Resubmissions

13-01-2025 05:26

250113-f42vaaxqbz 10

12-01-2025 20:19

250112-y36e7aznhr 10

Analysis

  • max time kernel
    839s
  • max time network
    899s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2025 05:26

General

  • Target

    Echo test.exe

  • Size

    3.8MB

  • MD5

    a6055484fbf56a8cfe6a8ce1ad5fe91c

  • SHA1

    5e159ecd3265c619dcaae0dbdfaa71fa0533c6f6

  • SHA256

    7a2e63f7601af70c3660110cd7d0967d909b2c5ad2ab3bdf834c85d900fe5c94

  • SHA512

    6f0dc67e4c14b34cc000e3ad1886f4586d02bba55f5ae8f7ae46eb7269f9603b9120ffe7053fc2cfd91ee3f2f6eb250a47e6cad53e73cbe9e637cfc6f9f847f7

  • SSDEEP

    98304:yTApDs2KOw0axITDx00qlvqZpXSfU7dFDSfJtMKSGM:Cp2Kf0ZTDx0z88fUdEIKSGM

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Echo test.exe
    "C:\Users\Admin\AppData\Local\Temp\Echo test.exe" cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\PortServerhostSvc\0u1xIFn5uBTahgPweE61XDW6gni0pA9hGvjOu.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\PortServerhostSvc\deeiCKZkZiO4AO25b.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2448
        • C:\PortServerhostSvc\ChainComponentBroker.exe
          "C:\PortServerhostSvc/ChainComponentBroker.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2780
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qjLH6bgbpf.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1632
            • C:\Windows\system32\chcp.com
              chcp 65001
              6⤵
                PID:3004
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                6⤵
                  PID:2068
                • C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\winlogon.exe
                  "C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\winlogon.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2764

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\PortServerhostSvc\0u1xIFn5uBTahgPweE61XDW6gni0pA9hGvjOu.vbe

        Filesize

        213B

        MD5

        1756f8178d512638ebc8309601aee1da

        SHA1

        b860c43f352f88394555c3e9377114d03265554d

        SHA256

        4b404d99abccf5a372b76f904723e69d2c52746305f51d26c82d4a59842e4aaa

        SHA512

        be69f0e7ce83717de283f44e95ba46c6d192d926060315bd43c393fd5dacf89213fd41e545586c27479f678fa29ad4b4a12823c163e8d555a071488981d6b622

      • C:\PortServerhostSvc\deeiCKZkZiO4AO25b.bat

        Filesize

        88B

        MD5

        c8423ea58aa138504ea50ad34e8dcd74

        SHA1

        f3054ba306c1605084d4c4ac6b213b3130061d85

        SHA256

        a02c0e705931f16ed8c56c6797eab6f0a1f14fbc4237f529244278b3c117feae

        SHA512

        7151a7f841b05c0a1d1f48f176416ee8988508bee65f9253a9973284ab83cfdf2898ade5979bd30e5a80e2fe41cfc849ebdc8fa0b526be9369b50d32ab4d321b

      • C:\Users\Admin\AppData\Local\Temp\qjLH6bgbpf.bat

        Filesize

        237B

        MD5

        e9088a9177d85edfa14355ec33a4b040

        SHA1

        9d8dd78488175541daadf56856232022f6e11036

        SHA256

        d6a01734cd0ed8abab8e856e1a9b1ab4ca7e41f1796322e662023d471539903d

        SHA512

        e5bb8817f160af94dc1f5baef0bb132a4811e27bfcb4de73a7950786b45f23833396d8e3bbf52df4b3517c8b4484bdcf4936f2f68397cba6a7e61d4a58c869f8

      • \PortServerhostSvc\ChainComponentBroker.exe

        Filesize

        3.5MB

        MD5

        748b7d9fafaffefe123f11305dd0383b

        SHA1

        9e94086fce6fc65a72e2f339cb5cffeb3545390c

        SHA256

        8c9eb584cec3f2640cbdb865cdbb38413f63e7d1485d41bde77bc56624b00890

        SHA512

        4ab9d407d0d8f5e8ab6c9f8a802fedbfe5b49eccc590e52495dbb1ee0f948b65c7bc3aefbc94c6a500c22453114a423404e9ce00b74642d8c9314d6c032e9354

      • memory/2764-76-0x0000000000300000-0x000000000068C000-memory.dmp

        Filesize

        3.5MB

      • memory/2780-35-0x0000000002500000-0x0000000002516000-memory.dmp

        Filesize

        88KB

      • memory/2780-39-0x0000000002220000-0x000000000222E000-memory.dmp

        Filesize

        56KB

      • memory/2780-21-0x0000000000A30000-0x0000000000A40000-memory.dmp

        Filesize

        64KB

      • memory/2780-23-0x00000000021E0000-0x00000000021F8000-memory.dmp

        Filesize

        96KB

      • memory/2780-25-0x0000000000A40000-0x0000000000A50000-memory.dmp

        Filesize

        64KB

      • memory/2780-27-0x0000000000A50000-0x0000000000A60000-memory.dmp

        Filesize

        64KB

      • memory/2780-29-0x0000000002200000-0x000000000220E000-memory.dmp

        Filesize

        56KB

      • memory/2780-31-0x0000000002230000-0x0000000002242000-memory.dmp

        Filesize

        72KB

      • memory/2780-33-0x0000000002210000-0x0000000002220000-memory.dmp

        Filesize

        64KB

      • memory/2780-17-0x0000000000A20000-0x0000000000A2E000-memory.dmp

        Filesize

        56KB

      • memory/2780-37-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/2780-19-0x00000000021C0000-0x00000000021DC000-memory.dmp

        Filesize

        112KB

      • memory/2780-41-0x0000000002350000-0x0000000002360000-memory.dmp

        Filesize

        64KB

      • memory/2780-43-0x0000000002360000-0x0000000002370000-memory.dmp

        Filesize

        64KB

      • memory/2780-45-0x000000001B080000-0x000000001B0DA000-memory.dmp

        Filesize

        360KB

      • memory/2780-47-0x0000000002540000-0x000000000254E000-memory.dmp

        Filesize

        56KB

      • memory/2780-49-0x0000000002550000-0x0000000002560000-memory.dmp

        Filesize

        64KB

      • memory/2780-51-0x0000000002560000-0x000000000256E000-memory.dmp

        Filesize

        56KB

      • memory/2780-53-0x0000000002590000-0x00000000025A8000-memory.dmp

        Filesize

        96KB

      • memory/2780-55-0x0000000002570000-0x000000000257C000-memory.dmp

        Filesize

        48KB

      • memory/2780-57-0x000000001B9A0000-0x000000001B9EE000-memory.dmp

        Filesize

        312KB

      • memory/2780-15-0x0000000002190000-0x00000000021B6000-memory.dmp

        Filesize

        152KB

      • memory/2780-13-0x0000000000170000-0x00000000004FC000-memory.dmp

        Filesize

        3.5MB