File name:

TrojanKiller.exe

Full analysis: https://app.any.run/tasks/df3d6e18-7d19-43e5-ba30-101b8ef09acd
Verdict: Malicious activity
Threats:

DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common.

Analysis date: September 07, 2024, 11:36:33
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
upx
stealer
crypto-regex
dcrat
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

4C68D05476A56516544013DDA5BF03F3

SHA1:

7A11CD5107465F06D5C859E1A0EBCF91329DBDEE

SHA256:

FEF9D951A360CA0AD0A5724614A86602FDFA6916DD3E53784BC9FFCDE6F23352

SSDEEP:

49152:NKYOvnnn//vlqBS0+Uyjv5lPxrnqi1f/GZlCebwbH2xhJkPw59LjrBgPFfhh+oHy:NmnS+TrntJUcxj8Jj9Ljr2dfhQogWWzf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • tk64.exe (PID: 6836)
    • Actions looks like stealing of personal data

      • tk64.exe (PID: 6836)
    • DCRAT has been detected (YARA)

      • tk64.exe (PID: 6836)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • TrojanKiller.exe (PID: 6188)
      • tk.exe (PID: 3292)
      • tk64.exe (PID: 6836)
    • Drops 7-zip archiver for unpacking

      • TrojanKiller.exe (PID: 6188)
    • Checks Windows Trust Settings

      • TrojanKiller.exe (PID: 6188)
      • tk64.exe (PID: 6836)
    • Executable content was dropped or overwritten

      • TrojanKiller.exe (PID: 6188)
      • tk64.exe (PID: 6836)
    • Process drops legitimate windows executable

      • TrojanKiller.exe (PID: 6188)
    • Creates a software uninstall entry

      • TrojanKiller.exe (PID: 6188)
    • The process verifies whether the antivirus software is installed

      • tk64.exe (PID: 6836)
    • Found regular expressions for crypto-addresses (YARA)

      • tk64.exe (PID: 6836)
    • Connects to unusual port

      • tk64.exe (PID: 6836)
    • Reads the Windows owner or organization settings

      • tk64.exe (PID: 6836)
    • Process requests binary or script from the Internet

      • tk64.exe (PID: 6836)
  • INFO

    • Checks supported languages

      • TrojanKiller.exe (PID: 6188)
      • tk.exe (PID: 3292)
      • tk64.exe (PID: 6836)
    • Creates files or folders in the user directory

      • TrojanKiller.exe (PID: 6188)
      • tk64.exe (PID: 6836)
    • Reads CPU info

      • TrojanKiller.exe (PID: 6188)
      • tk64.exe (PID: 6836)
    • Reads the computer name

      • TrojanKiller.exe (PID: 6188)
      • tk.exe (PID: 3292)
      • tk64.exe (PID: 6836)
    • Reads the software policy settings

      • TrojanKiller.exe (PID: 6188)
      • tk64.exe (PID: 6836)
    • Create files in a temporary directory

      • TrojanKiller.exe (PID: 6188)
    • UPX packer has been detected

      • TrojanKiller.exe (PID: 6188)
    • Reads the machine GUID from the registry

      • TrojanKiller.exe (PID: 6188)
      • tk64.exe (PID: 6836)
    • Checks proxy server information

      • TrojanKiller.exe (PID: 6188)
      • tk64.exe (PID: 6836)
    • Creates files in the program directory

      • TrojanKiller.exe (PID: 6188)
      • tk64.exe (PID: 6836)
    • The process uses the downloaded file

      • TrojanKiller.exe (PID: 6188)
      • tk.exe (PID: 3292)
    • Process checks computer location settings

      • TrojanKiller.exe (PID: 6188)
      • tk.exe (PID: 3292)
      • tk64.exe (PID: 6836)
    • Reads Environment values

      • tk64.exe (PID: 6836)
    • Reads product name

      • tk64.exe (PID: 6836)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (42.1)
.exe | Win32 EXE Yoda's Crypter (41.3)
.exe | Win32 Executable (generic) (7)
.exe | Win16/32 Executable Delphi generic (3.2)
.exe | Generic Win/DOS Executable (3.1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:11:18 14:17:05+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Removable run from swap, Net run from swap, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 1069056
InitializedDataSize: 122880
UninitializedDataSize: 2854912
EntryPoint: 0x3bec90
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 2.1.0.48
ProductVersionNumber: 2.1.0.48
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
ProductName: Gridinsoft Trojan Killer Web Installer
ProductVersion: 2.1.0
CompanyName: Gridinsoft LLC
LegalCopyright: Gridinsoft LLC, 2008
LegalTrademarks: Gridinsoft
InternalName: TrojanKillerInstaller
OriginalFileName: TrojanKillerInstaller.exe
FileVersion: 2.1.0.48
FileDescription: Trojan Killer Web Installer
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT trojankiller.exe tk.exe no specs THREAT tk64.exe trojankiller.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3292"C:\Program Files\Trojan Killer\tk.exe" C:\Program Files\Trojan Killer\tk.exeTrojanKiller.exe
User:
admin
Company:
Gridinsoft LLC
Integrity Level:
HIGH
Description:
Trojan Killer Portable Launcher
Exit code:
0
Version:
2.2.107.2124
Modules
Images
c:\program files\trojan killer\tk.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shell32.dll
6188"C:\Users\admin\AppData\Local\Temp\TrojanKiller.exe" C:\Users\admin\AppData\Local\Temp\TrojanKiller.exe
explorer.exe
User:
admin
Company:
Gridinsoft LLC
Integrity Level:
HIGH
Description:
Trojan Killer Web Installer
Exit code:
0
Version:
2.1.0.48
Modules
Images
c:\users\admin\appdata\local\temp\trojankiller.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6796"C:\Users\admin\AppData\Local\Temp\TrojanKiller.exe" C:\Users\admin\AppData\Local\Temp\TrojanKiller.exeexplorer.exe
User:
admin
Company:
Gridinsoft LLC
Integrity Level:
MEDIUM
Description:
Trojan Killer Web Installer
Exit code:
3221226540
Version:
2.1.0.48
Modules
Images
c:\users\admin\appdata\local\temp\trojankiller.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6836"C:\Program Files\Trojan Killer\tk64.exe" C:\Program Files\Trojan Killer\tk64.exe
tk.exe
User:
admin
Company:
Gridinsoft LLC
Integrity Level:
HIGH
Description:
Trojan Killer Portable (64-bit)
Version:
2.2.107.2124
Modules
Images
c:\program files\trojan killer\tk64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
23 988
Read events
23 974
Write events
14
Delete events
0

Modification events

(PID) Process:(6188) TrojanKiller.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6188) TrojanKiller.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6188) TrojanKiller.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6188) TrojanKiller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GridinSoft Trojan Killer
Operation:writeName:InstallLocation
Value:
C:\Program Files\Trojan Killer
(PID) Process:(6188) TrojanKiller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GridinSoft Trojan Killer
Operation:writeName:DisplayName
Value:
Trojan Killer Portable
(PID) Process:(6188) TrojanKiller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GridinSoft Trojan Killer
Operation:writeName:DisplayIcon
Value:
C:\Program Files\Trojan Killer\tk.exe,2
(PID) Process:(6188) TrojanKiller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GridinSoft Trojan Killer
Operation:writeName:DisplayVersion
Value:
2.2.107
(PID) Process:(6188) TrojanKiller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GridinSoft Trojan Killer
Operation:writeName:UninstallString
Value:
"C:\Program Files\Trojan Killer\tk.exe,2" -uninstall
(PID) Process:(6188) TrojanKiller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GridinSoft Trojan Killer
Operation:writeName:Publisher
Value:
Gridinsoft LLC
(PID) Process:(6188) TrojanKiller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GridinSoft Trojan Killer
Operation:writeName:HelpLink
Value:
https://support-antimalware.com/
Executable files
15
Suspicious files
52
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6188TrojanKiller.exeC:\Program Files\Trojan Killer\libmem32.dllexecutable
MD5:7C3EF122D03AC4B6CEE51142EE94EBE3
SHA256:9B5405266D666587E81B358AD3692BDA747DEBC990B386B46FE9045DF604C526
6188TrojanKiller.exeC:\Program Files\Trojan Killer\libeay86.dllexecutable
MD5:AA03FBC0FF83BFDA7C9AEA7F78FDF2DA
SHA256:F5A7FF7B64E5D09B41EE681E48B9F0382114C57B7BD6134244CDEC4A00416D44
6188TrojanKiller.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\app[1].jsonbinary
MD5:D7960C5E8ACB77E3C885984F7E53C27A
SHA256:9C26B3E86E613CF4AFE9AC3C0171ADE4B471DE9F1F61B418E11AD9480758205D
6188TrojanKiller.exeC:\Program Files\Trojan Killer\tk64.exeexecutable
MD5:E5F035E14AA7311B8832D920CE1A0BC2
SHA256:2E58BCB07BAD71F4DD6542FB59FD5615322E6ACC201D646F31F2240FCFC0CBF9
6188TrojanKiller.exeC:\Users\admin\AppData\Local\Temp\Z6tKVMrN.8V2compressed
MD5:9E7C7236ADA7D68D0A1AD62D1A16347C
SHA256:4C073C17448318A81560E991B3A6B5C3BA8A670F7A601D585F846F9272032158
6188TrojanKiller.exeC:\Users\Public\Desktop\Trojan Killer.lnkbinary
MD5:AFF7BAD02C49C20A310BCE1F65B27FA8
SHA256:3821BEAEBBB0AFBD909F82414E50B72CAE53F07CAA75DD9CF5B64FCD45814381
6188TrojanKiller.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:3DFCA46E00FFA4795C72A41375F159D3
SHA256:DCBA1A505396539BAC40A7253C9F5DCCF06CBB79957E21D56305E1FC3AF5F40E
6188TrojanKiller.exeC:\Program Files\Trojan Killer\Database\upd104.cbinary
MD5:860B821D7856EE90E35AA1E82751EC1E
SHA256:E9B76BC10C6E905FD5E90116A0832F565BBD21D02C04685B409D0241992B5E39
6188TrojanKiller.exeC:\Program Files\Trojan Killer\ssleay86.dllexecutable
MD5:EE82E12FF89F71141251C03DABAF3380
SHA256:1DDAA3332956929ACF0D9CF114A1A5FC2D0A8A4F787D94390ED3B96C251659B2
6188TrojanKiller.exeC:\Program Files\Trojan Killer\tk32.exeexecutable
MD5:62E1E097848E8043D9D9D344B5D67E2E
SHA256:EC049620799019B2996EF5AC9C54003B2E784300B6E448386A83FEB4EDFBFDFB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
28
TCP/UDP connections
52
DNS requests
25
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7132
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1932
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6836
tk64.exe
GET
200
192.237.188.201:80
http://update1.trojan-killer.com/app.json?ver=2.2.107
unknown
unknown
6836
tk64.exe
POST
192.237.188.201:80
http://bind.trojan-killer.com/stats/?p=5&v=2.2.107&a=TrojanKiller%2Eexe
unknown
unknown
7132
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6836
tk64.exe
GET
200
192.237.188.201:80
http://update1.trojan-killer.com/app.json?ver=2.2.107
unknown
unknown
6836
tk64.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl
unknown
whitelisted
6836
tk64.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
6836
tk64.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTjzY2p9Pa8oibmj%2BNSMWsz63kmWgQUuhbZbU2FL3MpdpovdYxqII%2BeyG8CEAxNaXJLlPo8Kko9KQeAPVo%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6232
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6188
TrojanKiller.exe
192.237.188.201:443
update1.trojan-killer.com
RACKSPACE
US
suspicious
3260
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1932
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1932
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
  • 20.73.194.208
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.185.110
whitelisted
update1.trojan-killer.com
  • 192.237.188.201
unknown
client.wns.windows.com
  • 40.113.103.199
whitelisted
login.live.com
  • 40.126.32.74
  • 40.126.32.72
  • 20.190.160.14
  • 40.126.32.138
  • 40.126.32.68
  • 40.126.32.76
  • 20.190.160.22
  • 20.190.160.20
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 40.127.169.103
whitelisted
s1.am.gridinsoft.com
  • 165.227.52.218
unknown
fe3cr.delivery.mp.microsoft.com
  • 20.166.126.56
whitelisted

Threats

PID
Process
Class
Message
6836
tk64.exe
Misc activity
ET POLICY GridinSoft.com Software Version Check
6836
tk64.exe
Misc activity
ET POLICY GridinSoft.com Software Version Check
6836
tk64.exe
Misc activity
ET POLICY GridinSoft.com Software Version Check
No debug info