| File name: | e71fc1170426b7f5407b292a1b880a1bf5475b7990af6ddf4b82312fc2da6611.exe |
| Full analysis: | https://app.any.run/tasks/7139fae0-91ac-415d-bf13-acd94c5e9415 |
| Verdict: | Malicious activity |
| Threats: | DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common. |
| Analysis date: | April 29, 2025, 23:27:24 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, 7 sections |
| MD5: | 3A59355CF62DD850D29CF00BA7FF478B |
| SHA1: | 1DE6C68B5DA51CC8B681FBFCB5F2E6E7238DD496 |
| SHA256: | E71FC1170426B7F5407B292A1B880A1BF5475B7990AF6DDF4B82312FC2DA6611 |
| SSDEEP: | 98304:mZtMjYz/5iH27yZPnimkvmJ/mcwyWJM8AeeneJmHf5Ey+zlBrSuSvAUz2lTlvGii:5wlzNS |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2025:02:12 14:02:25+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.42 |
| CodeSize: | 307200 |
| InitializedDataSize: | 177152 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x32680 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 456 | findstr /i "echo" "C:\Users\admin\AppData\Local\Temp\catlavan.bat" | C:\Windows\System32\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 660 | chcp 65001 | C:\Windows\System32\chcp.com | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Change CodePage Utility Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 720 | rundll32 | C:\Windows\System32\rundll32.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 728 | findstr /i "echo" "C:\Users\admin\AppData\Local\Temp\catlavan.bat" | C:\Windows\System32\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 744 | powershell.exe -nop -c "Write-Host -NoNewLine $null" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 896 | powershell -Command "Start-Process 'C:\Users\admin\AppData\Local\Temp\Testerka\java.exe' -WindowStyle Hidden" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 960 | ping -n 10 localhost | C:\Windows\System32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: TCP/IP Ping Command Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 960 | doskey CERTREQ=PRINT | C:\Windows\System32\doskey.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Keyboard History Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1072 | findstr /i "echo" "C:\Users\admin\AppData\Local\Temp\catlavan.bat" | C:\Windows\System32\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1184 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (7444) catlavan.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbe\OpenWithProgids |
| Operation: | write | Name: | VBEFile |
Value: | |||
| (PID) Process: | (7152) containerServersvc.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\1dc402f64b1e51e032ef9dbdee21890edcce8666 |
| Operation: | write | Name: | 20e0dbf701859ea4afa485f9d73bada1bcbab9ab |
Value: H4sIAAAAAAAEAIWQQUvDQBCF/0roScEuaQ/FeisFTyLSpHjwicTNJFnc3Qkz2xj/vdF4yM25zPDNm/dgXlbHO+BElgeSL+CBWwU0qBoaaXXzuz4ryUQP3md/o1DrarPZ7zfrfGcsBxOcFVZuElBQJbY79P3CouFLrE2e50Dt5C2fa2ts9zER7zvWtJA/CbdShezeedLsarzdXQPPLtb8qdljCZTVu6eSxlSQDM4SQHF9LqY29p6F5D+zI4fAcWbApW/s4sLFxAWpOo7FYAHLMVUukvykTQ8YZvHrN5gz9rU+AQAA | |||
| (PID) Process: | (7152) containerServersvc.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
| Operation: | write | Name: | C:\WINDOWS\System32\cmd.exe.FriendlyAppName |
Value: Windows Command Processor | |||
| (PID) Process: | (7152) containerServersvc.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
| Operation: | write | Name: | C:\WINDOWS\System32\cmd.exe.ApplicationCompany |
Value: Microsoft Corporation | |||
| (PID) Process: | (7428) upfc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (7428) upfc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (7428) upfc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (7428) upfc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (7428) upfc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (7428) upfc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7408 | cmd.exe | C:\Users\admin\AppData\Local\Temp\kdotYrUehi.bat | text | |
MD5:337065424ED27284C55B80741F912713 | SHA256:4EF6F5F73F87CD552BF0DCEB245365C44996F94EB72AEB2CCEFE440FE055043B | |||
| 7316 | e71fc1170426b7f5407b292a1b880a1bf5475b7990af6ddf4b82312fc2da6611.exe | C:\Users\admin\AppData\Local\Temp\catlavan.bat | text | |
MD5:B5E43005771F8677EA9400695A7F112F | SHA256:5AF32FBF5852F937053AE3CD6D935E92F0EB615437386F3B93E7445384D49240 | |||
| 7444 | catlavan.exe | C:\intoSessionSvc\containerServersvc.exe | executable | |
MD5:20FE97D0B5F64D6136F14DFBD5A7EBBD | SHA256:9C0766859442861A34D4C24343E103773E3B34CA1B4EAF25EE8D2157D4F55F3D | |||
| 7316 | e71fc1170426b7f5407b292a1b880a1bf5475b7990af6ddf4b82312fc2da6611.exe | C:\Users\admin\AppData\Local\Temp\catlavan.exe | executable | |
MD5:B941CEC1A1C25B304D7E6EFB8452264D | SHA256:641D3B5292B32444F764CBD3D410750F6358E3382E19D1B23F549995CD668C10 | |||
| 7444 | catlavan.exe | C:\intoSessionSvc\Ec98vGzxbE1gJl5WDP6J8PyE8.vbe | binary | |
MD5:2DC757361BC53062489A9212C5DD3BD8 | SHA256:1C5A1818FDAE90E9CF504575D0C5236BE8B8A8433326407EA7FD21597B6280AB | |||
| 7408 | cmd.exe | C:\Users\admin\AppData\Local\Temp\kdotmRkZb.bat | text | |
MD5:337065424ED27284C55B80741F912713 | SHA256:4EF6F5F73F87CD552BF0DCEB245365C44996F94EB72AEB2CCEFE440FE055043B | |||
| 7584 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_vwqlez0h.qoj.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7584 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_lubzc235.iw5.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7584 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_e3huxoyg.a02.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7584 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_2nijlpgy.2ov.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.42:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.216.77.42:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
7428 | upfc.exe | POST | 200 | 81.94.155.48:80 | http://81.94.155.48/VideotempSecureDefault/eternal/CentraltempApiVm/ExternalSecureprotectAsyncCdn.php | unknown | — | — | malicious |
— | — | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
7428 | upfc.exe | POST | 200 | 81.94.155.48:80 | http://81.94.155.48/VideotempSecureDefault/eternal/CentraltempApiVm/ExternalSecureprotectAsyncCdn.php | unknown | — | — | malicious |
7428 | upfc.exe | POST | 200 | 81.94.155.48:80 | http://81.94.155.48/VideotempSecureDefault/eternal/CentraltempApiVm/ExternalSecureprotectAsyncCdn.php | unknown | — | — | malicious |
7428 | upfc.exe | POST | 200 | 81.94.155.48:80 | http://81.94.155.48/VideotempSecureDefault/eternal/CentraltempApiVm/ExternalSecureprotectAsyncCdn.php | unknown | — | — | malicious |
7428 | upfc.exe | POST | 200 | 81.94.155.48:80 | http://81.94.155.48/VideotempSecureDefault/eternal/CentraltempApiVm/ExternalSecureprotectAsyncCdn.php | unknown | — | — | malicious |
7428 | upfc.exe | POST | 200 | 81.94.155.48:80 | http://81.94.155.48/VideotempSecureDefault/eternal/CentraltempApiVm/ExternalSecureprotectAsyncCdn.php | unknown | — | — | malicious |
664 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2104 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 23.216.77.42:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.216.77.42:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
— | — | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2112 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
github.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
7428 | upfc.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
7428 | upfc.exe | A Network Trojan was detected | REMOTE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
2196 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to access raw user content on GitHub |
7428 | upfc.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] DarkCrystal Rat Exfiltration (POST) |
7428 | upfc.exe | A Network Trojan was detected | REMOTE [ANY.RUN] DarkCrystal Rat Exfiltration (POST) |
7428 | upfc.exe | A suspicious string was detected | SUSPICIOUS [ANY.RUN] Sending an HTTP request body with a Base64 encoded ZIP file |