| File name: | wow.exe |
| Full analysis: | https://app.any.run/tasks/f45444e9-0cde-429f-bcf2-355bcbc0ba9e |
| Verdict: | Malicious activity |
| Threats: | DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common. |
| Analysis date: | December 17, 2024, 20:17:17 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (console) x86-64, for MS Windows, 6 sections |
| MD5: | B2C17E4AAA1AB07E2BE2C6E08120C7FE |
| SHA1: | 67EB0FBAFB9D75D7E95DC8429C09A99E73ED5C74 |
| SHA256: | D6427E58DFA1A8BFB69F510D4C3806C36CBB7FCFAC82984CAFCD2FF539631F0D |
| SSDEEP: | 196608:+7C92OaZ2NtTeRi/BqyndOugBe0vGEmop:lnNtKRi5qEOfCw |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2024:12:17 20:15:46+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.41 |
| CodeSize: | 176640 |
| InitializedDataSize: | 152576 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xc380 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 420 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass "C:\Users\admin\Downloads\haus\ldr.ps1" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | wow.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 420 | cmd.exe /c "netstat -ano | findstr TCP" | C:\Windows\System32\cmd.exe | — | 3iog62.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 444 | cmd.exe /c "netstat -ano | findstr TCP" | C:\Windows\System32\cmd.exe | — | 3iog62.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1140 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | 3iog62.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1476 | sc stop npf | C:\Windows\System32\sc.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Service Control Manager Configuration Tool Exit code: 1060 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1520 | netstat -ano | C:\Windows\System32\NETSTAT.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Netstat Command Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1596 | findstr TCP | C:\Windows\System32\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1760 | C:\Users\admin\AppData\Local\Temp\td30hh\ksoftriqd.exe | C:\Users\admin\AppData\Local\Temp\td30hh\ksoftriqd.exe | cmd.exe | ||||||||||||
User: admin Company: www.xmrig.com Integrity Level: MEDIUM Description: XMRig miner Exit code: 0 Version: 6.21.1 Modules
| |||||||||||||||
| 1944 | findstr TCP | C:\Windows\System32\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2088 | "C:\WINDOWS\system32\netsh.exe" advfirewall set allprofiles state off | C:\Windows\System32\netsh.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6700) GameBar.exe | Key: | \REGISTRY\A\{42ee1597-018a-576c-a6e2-8d7ecb5bad48}\LocalState |
| Operation: | write | Name: | InstalledVersionMajor |
Value: 02005C5CAFB1C050DB01 | |||
| (PID) Process: | (6700) GameBar.exe | Key: | \REGISTRY\A\{42ee1597-018a-576c-a6e2-8d7ecb5bad48}\LocalState |
| Operation: | write | Name: | InstalledVersionMinor |
Value: 22005C5CAFB1C050DB01 | |||
| (PID) Process: | (6700) GameBar.exe | Key: | \REGISTRY\A\{42ee1597-018a-576c-a6e2-8d7ecb5bad48}\LocalState |
| Operation: | write | Name: | InstalledVersionBuild |
Value: 616D5C5CAFB1C050DB01 | |||
| (PID) Process: | (6700) GameBar.exe | Key: | \REGISTRY\A\{42ee1597-018a-576c-a6e2-8d7ecb5bad48}\LocalState |
| Operation: | write | Name: | InstalledVersionRevision |
Value: 00005C5CAFB1C050DB01 | |||
| (PID) Process: | (6700) GameBar.exe | Key: | \REGISTRY\A\{42ee1597-018a-576c-a6e2-8d7ecb5bad48}\LocalState |
| Operation: | write | Name: | PreviousAppTerminationFromSuspended |
Value: 005C5CAFB1C050DB01 | |||
| (PID) Process: | (6700) GameBar.exe | Key: | \REGISTRY\A\{42ee1597-018a-576c-a6e2-8d7ecb5bad48}\LocalState |
| Operation: | write | Name: | CurrentDisplayMonitor |
Value: 670061006D0065000000DABFB1B1C050DB01 | |||
| (PID) Process: | (6700) GameBar.exe | Key: | \REGISTRY\A\{42ee1597-018a-576c-a6e2-8d7ecb5bad48}\LocalState |
| Operation: | write | Name: | StartupTipIndex |
Value: 010000000000000085EDB8B1C050DB01 | |||
| (PID) Process: | (6868) wow.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids |
| Operation: | write | Name: | Microsoft.PowerShellConsole.1 |
Value: | |||
| (PID) Process: | (3524) reg.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Run |
Value: C:\Users\admin\AppData\Roaming\3iog62.exe | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6468 | wow.exe | C:\Users\admin\AppData\Local\Temp\_MEI64682\VCRUNTIME140.dll | executable | |
MD5:F12681A472B9DD04A812E16096514974 | SHA256:D66C3B47091CEB3F8D3CC165A43D285AE919211A0C0FCB74491EE574D8D464F8 | |||
| 6468 | wow.exe | C:\Users\admin\AppData\Local\Temp\_MEI64682\VCRUNTIME140_1.dll | executable | |
MD5:75E78E4BF561031D39F86143753400FF | SHA256:1758085A61527B427C4380F0C976D29A8BEE889F2AC480C356A3F166433BF70E | |||
| 6468 | wow.exe | C:\Users\admin\AppData\Local\Temp\_MEI64682\_asyncio.pyd | executable | |
MD5:2859C39887921DAD2FF41FEDA44FE174 | SHA256:AEBC378DB08617EA81A0A3A3BC044BCC7E6303E314630392DD51BAB12F879BD9 | |||
| 6468 | wow.exe | C:\Users\admin\AppData\Local\Temp\_MEI64682\_cffi_backend.cp311-win_amd64.pyd | executable | |
MD5:739D352BD982ED3957D376A9237C9248 | SHA256:9AEE90CF7980C8FF694BB3FFE06C71F87EB6A613033F73E3174A732648D39980 | |||
| 6468 | wow.exe | C:\Users\admin\AppData\Local\Temp\_MEI64682\_decimal.pyd | executable | |
MD5:D47E6ACF09EAD5774D5B471AB3AB96FF | SHA256:D0DF57988A74ACD50B2D261E8B5F2C25DA7B940EC2AAFBEE444C277552421E6E | |||
| 6468 | wow.exe | C:\Users\admin\AppData\Local\Temp\_MEI64682\_bz2.pyd | executable | |
MD5:4101128E19134A4733028CFAAFC2F3BB | SHA256:5843872D5E2B08F138A71FE9BA94813AFEE59C8B48166D4A8EB0F606107A7E80 | |||
| 6468 | wow.exe | C:\Users\admin\AppData\Local\Temp\_MEI64682\_uuid.pyd | executable | |
MD5:9A4957BDC2A783ED4BA681CBA2C99C5C | SHA256:F7F57807C15C21C5AA9818EDF3993D0B94AEF8AF5808E1AD86A98637FC499D44 | |||
| 6468 | wow.exe | C:\Users\admin\AppData\Local\Temp\_MEI64682\_queue.pyd | executable | |
MD5:FF8300999335C939FCCE94F2E7F039C0 | SHA256:2F71046891BA279B00B70EB031FE90B379DBE84559CF49CE5D1297EA6BF47A78 | |||
| 6468 | wow.exe | C:\Users\admin\AppData\Local\Temp\_MEI64682\attrs-24.2.0.dist-info\INSTALLER | text | |
MD5:365C9BFEB7D89244F2CE01C1DE44CB85 | SHA256:CEEBAE7B8927A3227E5303CF5E0F1F7B34BB542AD7250AC03FBCDE36EC2F1508 | |||
| 6468 | wow.exe | C:\Users\admin\AppData\Local\Temp\_MEI64682\_socket.pyd | executable | |
MD5:8140BDC5803A4893509F0E39B67158CE | SHA256:39715EF8D043354F0AB15F62878530A38518FB6192BC48DA6A098498E8D35769 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | GET | 200 | 2.16.241.12:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2736 | svchost.exe | GET | 200 | 2.16.241.12:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2736 | svchost.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6868 | wow.exe | GET | — | 31.41.244.11:80 | http://31.41.244.11/files/6989783370/AwT7h8g.exe | unknown | — | — | unknown |
6868 | wow.exe | GET | — | 193.143.1.180:80 | http://193.143.1.180/download/av.exe | unknown | — | — | unknown |
6868 | wow.exe | GET | — | 104.168.101.23:1234 | http://104.168.101.23:1234/windows/ph.exe | unknown | — | — | unknown |
6868 | wow.exe | GET | — | 104.168.101.23:1234 | http://104.168.101.23:1234/windows/net.exe | unknown | — | — | unknown |
6868 | wow.exe | GET | — | 103.20.102.62:80 | http://103.20.102.62/5511.bat | unknown | — | — | malicious |
6868 | wow.exe | GET | — | 154.90.62.248:80 | http://154.90.62.248/wHk4tMu9XpWA/nj.exe | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4712 | MoUsoCoreWorker.exe | 2.16.241.12:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2736 | svchost.exe | 2.16.241.12:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 88.221.169.152:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
2736 | svchost.exe | 88.221.169.152:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5064 | SearchApp.exe | 2.23.209.130:443 | www.bing.com | Akamai International B.V. | GB | whitelisted |
5064 | SearchApp.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1176 | svchost.exe | 20.190.159.73:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
urlhaus.abuse.ch |
| whitelisted |
github.com |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
2192 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to access raw user content on GitHub |
6868 | wow.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
6868 | wow.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
6868 | wow.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
6868 | wow.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
6868 | wow.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
6868 | wow.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
6868 | wow.exe | A Network Trojan was detected | ET MALWARE Single char EXE direct download likely trojan (multiple families) |
6868 | wow.exe | A Network Trojan was detected | ET MALWARE Single char EXE direct download likely trojan (multiple families) |
6868 | wow.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |