| File name: | 2025-06-21_fff0f3863aa0e99aef8aa5953715e225_amadey_black-basta_cova_cryptbot_dcrat_elex_luca-stealer |
| Full analysis: | https://app.any.run/tasks/ee233887-0e9d-44f8-8e25-c2fe9aff0c02 |
| Verdict: | Malicious activity |
| Threats: | DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common. |
| Analysis date: | June 21, 2025, 11:00:49 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | FFF0F3863AA0E99AEF8AA5953715E225 |
| SHA1: | 55BFDE85AC714EAACAF944D90EE7433D697D2057 |
| SHA256: | D7BBC4B014FE053FEF80699D454A1380368D15CDEFF2249A34FA93187E471409 |
| SSDEEP: | 98304:Oyi35iWYUCuyzCZesifJe2Ge075zgyOeQDjsDu4Exq9EfU0Z+9XEFllKmizuYaVE:JAV7 |
| .exe | | | Win64 Executable (generic) (64.6) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (15.4) |
| .exe | | | Win32 Executable (generic) (10.5) |
| .exe | | | Generic Win/DOS Executable (4.6) |
| .exe | | | DOS Executable Generic (4.6) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:03:03 13:15:57+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.3 |
| CodeSize: | 203776 |
| InitializedDataSize: | 261632 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1f530 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 684 | schtasks.exe /create /tn "ProviderComponentmonitor" /sc ONLOGON /tr "'C:\Browsersaves\ProviderComponentmonitor.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 760 | schtasks.exe /create /tn "ProviderComponentmonitorP" /sc MINUTE /mo 13 /tr "'C:\Browsersaves\ProviderComponentmonitor.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 888 | "C:\Program Files (x86)\Common Files\Microsoft Shared\ink\en-US\explorer.exe" | C:\Program Files (x86)\Common Files\Microsoft Shared\ink\en-US\explorer.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Version: 1.2.7.1277 Modules
| |||||||||||||||
| 1192 | schtasks.exe /create /tn "uhssvc" /sc ONLOGON /tr "'C:\Browsersaves\uhssvc.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1232 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\wn0dqfdm\wn0dqfdm.cmdline" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | ProviderComponentmonitor.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Visual C# Command Line Compiler Exit code: 0 Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| 1480 | "C:\Browsersaves\ProviderComponentmonitor.exe" | C:\Browsersaves\ProviderComponentmonitor.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.2.7.1277 Modules
| |||||||||||||||
| 1520 | schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\sppsvc.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1560 | schtasks.exe /create /tn "uhssvcu" /sc MINUTE /mo 9 /tr "'C:\Browsersaves\uhssvc.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1712 | schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 5 /tr "'C:\Program Files\WinRAR\OfficeClickToRun.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1752 | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESB2F4.tmp" "c:\Users\admin\AppData\Local\Microsoft\OneDrive\CSC3CAF411ED8C648B49E2C454256387BB0.TMP" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 14.32.31326.0 Modules
| |||||||||||||||
| (PID) Process: | (3864) 2025-06-21_fff0f3863aa0e99aef8aa5953715e225_amadey_black-basta_cova_cryptbot_dcrat_elex_luca-stealer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbe\OpenWithProgids |
| Operation: | write | Name: | VBEFile |
Value: | |||
| (PID) Process: | (3480) ProviderComponentmonitor.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\81f9fb6de51506ee6695c1fc5b001cd3892a014f |
| Operation: | write | Name: | b3b00f75bda9ac2df25e4436d3b73f8e930adfac |
Value: H4sIAAAAAAAEAH2PPW/CQAyG/0rEVCToWKFuEKmdUFGOqkPNEF0cYuXufPJd0vx8XCFQh5Lp9eDn/fhelK8AB+Gz1L54I4cJYG92A7lGD7LCidsMkGJMo33GCRer/5gvCtW2AvhoW7JYOrL9kashPCKKp2nzsgQo2XsO9+RbYGG6WlArUOgBMKw/jcoUHQvKH8+d8E9CSfX4iw9dmi35znx2qKGdsFfdxqhF60wcAAzmIe4xC1l91eqZPKp/PxOo/iM1KLoicsCQdQtlvgKnC6fS3KxdAQAA | |||
| (PID) Process: | (3480) ProviderComponentmonitor.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | sppsvc |
Value: "C:\Program Files\MSBuild\Microsoft\sppsvc.exe" | |||
| (PID) Process: | (3480) ProviderComponentmonitor.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | sppsvc |
Value: "C:\Program Files\MSBuild\Microsoft\sppsvc.exe" | |||
| (PID) Process: | (3480) ProviderComponentmonitor.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon |
| Operation: | write | Name: | Shell |
Value: explorer.exe, "C:\Program Files\MSBuild\Microsoft\sppsvc.exe" | |||
| (PID) Process: | (3480) ProviderComponentmonitor.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | OfficeClickToRun |
Value: "C:\Program Files\WinRAR\OfficeClickToRun.exe" | |||
| (PID) Process: | (3480) ProviderComponentmonitor.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | OfficeClickToRun |
Value: "C:\Program Files\WinRAR\OfficeClickToRun.exe" | |||
| (PID) Process: | (3480) ProviderComponentmonitor.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon |
| Operation: | write | Name: | Shell |
Value: explorer.exe, "C:\Program Files\MSBuild\Microsoft\sppsvc.exe", "C:\Program Files\WinRAR\OfficeClickToRun.exe" | |||
| (PID) Process: | (3480) ProviderComponentmonitor.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | uhssvc |
Value: "C:\Browsersaves\uhssvc.exe" | |||
| (PID) Process: | (3480) ProviderComponentmonitor.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | uhssvc |
Value: "C:\Browsersaves\uhssvc.exe" | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3864 | 2025-06-21_fff0f3863aa0e99aef8aa5953715e225_amadey_black-basta_cova_cryptbot_dcrat_elex_luca-stealer.exe | C:\Browsersaves\CQk5w75aw60qeRwrAsdl5U.vbe | binary | |
MD5:6B35AC526E40ED9809648454057AAD8F | SHA256:C83742921065674FB7FFB69B8E8B97AE3803B51BD071560C4BA75CF46A9F4205 | |||
| 3864 | 2025-06-21_fff0f3863aa0e99aef8aa5953715e225_amadey_black-basta_cova_cryptbot_dcrat_elex_luca-stealer.exe | C:\Browsersaves\tkLmLRbeIpHvINjMM6VJDhEYf8fiblrLdN1wazEV6UU7b.bat | text | |
MD5:9BB851BA4347A138DA387A751E8B3491 | SHA256:C0692AEF1DD2F6F386D47FAA9DC660F55162B98C2C28F200BA47F9F9EE6B5A19 | |||
| 2612 | ProviderComponentmonitor.exe | C:\Users\admin\Desktop\WexOrXYT.log | executable | |
MD5:16B480082780CC1D8C23FB05468F64E7 | SHA256:7A080D8BD178EC02C7F39F7F941479074C450C4FDD8E963C993D2FB5537C7708 | |||
| 2612 | ProviderComponentmonitor.exe | C:\Users\admin\Desktop\YbYWNXnO.log | executable | |
MD5:F4B38D0F95B7E844DD288B441EBC9AAF | SHA256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97 | |||
| 2612 | ProviderComponentmonitor.exe | C:\Users\admin\Desktop\qnAchtIc.log | executable | |
MD5:D8BF2A0481C0A17A634D066A711C12E9 | SHA256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669 | |||
| 2612 | ProviderComponentmonitor.exe | C:\Users\admin\Desktop\VqsGGKdV.log | executable | |
MD5:996BD447A16F0A20F238A611484AFE86 | SHA256:0CB182B9F8BD0804FC3BBA016926199C536BD7491BA577E089271DC1A63B07BE | |||
| 2612 | ProviderComponentmonitor.exe | C:\Users\admin\Desktop\pipBhKTc.log | executable | |
MD5:E9CE850DB4350471A62CC24ACB83E859 | SHA256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A | |||
| 2612 | ProviderComponentmonitor.exe | C:\Users\admin\Desktop\gEgMxRDv.log | executable | |
MD5:51B1964F31C557AE8C2B01EA164ABD9F | SHA256:AF584F142A9A5A79355B212F8D7A2E3793E33FF23D50FDE591FB2F3E49BF308C | |||
| 2612 | ProviderComponentmonitor.exe | C:\Users\admin\Desktop\WWNwNoyN.log | executable | |
MD5:9E910782CA3E88B3F87826609A21A54E | SHA256:3B311986251EE5A303671108AFBAF43E0255C4CAE1C26CC9600BB0C7D22D3864 | |||
| 2612 | ProviderComponentmonitor.exe | C:\Users\admin\Desktop\mxJlawIj.log | executable | |
MD5:5EE7E079F998F80293B3467CE6A5B4AE | SHA256:A3AE7E97703E694C479E3B460F89C16B4A511626E351145532D1A2F3BA051779 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5348 | RUXIMICS.exe | GET | 200 | 23.55.104.172:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 23.55.104.172:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 23.55.104.172:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5348 | RUXIMICS.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 500 | 20.83.72.98:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1268 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5348 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1268 | svchost.exe | 23.55.104.172:80 | crl.microsoft.com | Akamai International B.V. | US | whitelisted |
5348 | RUXIMICS.exe | 23.55.104.172:80 | crl.microsoft.com | Akamai International B.V. | US | whitelisted |
5944 | MoUsoCoreWorker.exe | 23.55.104.172:80 | crl.microsoft.com | Akamai International B.V. | US | whitelisted |
1268 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
5348 | RUXIMICS.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |