| File name: | dcrat.a.exe |
| Full analysis: | https://app.any.run/tasks/6e6ee0fd-92ed-4160-8858-831d02ebd81f |
| Verdict: | Malicious activity |
| Threats: | A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices. |
| Analysis date: | November 28, 2023, 18:12:21 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | C37F47FD33D86029AB6CB1BB0A08BF6F |
| SHA1: | 7909059BDBCF50E7F2942C34E40D1A9DECE2862F |
| SHA256: | CF4EFAD0B9D74151B09BE4ACFB12D1AEA2A9E316B97A2EB7F4CA8AC12B0E6D8C |
| SSDEEP: | 49152:vP2AgFrKj5G0lvhQ5Qv9I8yzoCNHGUwph+grKrNlTzTaCxESHwRd3ar7zrd0oz7s:MFrKdV2qyH3wXNrAlHWCCtK4DEoiiB |
| .exe | | | InstallShield setup (53.2) |
|---|---|---|
| .exe | | | Win32 Executable Delphi generic (17.5) |
| .scr | | | Windows screen saver (16.1) |
| .exe | | | Win32 Executable (generic) (5.5) |
| .exe | | | Win16/32 Executable Delphi generic (2.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 1992:06:20 00:22:17+02:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 5120 |
| InitializedDataSize: | 1772544 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x20cc |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.6.0.56855 |
| ProductVersionNumber: | 1.6.0.56855 |
| FileFlagsMask: | 0x0017 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | Roblox Corporation |
| FileDescription: | Roblox |
| FileVersion: | 1, 6, 0, 6020631 |
| LegalCopyright: | Copyright © 2020 Roblox Corporation. All rights reserved. |
| OriginalFileName: | Roblox.exe |
| ProductName: | Roblox Bootstrapper |
| ProductVersion: | 1, 6, 0, 6020631 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 276 | schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\wininit.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 304 | schtasks.exe /create /tn "mscorsvwm" /sc MINUTE /mo 8 /tr "'C:\Users\admin\PrintHood\mscorsvw.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1004 | schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Windows\tracing\PowerTracker\csrss.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1296 | schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\PortSurrogateAgentWin\Idle.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1696 | schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Windows\PCHEALTH\ERRORREP\QSIGNOFF\conhost.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1784 | schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-00A1-0412-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1952 | schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\Users\Public\cmd.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2064 | schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\PortSurrogateAgentWin\Idle.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2112 | schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Windows\tracing\PowerTracker\csrss.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2316 | schtasks.exe /create /tn "mscorsvwm" /sc MINUTE /mo 8 /tr "'C:\Users\admin\PrintHood\mscorsvw.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (2876) dcrat.a.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2876) dcrat.a.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2876) dcrat.a.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2876) dcrat.a.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2848) DCRatBuild.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2848) DCRatBuild.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2848) DCRatBuild.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2848) DCRatBuild.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2852) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2852) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2876 | dcrat.a.exe | C:\Users\admin\AppData\Local\Temp\Stumble Guys.url | url | |
MD5:67AC79232DADBEE65D314D99AC3A2998 | SHA256:5C92D94DCF349C17B6039547DAED915A402BA8207FEB555BE40646DC930427C5 | |||
| 2876 | dcrat.a.exe | C:\Users\admin\AppData\Local\Temp\DCRatBuild.exe | executable | |
MD5:64E4996EA9751BC4C0B7A138C78CDABF | SHA256:135960682367A4D181388494FCD7CB38001EDB16D75FA9034A1EF6A27C6D4533 | |||
| 2512 | Componentinto.exe | C:\MSOCache\All Users\{90140000-00A1-0412-0000-0000000FF1CE}-C\WmiPrvSE.exe | executable | |
MD5:CA51FFD6182F5F639488FC1757150859 | SHA256:6A8E0C0B704114274EE0B2F4C1D3E6FDE744D67F8B541286ACF6DCA2BA59797A | |||
| 2848 | DCRatBuild.exe | C:\PortSurrogateAgentWin\Componentinto.exe | executable | |
MD5:CA51FFD6182F5F639488FC1757150859 | SHA256:6A8E0C0B704114274EE0B2F4C1D3E6FDE744D67F8B541286ACF6DCA2BA59797A | |||
| 2848 | DCRatBuild.exe | C:\PortSurrogateAgentWin\4gM4TzK0l7M3P5qV6BycaP.vbe | vbe | |
MD5:8155F1CA15A96FA2DC06907D93B4B6A7 | SHA256:558C7372FBBDA846A88BB4B96BB9E3ECBC49EC0B98309DA6358BE9C06D2DA1E2 | |||
| 2512 | Componentinto.exe | C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\wininit.exe | executable | |
MD5:CA51FFD6182F5F639488FC1757150859 | SHA256:6A8E0C0B704114274EE0B2F4C1D3E6FDE744D67F8B541286ACF6DCA2BA59797A | |||
| 2512 | Componentinto.exe | C:\Windows\PCHEALTH\ERRORREP\QSIGNOFF\088424020bedd6 | text | |
MD5:4BD666386E8AD54FA20B5E092FE66199 | SHA256:— | |||
| 2512 | Componentinto.exe | C:\PortSurrogateAgentWin\csrss.exe | executable | |
MD5:CA51FFD6182F5F639488FC1757150859 | SHA256:6A8E0C0B704114274EE0B2F4C1D3E6FDE744D67F8B541286ACF6DCA2BA59797A | |||
| 2512 | Componentinto.exe | C:\PortSurrogateAgentWin\886983d96e3d3e | text | |
MD5:BA61286EB9ABE42E2587308317FDC3A2 | SHA256:— | |||
| 2512 | Componentinto.exe | C:\Users\admin\AppData\Local\ebf1f9fa8afd6d | text | |
MD5:36F4D2134708BCB02A7373B96C68A465 | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3340 | WmiPrvSE.exe | GET | 200 | 5.23.50.27:80 | http://ck49537.tw1.ru/_Defaultwindows.php?xluEnzax9BpIS9nw5fyr0fDqS=qgYfIt&617d752616c75779ac2babdac9241516=06e77c9560b2219508988a69cab8cd75&22436102822f47cceec98cb7e344a958=QOyUGZwMWN4AzMmVWZhhTY3UGZxIjYiVzM3QzNlVDZzYGM4UGNyMGO&xluEnzax9BpIS9nw5fyr0fDqS=qgYfIt | unknown | — | 436 b | unknown |
3340 | WmiPrvSE.exe | GET | — | 5.23.50.27:80 | http://ck49537.tw1.ru/_Defaultwindows.php?8DVR5L5G=KvKTL1CVjRO&66cd395ea123f2517b8bc06f2243f1e8=wM0czY3E2MykzY5gTZ2kTYzIWOwYjN5IjZ3MjNwUTYwMTMhJjN0YWM3kDN4MDO3UTNyYjMzgDN&22436102822f47cceec98cb7e344a958=gMxY2NhJGM3UmMkVDM2cTYjBjM4IWYwUzYlRWM0MTOhFjM1Q2MzYGZ&1c3a2cb2b159274aef4f7e8f01f83aee=d1nI5UmNiV2NwImMxcTMjBjNwcDNmJmMzAzM0ImMyYzMzIzN3MzY2EzMhJiOigTMykTZhRjM1kzNiljZiBDZ5MmYxIjM1MzYhdDMykTYiwiIyUTMwUjMjFDO4UTY3kDO3UTNwkjMmF2MmBTOihzN3YTYjVjNmN2NiJiOiQTZmRWZlZzNkVDOhFGO1EDMmVWNhNjY1YmZ2IzM3E2Nis3W | unknown | — | — | unknown |
3340 | WmiPrvSE.exe | GET | — | 5.23.50.27:80 | http://ck49537.tw1.ru/_Defaultwindows.php?8DVR5L5G=KvKTL1CVjRO&66cd395ea123f2517b8bc06f2243f1e8=wM0czY3E2MykzY5gTZ2kTYzIWOwYjN5IjZ3MjNwUTYwMTMhJjN0YWM3kDN4MDO3UTNyYjMzgDN&22436102822f47cceec98cb7e344a958=gMxY2NhJGM3UmMkVDM2cTYjBjM4IWYwUzYlRWM0MTOhFjM1Q2MzYGZ&b372a6f035cbd714e3fd15e2900d9019=0VfiIiOiYTN2MWM2M2NzQjNiFzY2YTOzMWYllTYjhzN4ImNjNmNiwiIyQ2MyQ2M4gjNxEDZ4Q2Y3UDZ4ADNzMmZzUTYyEDOyIWYlJDN4ETNjJiOigTMykTZhRjM1kzNiljZiBDZ5MmYxIjM1MzYhdDMykTYiwiIyUTMwUjMjFDO4UTY3kDO3UTNwkjMmF2MmBTOihzN3YTYjVjNmN2NiJiOiQTZmRWZlZzNkVDOhFGO1EDMmVWNhNjY1YmZ2IzM3E2Nis3W | unknown | — | — | unknown |
3340 | WmiPrvSE.exe | GET | 200 | 87.248.204.0:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?70940763ac88b67c | unknown | — | 61.6 Kb | unknown |
3340 | WmiPrvSE.exe | GET | 200 | 5.23.50.27:80 | http://ck49537.tw1.ru/_Defaultwindows.php?8DVR5L5G=KvKTL1CVjRO&66cd395ea123f2517b8bc06f2243f1e8=wM0czY3E2MykzY5gTZ2kTYzIWOwYjN5IjZ3MjNwUTYwMTMhJjN0YWM3kDN4MDO3UTNyYjMzgDN&22436102822f47cceec98cb7e344a958=gMxY2NhJGM3UmMkVDM2cTYjBjM4IWYwUzYlRWM0MTOhFjM1Q2MzYGZ&b372a6f035cbd714e3fd15e2900d9019=0VfiIiOiYTN2MWM2M2NzQjNiFzY2YTOzMWYllTYjhzN4ImNjNmNiwiI5UmNiV2NwImMxcTMjBjNwcDNmJmMzAzM0ImMyYzMzIzN3MzY2EzMhJiOigTMykTZhRjM1kzNiljZiBDZ5MmYxIjM1MzYhdDMykTYiwiIyUTMwUjMjFDO4UTY3kDO3UTNwkjMmF2MmBTOihzN3YTYjVjNmN2NiJiOiQTZmRWZlZzNkVDOhFGO1EDMmVWNhNjY1YmZ2IzM3E2Nis3W | unknown | — | 364 b | unknown |
3340 | WmiPrvSE.exe | GET | 200 | 5.23.50.27:80 | http://ck49537.tw1.ru/_Defaultwindows.php?8DVR5L5G=KvKTL1CVjRO&66cd395ea123f2517b8bc06f2243f1e8=wM0czY3E2MykzY5gTZ2kTYzIWOwYjN5IjZ3MjNwUTYwMTMhJjN0YWM3kDN4MDO3UTNyYjMzgDN&22436102822f47cceec98cb7e344a958=gMxY2NhJGM3UmMkVDM2cTYjBjM4IWYwUzYlRWM0MTOhFjM1Q2MzYGZ&b372a6f035cbd714e3fd15e2900d9019=0VfiIiOiYTN2MWM2M2NzQjNiFzY2YTOzMWYllTYjhzN4ImNjNmNiwiI5UmNiV2NwImMxcTMjBjNwcDNmJmMzAzM0ImMyYzMzIzN3MzY2EzMhJiOigTMykTZhRjM1kzNiljZiBDZ5MmYxIjM1MzYhdDMykTYiwiIyUTMwUjMjFDO4UTY3kDO3UTNwkjMmF2MmBTOihzN3YTYjVjNmN2NiJiOiQTZmRWZlZzNkVDOhFGO1EDMmVWNhNjY1YmZ2IzM3E2Nis3W | unknown | — | — | unknown |
3340 | WmiPrvSE.exe | GET | 200 | 5.23.50.27:80 | http://ck49537.tw1.ru/_Defaultwindows.php?8DVR5L5G=KvKTL1CVjRO&66cd395ea123f2517b8bc06f2243f1e8=wM0czY3E2MykzY5gTZ2kTYzIWOwYjN5IjZ3MjNwUTYwMTMhJjN0YWM3kDN4MDO3UTNyYjMzgDN&22436102822f47cceec98cb7e344a958=gMxY2NhJGM3UmMkVDM2cTYjBjM4IWYwUzYlRWM0MTOhFjM1Q2MzYGZ&7a77a334905f019e301044d82003a3d5=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 | unknown | — | — | unknown |
3340 | WmiPrvSE.exe | GET | 200 | 5.23.50.27:80 | http://ck49537.tw1.ru/_Defaultwindows.php?8DVR5L5G=KvKTL1CVjRO&66cd395ea123f2517b8bc06f2243f1e8=wM0czY3E2MykzY5gTZ2kTYzIWOwYjN5IjZ3MjNwUTYwMTMhJjN0YWM3kDN4MDO3UTNyYjMzgDN&22436102822f47cceec98cb7e344a958=gMxY2NhJGM3UmMkVDM2cTYjBjM4IWYwUzYlRWM0MTOhFjM1Q2MzYGZ&b372a6f035cbd714e3fd15e2900d9019=QX9JSUNJiOiYTN2MWM2M2NzQjNiFzY2YTOzMWYllTYjhzN4ImNjNmNiwiI5AzNmJWN2cTNmRzNlJTNkR2M5MjY3gzMhZ2MwgzYidjNhVWY2gTZ0IiOigTMykTZhRjM1kzNiljZiBDZ5MmYxIjM1MzYhdDMykTYiwiIyUTMwUjMjFDO4UTY3kDO3UTNwkjMmF2MmBTOihzN3YTYjVjNmN2NiJiOiQTZmRWZlZzNkVDOhFGO1EDMmVWNhNjY1YmZ2IzM3E2Nis3W | unknown | — | — | unknown |
3340 | WmiPrvSE.exe | POST | 200 | 5.23.50.27:80 | http://ck49537.tw1.ru/_Defaultwindows.php?8DVR5L5G=KvKTL1CVjRO&66cd395ea123f2517b8bc06f2243f1e8=wM0czY3E2MykzY5gTZ2kTYzIWOwYjN5IjZ3MjNwUTYwMTMhJjN0YWM3kDN4MDO3UTNyYjMzgDN&22436102822f47cceec98cb7e344a958=gMxY2NhJGM3UmMkVDM2cTYjBjM4IWYwUzYlRWM0MTOhFjM1Q2MzYGZ | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | unknown |
4 | System | 192.168.100.255:137 | — | — | — | unknown |
2588 | svchost.exe | 239.255.255.250:1900 | — | — | — | unknown |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
3340 | WmiPrvSE.exe | 5.23.50.27:80 | ck49537.tw1.ru | TimeWeb Ltd. | RU | unknown |
3340 | WmiPrvSE.exe | 34.117.59.81:443 | ipinfo.io | GOOGLE-CLOUD-PLATFORM | US | whitelisted |
3340 | WmiPrvSE.exe | 87.248.204.0:80 | ctldl.windowsupdate.com | LLNW | US | unknown |
Domain | IP | Reputation |
|---|---|---|
ck49537.tw1.ru |
| unknown |
ipinfo.io |
| shared |
ctldl.windowsupdate.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
3340 | WmiPrvSE.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
3340 | WmiPrvSE.exe | Device Retrieving External IP Address Detected | ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) |
3340 | WmiPrvSE.exe | Device Retrieving External IP Address Detected | ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io) |
3340 | WmiPrvSE.exe | A Network Trojan was detected | ET HUNTING Observed Malicious Filename in Outbound POST Request (Information.txt) |