File name:

1 (645)

Full analysis: https://app.any.run/tasks/6c46c2c0-d2b3-4753-b752-93f92e721cdf
Verdict: Malicious activity
Threats:

DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common.

Analysis date: March 25, 2025, 02:02:49
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
rat
dcrat
remote
darkcrystal
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

63FA59F7C83EC1DF2EAC00CC85696830

SHA1:

799E9EA365E4AD95C05D21E275E72438882AD776

SHA256:

F6E8AD2F79264F067063144585DD8840A8AE0768C4F7F68EDCDA045AD3BEE1C6

SSDEEP:

24576:YK3K2JOe2JKJJJKJKi6CDvLgiuaClaXfD9vUha+Q:YK3K2JOe2JKJJJKJKi6CDvLgiuvM9mQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 8016)
      • wscript.exe (PID: 7336)
      • wscript.exe (PID: 7392)
      • wscript.exe (PID: 1672)
      • wscript.exe (PID: 812)
      • wscript.exe (PID: 6872)
      • wscript.exe (PID: 7564)
      • wscript.exe (PID: 7748)
      • wscript.exe (PID: 2420)
      • wscript.exe (PID: 6676)
      • wscript.exe (PID: 6668)
      • wscript.exe (PID: 7460)
      • wscript.exe (PID: 7292)
      • wscript.exe (PID: 2560)
      • wscript.exe (PID: 7476)
      • wscript.exe (PID: 664)
      • wscript.exe (PID: 7616)
      • wscript.exe (PID: 6712)
      • wscript.exe (PID: 672)
      • wscript.exe (PID: 1452)
      • wscript.exe (PID: 1012)
      • wscript.exe (PID: 5156)
      • wscript.exe (PID: 2416)
      • wscript.exe (PID: 632)
    • DARKCRYSTAL has been detected (SURICATA)

      • sihost.exe (PID: 7792)
      • sihost.exe (PID: 5132)
      • sihost.exe (PID: 1616)
      • sihost.exe (PID: 6744)
      • sihost.exe (PID: 7548)
      • sihost.exe (PID: 7700)
      • sihost.exe (PID: 8020)
      • sihost.exe (PID: 3676)
      • sihost.exe (PID: 7348)
      • sihost.exe (PID: 1812)
      • sihost.exe (PID: 2064)
      • sihost.exe (PID: 4188)
    • Deletes a file (SCRIPT)

      • wscript.exe (PID: 8016)
      • wscript.exe (PID: 7392)
      • wscript.exe (PID: 812)
      • wscript.exe (PID: 7748)
      • wscript.exe (PID: 6676)
      • wscript.exe (PID: 7460)
      • wscript.exe (PID: 2560)
      • wscript.exe (PID: 7476)
      • wscript.exe (PID: 6712)
      • wscript.exe (PID: 1452)
      • wscript.exe (PID: 5156)
      • wscript.exe (PID: 632)
  • SUSPICIOUS

    • Likely accesses (executes) a file from the Public directory

      • schtasks.exe (PID: 7272)
      • schtasks.exe (PID: 7308)
      • schtasks.exe (PID: 7292)
      • OpenWith.exe (PID: 7440)
      • OpenWith.exe (PID: 7332)
    • Executed via WMI

      • schtasks.exe (PID: 7244)
      • schtasks.exe (PID: 7328)
      • schtasks.exe (PID: 7308)
      • schtasks.exe (PID: 7292)
      • schtasks.exe (PID: 6516)
      • schtasks.exe (PID: 1168)
      • schtasks.exe (PID: 7272)
      • schtasks.exe (PID: 7224)
      • schtasks.exe (PID: 7172)
      • schtasks.exe (PID: 7360)
      • schtasks.exe (PID: 7400)
      • schtasks.exe (PID: 7344)
      • schtasks.exe (PID: 7420)
      • schtasks.exe (PID: 7500)
      • schtasks.exe (PID: 7436)
      • schtasks.exe (PID: 7468)
      • schtasks.exe (PID: 7484)
      • schtasks.exe (PID: 7548)
      • schtasks.exe (PID: 7532)
      • schtasks.exe (PID: 7564)
      • schtasks.exe (PID: 7204)
      • schtasks.exe (PID: 7596)
      • schtasks.exe (PID: 7632)
      • schtasks.exe (PID: 7616)
    • The process creates files with name similar to system file names

      • 1 (645).exe (PID: 2384)
    • Executable content was dropped or overwritten

      • 1 (645).exe (PID: 2384)
      • sihost.exe (PID: 7792)
    • Starts CMD.EXE for commands execution

      • 1 (645).exe (PID: 2384)
    • Reads the date of Windows installation

      • 1 (645).exe (PID: 2384)
      • sihost.exe (PID: 7792)
      • sihost.exe (PID: 5132)
      • sihost.exe (PID: 1616)
      • sihost.exe (PID: 6744)
      • sihost.exe (PID: 7548)
      • sihost.exe (PID: 7700)
      • sihost.exe (PID: 8020)
      • sihost.exe (PID: 3676)
      • sihost.exe (PID: 7348)
      • sihost.exe (PID: 1812)
      • sihost.exe (PID: 2064)
      • sihost.exe (PID: 4188)
      • sihost.exe (PID: 3300)
    • Executing commands from a ".bat" file

      • 1 (645).exe (PID: 2384)
    • Probably delay the execution using 'w32tm.exe'

      • cmd.exe (PID: 7768)
    • Reads security settings of Internet Explorer

      • 1 (645).exe (PID: 2384)
      • sihost.exe (PID: 7792)
      • sihost.exe (PID: 5132)
      • sihost.exe (PID: 1616)
      • sihost.exe (PID: 6744)
      • sihost.exe (PID: 7548)
      • sihost.exe (PID: 7700)
      • sihost.exe (PID: 8020)
      • sihost.exe (PID: 3676)
      • sihost.exe (PID: 7348)
      • sihost.exe (PID: 1812)
      • sihost.exe (PID: 2064)
      • sihost.exe (PID: 4188)
      • sihost.exe (PID: 3300)
    • The process executes VB scripts

      • sihost.exe (PID: 7792)
      • sihost.exe (PID: 5132)
      • sihost.exe (PID: 1616)
      • sihost.exe (PID: 6744)
      • sihost.exe (PID: 7548)
      • sihost.exe (PID: 7700)
      • sihost.exe (PID: 8020)
      • sihost.exe (PID: 3676)
      • sihost.exe (PID: 7348)
      • sihost.exe (PID: 1812)
      • sihost.exe (PID: 2064)
      • sihost.exe (PID: 4188)
      • sihost.exe (PID: 3300)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 7336)
      • wscript.exe (PID: 8016)
      • wscript.exe (PID: 7392)
      • wscript.exe (PID: 1672)
      • wscript.exe (PID: 812)
      • wscript.exe (PID: 6872)
      • wscript.exe (PID: 7748)
      • wscript.exe (PID: 7564)
      • wscript.exe (PID: 6676)
      • wscript.exe (PID: 2420)
      • wscript.exe (PID: 7460)
      • wscript.exe (PID: 6668)
      • wscript.exe (PID: 2560)
      • wscript.exe (PID: 7292)
      • wscript.exe (PID: 7476)
      • wscript.exe (PID: 664)
      • wscript.exe (PID: 7616)
      • wscript.exe (PID: 6712)
      • wscript.exe (PID: 1452)
      • wscript.exe (PID: 672)
      • wscript.exe (PID: 5156)
      • wscript.exe (PID: 1012)
      • wscript.exe (PID: 632)
      • wscript.exe (PID: 2416)
      • wscript.exe (PID: 8076)
      • wscript.exe (PID: 8160)
    • Uses WMI to retrieve WMI-managed resources (SCRIPT)

      • wscript.exe (PID: 8016)
      • wscript.exe (PID: 7392)
      • wscript.exe (PID: 812)
      • wscript.exe (PID: 7748)
      • wscript.exe (PID: 6676)
      • wscript.exe (PID: 7460)
      • wscript.exe (PID: 2560)
      • wscript.exe (PID: 6712)
      • wscript.exe (PID: 7476)
      • wscript.exe (PID: 1452)
      • wscript.exe (PID: 5156)
      • wscript.exe (PID: 632)
      • wscript.exe (PID: 8160)
    • Connects to the server without a host name

      • sihost.exe (PID: 7792)
      • sihost.exe (PID: 5132)
      • sihost.exe (PID: 1616)
      • sihost.exe (PID: 6744)
      • sihost.exe (PID: 7548)
      • sihost.exe (PID: 7700)
      • sihost.exe (PID: 8020)
      • sihost.exe (PID: 3676)
      • sihost.exe (PID: 7348)
      • sihost.exe (PID: 2064)
      • sihost.exe (PID: 1812)
      • sihost.exe (PID: 4188)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 8016)
      • wscript.exe (PID: 7392)
      • wscript.exe (PID: 812)
      • wscript.exe (PID: 7748)
      • wscript.exe (PID: 6676)
      • wscript.exe (PID: 7460)
      • wscript.exe (PID: 2560)
      • wscript.exe (PID: 7476)
      • wscript.exe (PID: 6712)
      • wscript.exe (PID: 1452)
      • wscript.exe (PID: 5156)
      • wscript.exe (PID: 632)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 8016)
      • wscript.exe (PID: 7392)
      • wscript.exe (PID: 812)
      • wscript.exe (PID: 7748)
      • wscript.exe (PID: 6676)
      • wscript.exe (PID: 7460)
      • wscript.exe (PID: 2560)
      • wscript.exe (PID: 7476)
      • wscript.exe (PID: 6712)
      • wscript.exe (PID: 1452)
      • wscript.exe (PID: 5156)
      • wscript.exe (PID: 632)
  • INFO

    • Failed to create an executable file in Windows directory

      • 1 (645).exe (PID: 2384)
    • The sample compiled with english language support

      • 1 (645).exe (PID: 2384)
    • Reads the computer name

      • 1 (645).exe (PID: 2384)
      • sihost.exe (PID: 7792)
      • sihost.exe (PID: 5132)
      • sihost.exe (PID: 1616)
      • sihost.exe (PID: 6744)
      • sihost.exe (PID: 7548)
      • sihost.exe (PID: 7700)
      • sihost.exe (PID: 8020)
      • sihost.exe (PID: 3676)
      • sihost.exe (PID: 7348)
      • sihost.exe (PID: 1812)
      • sihost.exe (PID: 2064)
      • sihost.exe (PID: 4188)
      • sihost.exe (PID: 3300)
    • Reads the machine GUID from the registry

      • 1 (645).exe (PID: 2384)
      • sihost.exe (PID: 7792)
      • sihost.exe (PID: 5132)
      • sihost.exe (PID: 1616)
      • sihost.exe (PID: 6744)
      • sihost.exe (PID: 7548)
      • sihost.exe (PID: 7700)
      • sihost.exe (PID: 8020)
      • sihost.exe (PID: 7348)
      • sihost.exe (PID: 3676)
      • sihost.exe (PID: 1812)
      • sihost.exe (PID: 2064)
      • sihost.exe (PID: 4188)
      • sihost.exe (PID: 3300)
    • Creates files in the program directory

      • 1 (645).exe (PID: 2384)
    • Reads Environment values

      • 1 (645).exe (PID: 2384)
      • sihost.exe (PID: 7792)
      • sihost.exe (PID: 5132)
      • sihost.exe (PID: 1616)
      • sihost.exe (PID: 6744)
      • sihost.exe (PID: 7548)
      • sihost.exe (PID: 7700)
      • sihost.exe (PID: 8020)
      • sihost.exe (PID: 3676)
      • sihost.exe (PID: 7348)
      • sihost.exe (PID: 1812)
      • sihost.exe (PID: 2064)
      • sihost.exe (PID: 4188)
      • sihost.exe (PID: 3300)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 7264)
      • OpenWith.exe (PID: 7332)
      • OpenWith.exe (PID: 7440)
      • OpenWith.exe (PID: 1628)
      • OpenWith.exe (PID: 5728)
      • OpenWith.exe (PID: 7648)
      • OpenWith.exe (PID: 2236)
      • OpenWith.exe (PID: 516)
      • OpenWith.exe (PID: 7568)
      • sihost.exe (PID: 7792)
      • OpenWith.exe (PID: 2852)
      • sihost.exe (PID: 5132)
      • sihost.exe (PID: 1616)
      • sihost.exe (PID: 6744)
      • sihost.exe (PID: 7548)
      • sihost.exe (PID: 7700)
      • sihost.exe (PID: 8020)
      • sihost.exe (PID: 3676)
      • sihost.exe (PID: 7348)
      • sihost.exe (PID: 1812)
      • sihost.exe (PID: 2064)
      • sihost.exe (PID: 4188)
      • sihost.exe (PID: 3300)
    • Checks supported languages

      • 1 (645).exe (PID: 2384)
      • sihost.exe (PID: 7792)
      • sihost.exe (PID: 5132)
      • sihost.exe (PID: 1616)
      • sihost.exe (PID: 6744)
      • sihost.exe (PID: 7548)
      • sihost.exe (PID: 7700)
      • sihost.exe (PID: 8020)
      • sihost.exe (PID: 3676)
      • sihost.exe (PID: 7348)
      • sihost.exe (PID: 1812)
      • sihost.exe (PID: 2064)
      • sihost.exe (PID: 4188)
      • sihost.exe (PID: 3300)
    • Manual execution by a user

      • OpenWith.exe (PID: 7264)
      • OpenWith.exe (PID: 7332)
      • OpenWith.exe (PID: 7440)
      • OpenWith.exe (PID: 2852)
      • OpenWith.exe (PID: 5728)
      • OpenWith.exe (PID: 7568)
      • OpenWith.exe (PID: 1628)
      • OpenWith.exe (PID: 516)
      • OpenWith.exe (PID: 2236)
      • OpenWith.exe (PID: 7648)
    • Create files in a temporary directory

      • 1 (645).exe (PID: 2384)
      • sihost.exe (PID: 7792)
      • sihost.exe (PID: 5132)
      • sihost.exe (PID: 1616)
      • sihost.exe (PID: 6744)
      • sihost.exe (PID: 7548)
      • sihost.exe (PID: 7700)
      • sihost.exe (PID: 8020)
      • sihost.exe (PID: 3676)
      • sihost.exe (PID: 7348)
      • sihost.exe (PID: 1812)
      • sihost.exe (PID: 2064)
      • sihost.exe (PID: 4188)
      • sihost.exe (PID: 3300)
    • Process checks computer location settings

      • 1 (645).exe (PID: 2384)
      • sihost.exe (PID: 7792)
      • sihost.exe (PID: 5132)
      • sihost.exe (PID: 1616)
      • sihost.exe (PID: 6744)
      • sihost.exe (PID: 7548)
      • sihost.exe (PID: 7700)
      • sihost.exe (PID: 8020)
      • sihost.exe (PID: 3676)
      • sihost.exe (PID: 7348)
      • sihost.exe (PID: 1812)
      • sihost.exe (PID: 2064)
      • sihost.exe (PID: 4188)
      • sihost.exe (PID: 3300)
    • Disables trace logs

      • sihost.exe (PID: 7792)
      • sihost.exe (PID: 5132)
      • sihost.exe (PID: 1616)
      • sihost.exe (PID: 6744)
      • sihost.exe (PID: 7548)
      • sihost.exe (PID: 7700)
      • sihost.exe (PID: 8020)
      • sihost.exe (PID: 3676)
      • sihost.exe (PID: 7348)
      • sihost.exe (PID: 1812)
      • sihost.exe (PID: 2064)
      • sihost.exe (PID: 4188)
    • Checks proxy server information

      • sihost.exe (PID: 7792)
      • sihost.exe (PID: 5132)
      • sihost.exe (PID: 1616)
      • sihost.exe (PID: 6744)
      • sihost.exe (PID: 7548)
      • sihost.exe (PID: 7700)
      • sihost.exe (PID: 8020)
      • sihost.exe (PID: 3676)
      • sihost.exe (PID: 7348)
      • sihost.exe (PID: 1812)
      • sihost.exe (PID: 2064)
      • sihost.exe (PID: 4188)
    • Reads the software policy settings

      • slui.exe (PID: 7908)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (55.8)
.exe | Win64 Executable (generic) (21)
.scr | Windows screen saver (9.9)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:07:24 15:13:08+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 904192
InitializedDataSize: 1536
UninitializedDataSize: -
EntryPoint: 0xdeb9e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 169.854.61.441
ProductVersionNumber: 757.987.69.529
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
ProductName: CJ1F4wlu3Yfeqm
CompanyName: uoOl
InternalName: jXKHZpCgkrqOe.exe
LegalCopyright: H7Zj92Uf
Comments: buJx
OriginalFileName: 75.exe
ProductVersion: 757.987.69.529
FileVersion: 169.854.61.441
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
213
Monitored processes
80
Malicious processes
27
Suspicious processes
14

Behavior graph

Click at the process to see the details
start 1 (645).exe schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs w32tm.exe no specs sppextcomobj.exe no specs slui.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs #DARKCRYSTAL sihost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL sihost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL sihost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL sihost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL sihost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL sihost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL sihost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL sihost.exe wscript.exe no specs wscript.exe no specs slui.exe no specs #DARKCRYSTAL sihost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL sihost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL sihost.exe wscript.exe no specs wscript.exe no specs #DARKCRYSTAL sihost.exe wscript.exe no specs wscript.exe no specs sihost.exe no specs wscript.exe no specs wscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
516"C:\WINDOWS\System32\OpenWith.exe" "C:\Users\admin\Saved Games\fontdrvhost.exe'"C:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
2147943623
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
632"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\fdabf4fc-288d-49eb-85f4-defccd6ac5c3.vbs" C:\Windows\System32\wscript.exesihost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
664"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\a4d93f32-3abb-467e-9f40-84c3b2dea3d0.vbs" C:\Windows\System32\wscript.exesihost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
672"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\ef8a0ddc-4397-4379-9a43-7de35d89bbb2.vbs" C:\Windows\System32\wscript.exesihost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
812"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\8a76be34-f10a-491e-8a84-0fb1b4bae432.vbs" C:\Windows\System32\wscript.exesihost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1012"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\65ddb95e-9e36-4848-ab4c-7121fffdcb1c.vbs" C:\Windows\System32\wscript.exesihost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1168schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Users\admin\Documents\My Videos\TextInputHost.exe'" /rl HIGHEST /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1452"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\6bbaf9c8-6b1f-4f9a-b034-5d3194a35038.vbs" C:\Windows\System32\wscript.exesihost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1616"C:\Users\All Users\sihost.exe"C:\ProgramData\sihost.exe
wscript.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\programdata\sihost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1628"C:\WINDOWS\System32\OpenWith.exe" "C:\Users\admin\Saved Games\uhssvc.exe'"C:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
2147943623
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
41 977
Read events
41 936
Write events
41
Delete events
0

Modification events

(PID) Process:(2384) 1 (645).exeKey:HKEY_CURRENT_USER\SOFTWARE\1503bc9c21f231ae19efa518937e2004c3aa4200
Operation:writeName:728dfd2402fcf49cf9b77cc7c0e105d1deef8c81
Value:
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
(PID) Process:(7792) sihost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
Operation:writeName:VBSFile
Value:
(PID) Process:(7792) sihost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sihost_RASMANCS
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(7792) sihost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sihost_RASMANCS
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(7792) sihost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sihost_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7792) sihost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sihost_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(7792) sihost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sihost_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(7792) sihost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sihost_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(7792) sihost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sihost_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(7792) sihost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sihost_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
Executable files
43
Suspicious files
0
Text files
36
Unknown types
0

Dropped files

PID
Process
Filename
Type
23841 (645).exe
MD5:
SHA256:
23841 (645).exeC:\Users\Public\Downloads\6dd19aba3e2428text
MD5:10A6552C87974C7EDD7132BEA36B9FED
SHA256:496812F15294FD63B78FB4164E2A9E6868EA7A67C6EBCF5DB69610657FC10833
23841 (645).exeC:\Users\admin\Saved Games\5b884080fd4f94text
MD5:FC1843C63C6DE1372512C4E41EB0E715
SHA256:446BF4814579B8994D246AD5DD0ECBB37EA2EE11063679176CD09BA6482C8887
23841 (645).exeC:\Users\admin\Saved Games\fontdrvhost.exeexecutable
MD5:63FA59F7C83EC1DF2EAC00CC85696830
SHA256:F6E8AD2F79264F067063144585DD8840A8AE0768C4F7F68EDCDA045AD3BEE1C6
23841 (645).exeC:\Users\Public\Downloads\ApplicationFrameHost.exeexecutable
MD5:63FA59F7C83EC1DF2EAC00CC85696830
SHA256:F6E8AD2F79264F067063144585DD8840A8AE0768C4F7F68EDCDA045AD3BEE1C6
23841 (645).exeC:\Users\admin\Documents\c5b4cb5e9653cctext
MD5:7196F5927378B17162702D86886BACFE
SHA256:BA13AF02FAFF44B8913F8221402FC4278547020E64ACEB373423E62DA330E514
23841 (645).exeC:\Users\admin\Videos\TextInputHost.exeexecutable
MD5:63FA59F7C83EC1DF2EAC00CC85696830
SHA256:F6E8AD2F79264F067063144585DD8840A8AE0768C4F7F68EDCDA045AD3BEE1C6
23841 (645).exeC:\Users\admin\Videos\22eafd247d37c3text
MD5:69639408422D90607C3E2B169008F1C7
SHA256:71E17881E051F5F0866C8900A1FA5AFD2EB1887549D37F8F7537DD56CB450780
23841 (645).exeC:\Users\admin\Documents\services.exeexecutable
MD5:63FA59F7C83EC1DF2EAC00CC85696830
SHA256:F6E8AD2F79264F067063144585DD8840A8AE0768C4F7F68EDCDA045AD3BEE1C6
23841 (645).exeC:\Users\Default\Saved Games\Memory Compression.exeexecutable
MD5:63FA59F7C83EC1DF2EAC00CC85696830
SHA256:F6E8AD2F79264F067063144585DD8840A8AE0768C4F7F68EDCDA045AD3BEE1C6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
30
TCP/UDP connections
38
DNS requests
16
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7792
sihost.exe
GET
404
178.250.158.26:80
http://178.250.158.26/4downloads4Provider/geoBigload/6/CpuGeomariadb2/Longpoll9/pipe/universal1/4/2http/dumpgame/temporaryTempprotonProton/19protonBetter/Windows/geo/3WpProviderCpu/GeoimageLongpoll/providerimagecpu9/vmLineapiflowertemporary.php?6AlqDLuQGYbBId=gCYL9zkUdBuC08JQaV7uaRdflujR&PwmCbXGZ2=jWpIoTJ3R6IApKsc&28ca204ef45011c24f2d6ad0f9fc2401=7f73ee0588e870007d71044e34f403bc&6887f5e4da6e991132b0dcee6bb6e919=wM1IDOjV2YkR2YlFWOiFmY3kTN5UjNkVmNhNWZ2Q2YxYzM2QjM3ADN&6AlqDLuQGYbBId=gCYL9zkUdBuC08JQaV7uaRdflujR&PwmCbXGZ2=jWpIoTJ3R6IApKsc
unknown
malicious
7692
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
7792
sihost.exe
GET
404
178.250.158.26:80
http://178.250.158.26/4downloads4Provider/geoBigload/6/CpuGeomariadb2/Longpoll9/pipe/universal1/4/2http/dumpgame/temporaryTempprotonProton/19protonBetter/Windows/geo/3WpProviderCpu/GeoimageLongpoll/providerimagecpu9/vmLineapiflowertemporary.php?6AlqDLuQGYbBId=gCYL9zkUdBuC08JQaV7uaRdflujR&PwmCbXGZ2=jWpIoTJ3R6IApKsc&28ca204ef45011c24f2d6ad0f9fc2401=7f73ee0588e870007d71044e34f403bc&6887f5e4da6e991132b0dcee6bb6e919=wM1IDOjV2YkR2YlFWOiFmY3kTN5UjNkVmNhNWZ2Q2YxYzM2QjM3ADN&6AlqDLuQGYbBId=gCYL9zkUdBuC08JQaV7uaRdflujR&PwmCbXGZ2=jWpIoTJ3R6IApKsc
unknown
malicious
7484
SIHClient.exe
GET
200
104.119.109.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5132
sihost.exe
GET
404
178.250.158.26:80
http://178.250.158.26/4downloads4Provider/geoBigload/6/CpuGeomariadb2/Longpoll9/pipe/universal1/4/2http/dumpgame/temporaryTempprotonProton/19protonBetter/Windows/geo/3WpProviderCpu/GeoimageLongpoll/providerimagecpu9/vmLineapiflowertemporary.php?1gP3GpbdZL95SJAlvqQs2NWxirjez=RYxe5x6hd&jHjjptz9kt9rz2DoJcVY=6oJ4k&28ca204ef45011c24f2d6ad0f9fc2401=7f73ee0588e870007d71044e34f403bc&6887f5e4da6e991132b0dcee6bb6e919=wM1IDOjV2YkR2YlFWOiFmY3kTN5UjNkVmNhNWZ2Q2YxYzM2QjM3ADN&1gP3GpbdZL95SJAlvqQs2NWxirjez=RYxe5x6hd&jHjjptz9kt9rz2DoJcVY=6oJ4k
unknown
malicious
5132
sihost.exe
GET
404
178.250.158.26:80
http://178.250.158.26/4downloads4Provider/geoBigload/6/CpuGeomariadb2/Longpoll9/pipe/universal1/4/2http/dumpgame/temporaryTempprotonProton/19protonBetter/Windows/geo/3WpProviderCpu/GeoimageLongpoll/providerimagecpu9/vmLineapiflowertemporary.php?1gP3GpbdZL95SJAlvqQs2NWxirjez=RYxe5x6hd&jHjjptz9kt9rz2DoJcVY=6oJ4k&28ca204ef45011c24f2d6ad0f9fc2401=7f73ee0588e870007d71044e34f403bc&6887f5e4da6e991132b0dcee6bb6e919=wM1IDOjV2YkR2YlFWOiFmY3kTN5UjNkVmNhNWZ2Q2YxYzM2QjM3ADN&1gP3GpbdZL95SJAlvqQs2NWxirjez=RYxe5x6hd&jHjjptz9kt9rz2DoJcVY=6oJ4k
unknown
malicious
7484
SIHClient.exe
GET
200
104.119.109.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.159.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.142
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 20.190.159.128
  • 40.126.31.130
  • 40.126.31.69
  • 40.126.31.1
  • 40.126.31.128
  • 40.126.31.73
  • 20.190.159.4
  • 20.190.159.129
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
www.microsoft.com
  • 104.119.109.218
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

PID
Process
Class
Message
7792
sihost.exe
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
5132
sihost.exe
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
1616
sihost.exe
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
6744
sihost.exe
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
7548
sihost.exe
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
7700
sihost.exe
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
8020
sihost.exe
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
3676
sihost.exe
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
7348
sihost.exe
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
1812
sihost.exe
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
No debug info