| File name: | loader.exe |
| Full analysis: | https://app.any.run/tasks/a772a2f7-a6b9-4df5-9ab5-f478bbb7eaa8 |
| Verdict: | Malicious activity |
| Threats: | DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common. |
| Analysis date: | May 15, 2025, 15:58:52 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | EB562E873C0D6BA767964D0DE55AC5A9 |
| SHA1: | B0CA748A3046D721EC2DEC8C3DBD0F204E01A165 |
| SHA256: | E8E3CDDCC753E66757C3D6A47B63117F718103F03A039B40A4553849E04B8AEC |
| SSDEEP: | 98304:5RzBxuwM6sx4qZ37UcDIDH8TZVMun8BtY+cnWFUsg5XYYYOGbj9/S3dtiw97Sic7:Wzqlp9EkB4F4 |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:03:03 13:16:04+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.3 |
| CodeSize: | 156160 |
| InitializedDataSize: | 115200 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x14220 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 268 | "C:\Users\admin\AppData\Roaming\reviewintobrokerHost\Msblockreview.exe" | C:\Users\admin\AppData\Roaming\reviewintobrokerHost\Msblockreview.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 5.15.2.0 Modules
| |||||||||||||||
| 764 | schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Downloads\csrss.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1020 | "C:\MSOCache\All Users\{90140000-00A1-0416-0000-0000000FF1CE}-C\conhost.exe" | C:\MSOCache\All Users\{90140000-00A1-0416-0000-0000000FF1CE}-C\conhost.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Version: 5.15.2.0 Modules
DcRat(PID) Process(1020) conhost.exe C2 (1)http://23.227.193.58/trackwordpressdleCentral Options Tag#ARA 09.07 MutexDCR_MUTEX-Xz5X1RvNbk1VXCL5X1Ds savebrowsersdatatosinglefilefalse ignorepartiallyemptydatafalse cookiestrue passwordstrue formstrue cctrue historyfalse telegramtrue steamtrue discordtrue filezillatrue screenshottrue clipboardtrue sysinfotrue searchpath%AppData% - Very Fast Targetru (PID) Process(1020) conhost.exe C2 (1)http://23.227.193.58/trackwordpressdleCentral Options MutexDCR_MUTEX-Xz5X1RvNbk1VXCL5X1Ds Tag#ARA 09.07 Debugfalse ServerConfigReplacementTable 0( 2@ H, i$ k^ j> I. x) l# E% g- Z~ z R! o& v| p_ B< d` =* G; PluginConfigReplacementTable 1, 3| d^ L% l_ V> T* H$ N; p~ U( Y) C< w! B# R. E& m` Q J@ j- GetWebcamsfalse SleepTimeout5 InactivityTimeout2 CacheStorageRegistry AutoRunSmart StealerConfig savebrowsersdatatosinglefilefalse ignorepartiallyemptydatafalse cookiestrue passwordstrue formstrue cctrue historyfalse telegramtrue steamtrue discordtrue filezillatrue screenshottrue clipboardtrue sysinfotrue searchpath%AppData% - Very Fast StealerEnabledtrue StealerOptionsfalse SelfDeletefalse | |||||||||||||||
| 1156 | schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Users\Public\conhost.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1324 | "C:\Users\admin\AppData\Local\Temp\ARA.exe" | C:\Users\admin\AppData\Local\Temp\ARA.exe | rhsgn_protected.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1396 | schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Windows\Temp\Crashpad\attachments\spoolsv.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1400 | schtasks.exe /create /tn "IMEDICTUPDATEI" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0101-0410-0000-0000000FF1CE}-C\IMEDICTUPDATE.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1548 | schtasks.exe /create /tn "SearchProtocolHostS" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Videos\SearchProtocolHost.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1560 | schtasks.exe /create /tn "ctfmonc" /sc MINUTE /mo 14 /tr "'C:\Windows\debug\WIA\ctfmon.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1880 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Roaming\reviewintobrokerHost\aUs3pwix5Vd1U6IYzTsfZ9E8dEV3MF.vbe" | C:\Windows\System32\wscript.exe | — | ARA.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| (PID) Process: | (2848) loader.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2848) loader.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2848) loader.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2848) loader.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2364) rhsgn_protected.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2364) rhsgn_protected.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2364) rhsgn_protected.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2364) rhsgn_protected.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (1324) ARA.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1324) ARA.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2364 | rhsgn_protected.exe | C:\Users\admin\AppData\Local\Temp\DMON.dll | executable | |
MD5:58F7761BE8678A189604E2B61C7D7AEB | SHA256:F759CEF48A4E798BEC5AC8BAF10376E1E024E0A128B4B4A5B45F289EE31207DF | |||
| 2364 | rhsgn_protected.exe | C:\Users\admin\AppData\Local\Temp\eamsi.dll | executable | |
MD5:CCFE48E3AAF6A7ADF5643D90CDE3439C | SHA256:5E1F9CBC0F1CA645183F26E25463679AA89CD22A29D427C000AEA0E1E9C11903 | |||
| 2848 | loader.exe | C:\Users\admin\AppData\Local\Temp\rhsgn_protected.exe | executable | |
MD5:D0DE8273F957E0508F8B5A0897FECCE9 | SHA256:B4144CFD46AD378183A9F1D0136B8465CE80DE44423343891400524CB6CC57EB | |||
| 268 | Msblockreview.exe | C:\MSOCache\All Users\{90140000-00A1-0411-0000-0000000FF1CE}-C\ctfmon.exe | executable | |
MD5:8EBFB00F97E5120227605496DEE1BA2D | SHA256:72AC498F8D99DD2B4C4C4F68A2C709C97DD3F397AC02BE6AD1B5B874450C146E | |||
| 2364 | rhsgn_protected.exe | C:\Users\admin\AppData\Local\Temp\concrt140.dll | executable | |
MD5:119DBAD74C457A2D692CE6765028E88B | SHA256:5F6A435A4A1DA4BBBF8ADB80BD7A81F263FF98D0193AF4ED8E15D39F803DE06E | |||
| 2364 | rhsgn_protected.exe | C:\Users\admin\AppData\Local\Temp\ebehmoni.dll | executable | |
MD5:D9CE7153A878749C59AF90BE5952AEC2 | SHA256:60EF7CDADC1778AA08855810233B6887741A9291F36296F20C024A2B2F44D18A | |||
| 2364 | rhsgn_protected.exe | C:\Users\admin\AppData\Local\Temp\ebehmonl.dll | executable | |
MD5:2686070D4A4B5C7401B7AF185ABD71BF | SHA256:11F686ACA158EF40459B0CF92F117186B63765151BDF4295C268AE5DADCABE2A | |||
| 1324 | ARA.exe | C:\Users\admin\AppData\Roaming\reviewintobrokerHost\WJgXY0RCE6WdWGoPyLk7f.bat | text | |
MD5:62416939CBA1A6B6C67A4D907E563F09 | SHA256:1BC255D6927643C2F628AE5AB09D83694B99992BC70B2289348FCA9C966D97AA | |||
| 2364 | rhsgn_protected.exe | C:\Users\admin\AppData\Local\Temp\cfgres.dll | executable | |
MD5:F4C9CF4A73F3ACD5A4EF1F60F9297145 | SHA256:81B4575928B6D753306848C2F9217BA076D3C0643CB20F378CD883CDB4FDD329 | |||
| 1324 | ARA.exe | C:\Users\admin\AppData\Roaming\reviewintobrokerHost\aUs3pwix5Vd1U6IYzTsfZ9E8dEV3MF.vbe | binary | |
MD5:5050104B6A1222B401DE71F0079FD122 | SHA256:43C7B034403C39D71802A2EFC7558648C229544B3337D4298498A0D503151A46 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | whitelisted |
1020 | conhost.exe | 23.227.193.58:80 | — | HVC-AS | US | unknown |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
dns.msftncsi.com |
| whitelisted |