
Value: 72EEE26600000000 | |||
| (PID) Process: | (4252) ._cache_MinecraftFpsMod.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbe\OpenWithProgids |
| Operation: | write | Name: | VBEFile |
Value: | |||
| (PID) Process: | (2384) Bridgesurrogate.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\b0655bbd0c4c61bc2ceb54a836ca6af98732ab8c |
| Operation: | write | Name: | 6c301ebcb941da1736bd7aea0f488b660b21fbce |
Value: H4sIAAAAAAAEAIXOsQ7CMAwE0H/pjPgANtqlA0gsnTBD2lipJYMrX1r4/EZMLCjr3dPp7k13IrrinPiVW7c32OM8LURRdTbkI3+4OfxVA6xTKemPG0oLots6qkxEFxk9uHCJ8AQqg1jMFFtFxYC+fq51iYmxulsKmb/6sQP2lNZU8gAAAA== | |||
| (PID) Process: | (2384) Bridgesurrogate.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | dllhost |
Value: "C:\MsAgentBrowserdhcp\dllhost.exe" | |||
| (PID) Process: | (2384) Bridgesurrogate.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | UsoClient |
Value: "C:\MsAgentBrowserdhcp\UsoClient.exe" | |||
| (PID) Process: | (2384) Bridgesurrogate.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | smss |
Value: "C:\Users\Public\Libraries\smss.exe" | |||
| (PID) Process: | (2384) Bridgesurrogate.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | spoolsv |
Value: "C:\MsAgentBrowserdhcp\spoolsv.exe" | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5712 | MinecraftFpsMod.exe | C:\ProgramData\Synaptics\RCXBBC6.tmp | executable | |
MD5:72582E1152710DD8FD17C22FC6117094 | SHA256:7FC7A9EF9FFFF42C18143F3C8F02BB3C7980708E08439B1ED5269B1125BDD8A0 | |||
| 4252 | ._cache_MinecraftFpsMod.exe | C:\MsAgentBrowserdhcp\6tdiKxJ4vs339LB2ENkEUF6gwXbV.bat | text | |
MD5:F0817915454C14A131A03BB1E970A3D9 | SHA256:9983F72CA78BEE90D64610D7BD9BCE46C075674F22307494AD40982FF760978D | |||
| 5712 | MinecraftFpsMod.exe | C:\ProgramData\Synaptics\Synaptics.exe | executable | |
MD5:73D7E637CD16F1F807930FA6442436DF | SHA256:CD0F7FB1020A931C98C7C258241F06292CB9B7CAB8E9ACDB4010F4D56F076EF6 | |||
| 4252 | ._cache_MinecraftFpsMod.exe | C:\MsAgentBrowserdhcp\Bridgesurrogate.exe | executable | |
MD5:D5EB73597ED0A278E1A993EE15C5CDB1 | SHA256:B6B9517B7429AFEA6D33AE62A1CFF9CE8290B160F9F5544B1D9DD3AB0F620404 | |||
| 4252 | ._cache_MinecraftFpsMod.exe | C:\MsAgentBrowserdhcp\RJohyDXhI3BukXB8LZtFph4xzxsRiCFy2OHMYmU5wvokqlpzCh.vbe | vbe | |
MD5:E6AA5A9A61E5A14929496CC623751FCB | SHA256:4518EAB1E079194970BEE0B64F0DC5151E2208A48A94672E9A98FBE046E6A7D9 | |||
| 2384 | Bridgesurrogate.exe | C:\MsAgentBrowserdhcp\spoolsv.exe | executable | |
MD5:D5EB73597ED0A278E1A993EE15C5CDB1 | SHA256:B6B9517B7429AFEA6D33AE62A1CFF9CE8290B160F9F5544B1D9DD3AB0F620404 | |||
| 2384 | Bridgesurrogate.exe | C:\Users\admin\Desktop\ClozIQZe.log | executable | |
MD5:D8BF2A0481C0A17A634D066A711C12E9 | SHA256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669 | |||
| 2384 | Bridgesurrogate.exe | C:\Users\admin\Desktop\FsmIeiTa.log | executable | |
MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0 | SHA256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254 | |||
| 2384 | Bridgesurrogate.exe | C:\MsAgentBrowserdhcp\dbfa0bd15ad253 | text | |
MD5:7D414EB7413A2281011F49FFCE51CBA1 | SHA256:A1798561378B53BD88DF19823A93B1980F62E9A2C3037C7F8AA98EA6C82B20D2 | |||
| 2384 | Bridgesurrogate.exe | C:\Users\Public\Libraries\smss.exe | executable | |
MD5:D5EB73597ED0A278E1A993EE15C5CDB1 | SHA256:B6B9517B7429AFEA6D33AE62A1CFF9CE8290B160F9F5544B1D9DD3AB0F620404 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6780 | dasHost.exe | POST | 404 | 80.211.144.156:80 | http://noburo.top/phpJavascriptSecurecpuupdateFlowerAsyncUniversaltrack.php | unknown | — | — | unknown |
7096 | Synaptics.exe | GET | 200 | 69.42.215.252:80 | http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978 | unknown | — | — | whitelisted |
1356 | svchost.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2024 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
2476 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6696 | dasHost.exe | POST | 404 | 80.211.144.156:80 | http://noburo.top/phpJavascriptSecurecpuupdateFlowerAsyncUniversaltrack.php | unknown | — | — | unknown |
2476 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
4680 | dasHost.exe | POST | 404 | 80.211.144.156:80 | http://noburo.top/phpJavascriptSecurecpuupdateFlowerAsyncUniversaltrack.php | unknown | — | — | unknown |
7096 | Synaptics.exe | GET | 200 | 172.217.16.131:80 | http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D | unknown | — | — | whitelisted |
7096 | Synaptics.exe | GET | 200 | 142.250.186.67:80 | http://c.pki.goog/r/r1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1356 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1084 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2120 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1356 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
7096 | Synaptics.exe | 69.42.215.252:80 | freedns.afraid.org | AWKNET | US | whitelisted |
1356 | svchost.exe | 88.221.169.152:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
2256 | svchost.exe | 224.0.0.251:5353 | — | — | — | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2256 | svchost.exe | 224.0.0.252:5355 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
xred.mooo.com |
| whitelisted |
freedns.afraid.org |
| whitelisted |
www.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
noburo.top |
| unknown |
slscr.update.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2256 | svchost.exe | Misc activity | ET INFO DYNAMIC_DNS Query to Abused Domain *.mooo.com |
2256 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
6696 | dasHost.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.top domain |
6696 | dasHost.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
6696 | dasHost.exe | A Network Trojan was detected | REMOTE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
4680 | dasHost.exe | A Network Trojan was detected | REMOTE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
4680 | dasHost.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
4540 | dasHost.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.top domain |
4540 | dasHost.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
4540 | dasHost.exe | A Network Trojan was detected | REMOTE [ANY.RUN] DarkCrystal Rat Check-in (POST) |