| File name: | dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55 |
| Full analysis: | https://app.any.run/tasks/63fdd465-1050-43d7-a413-77bd0d51522e |
| Verdict: | Malicious activity |
| Threats: | DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common. |
| Analysis date: | April 13, 2025, 03:57:58 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
| MD5: | 78C802B7CED01A823BE54EDC23110F64 |
| SHA1: | E00F33883FDD3BA69D2A1BB112FE355972A50082 |
| SHA256: | DD4A987DD3A15DDE96899705CA05061F4C77FB26F681C091D1B1A85D943E6C55 |
| SSDEEP: | 49152:xhWb/uvl+mfOFHfWITcxMXP1zKJ1/0LYT:xcVzF+ITcxMXP1WT0L |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (56.7) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (21.3) |
| .scr | | | Windows screen saver (10.1) |
| .dll | | | Win32 Dynamic Link Library (generic) (5) |
| .exe | | | Win32 Executable (generic) (3.4) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:10:06 20:59:48+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 8 |
| CodeSize: | 1982464 |
| InitializedDataSize: | 1536 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1e5f9e |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 821.390.381.228 |
| ProductVersionNumber: | 410.849.918.488 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Dynamic link library |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| ProductName: | i5utMcfpUgTGwWN1WAguvwF9 |
| CompanyName: | NzlDlnoRuQMmMVUWSnGAgXBKWC0Q7 |
| InternalName: | F0.exe |
| LegalCopyright: | u9B5ydmxn4FACJhU |
| Comments: | tf99Tm |
| OriginalFileName: | okh8STyLWTjWSwvMQPme6.exe |
| ProductVersion: | 410.849.918.488 |
| FileVersion: | 821.390.381.228 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 632 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 864 | schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 14 /tr "'C:\Recovery\Logs\Registry.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 864 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 904 | schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Recovery\Logs\Registry.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1020 | schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Users\Default\audiodg.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1244 | schtasks.exe /create /tn "ctfmon" /sc ONLOGON /tr "'C:\Windows\ShellExperiences\ctfmon.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1244 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1272 | schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Comms\WmiPrvSE.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1276 | schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\csrss.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1676 | "C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\4efd538f-4e69-4ea5-b4b2-fc8c62ac43c3.vbs" | C:\Windows\System32\wscript.exe | — | ApplicationFrameHost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft ® Windows Based Script Host Version: 5.812.10240.16384 Modules
| |||||||||||||||
| (PID) Process: | (7856) dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | EnableLUA |
Value: 0 | |||
| (PID) Process: | (7856) dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | ConsentPromptBehaviorAdmin |
Value: 0 | |||
| (PID) Process: | (7856) dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | PromptOnSecureDesktop |
Value: 0 | |||
| (PID) Process: | (7856) dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value: 23004100430042006C006F00620000000000000000000000010000000000000000000000 | |||
| (PID) Process: | (7856) dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\2889f16de45eafd896db721b7188686d |
| Operation: | write | Name: | 2889f16de45eafd896db721b7188686d |
Value: 2889f16de45eafd896db721b7188686d | |||
| (PID) Process: | (7984) ShellExperienceHost.exe | Key: | \REGISTRY\A\{6b705428-70fb-29ca-28f7-cd97166aa035}\LocalState |
| Operation: | write | Name: | PeekBadges |
Value: 5B005D000000FE0D244528ACDB01 | |||
| (PID) Process: | (7856) dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
| Operation: | write | Name: | C:\WINDOWS\System32\cmd.exe.FriendlyAppName |
Value: Windows Command Processor | |||
| (PID) Process: | (7856) dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
| Operation: | write | Name: | C:\WINDOWS\System32\cmd.exe.ApplicationCompany |
Value: Microsoft Corporation | |||
| (PID) Process: | (8468) ApplicationFrameHost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | EnableLUA |
Value: 0 | |||
| (PID) Process: | (8468) ApplicationFrameHost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | ConsentPromptBehaviorAdmin |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7856 | dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55.exe | C:\Users\admin\3D Objects\7ccfebd9e92364 | text | |
MD5:5C176272525C97738447582A2535BFDC | SHA256:8CA17CD8FD2564CF3375F13E99AE3D4C784107D17A0064F94DB59DC45A454FCD | |||
| 7856 | dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55.exe | C:\Recovery\Logs\Registry.exe | executable | |
MD5:78C802B7CED01A823BE54EDC23110F64 | SHA256:DD4A987DD3A15DDE96899705CA05061F4C77FB26F681C091D1B1A85D943E6C55 | |||
| 7856 | dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55.exe | C:\Windows\ShellExperiences\ctfmon.exe | executable | |
MD5:78C802B7CED01A823BE54EDC23110F64 | SHA256:DD4A987DD3A15DDE96899705CA05061F4C77FB26F681C091D1B1A85D943E6C55 | |||
| 7856 | dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55.exe | C:\Users\Default\audiodg.exe | executable | |
MD5:78C802B7CED01A823BE54EDC23110F64 | SHA256:DD4A987DD3A15DDE96899705CA05061F4C77FB26F681C091D1B1A85D943E6C55 | |||
| 7856 | dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55.exe | C:\Recovery\OEM\ApplicationFrameHost.exe | executable | |
MD5:78C802B7CED01A823BE54EDC23110F64 | SHA256:DD4A987DD3A15DDE96899705CA05061F4C77FB26F681C091D1B1A85D943E6C55 | |||
| 7856 | dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55.exe | C:\Users\admin\3D Objects\UserOOBEBroker.exe | executable | |
MD5:78C802B7CED01A823BE54EDC23110F64 | SHA256:DD4A987DD3A15DDE96899705CA05061F4C77FB26F681C091D1B1A85D943E6C55 | |||
| 7856 | dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55.exe | C:\Recovery\Logs\ee2ad38f3d4382 | text | |
MD5:2D536654C2BB583B2F29EDB8020F54D3 | SHA256:37E6F616DEDFDED94BD1975BDEAC1BEA7B97F9D8E7CAACCE197B9C21A4ED01BB | |||
| 7856 | dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55.exe | C:\Windows\ShellExperiences\26c12092da979c | text | |
MD5:C7C314FF0F39B7697D5883E511ACE3C2 | SHA256:1F1FF6CE61F44ABF443CCEFC54CDF6E91EFE9AFEAB5D4F091B5BD4C9F6BE34A8 | |||
| 7856 | dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55.exe | C:\Windows\INF\TermService\0409\a29f4157103644 | text | |
MD5:F1D55DC03635D15B62C3E8078A5641E0 | SHA256:E2C69CC38813B436543F354B0234F02B56F626A0444D93D92FAD0B6B50E3DB23 | |||
| 7856 | dd4a987dd3a15dde96899705ca05061f4c77fb26f681c091d1b1a85d943e6c55.exe | C:\Recovery\OEM\6dd19aba3e2428 | text | |
MD5:88CC5DC8B85E80E83E1EB0E083027AED | SHA256:6FC59B1958746DD5B8357DDE2DD5509F42292DA3B2C23BBF7CBA5AC5B8D13556 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 304 | 20.12.23.50:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
8284 | SIHClient.exe | GET | 200 | 23.38.73.129:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
8284 | SIHClient.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
8284 | SIHClient.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
8284 | SIHClient.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | whitelisted |
8284 | SIHClient.exe | GET | 200 | 23.38.73.129:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
8284 | SIHClient.exe | GET | 200 | 23.38.73.129:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
8284 | SIHClient.exe | GET | 200 | 23.38.73.129:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 20.3.187.198:443 | https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping | unknown | — | — | — |
8284 | SIHClient.exe | GET | 200 | 23.38.73.129:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
8284 | SIHClient.exe | 20.12.23.50:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
8284 | SIHClient.exe | 23.216.77.6:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
8284 | SIHClient.exe | 23.38.73.129:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
8284 | SIHClient.exe | 20.3.187.198:443 | fe3cr.delivery.mp.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
8468 | ApplicationFrameHost.exe | 46.3.197.86:80 | — | Adman LLC | RU | malicious |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
login.live.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
8468 | ApplicationFrameHost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
8468 | ApplicationFrameHost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
8468 | ApplicationFrameHost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
8468 | ApplicationFrameHost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
3300 | ApplicationFrameHost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
3300 | ApplicationFrameHost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
3300 | ApplicationFrameHost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
3300 | ApplicationFrameHost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
7820 | ApplicationFrameHost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |