Resubmissions

13-01-2025 05:26

250113-f42vaaxqbz 10

12-01-2025 20:19

250112-y36e7aznhr 10

Analysis

  • max time kernel
    899s
  • max time network
    901s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-01-2025 05:26

General

  • Target

    Echo test.exe

  • Size

    3.8MB

  • MD5

    a6055484fbf56a8cfe6a8ce1ad5fe91c

  • SHA1

    5e159ecd3265c619dcaae0dbdfaa71fa0533c6f6

  • SHA256

    7a2e63f7601af70c3660110cd7d0967d909b2c5ad2ab3bdf834c85d900fe5c94

  • SHA512

    6f0dc67e4c14b34cc000e3ad1886f4586d02bba55f5ae8f7ae46eb7269f9603b9120ffe7053fc2cfd91ee3f2f6eb250a47e6cad53e73cbe9e637cfc6f9f847f7

  • SSDEEP

    98304:yTApDs2KOw0axITDx00qlvqZpXSfU7dFDSfJtMKSGM:Cp2Kf0ZTDx0z88fUdEIKSGM

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Echo test.exe
    "C:\Users\Admin\AppData\Local\Temp\Echo test.exe" cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3440
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\PortServerhostSvc\0u1xIFn5uBTahgPweE61XDW6gni0pA9hGvjOu.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3576
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\PortServerhostSvc\deeiCKZkZiO4AO25b.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2080
        • C:\PortServerhostSvc\ChainComponentBroker.exe
          "C:\PortServerhostSvc/ChainComponentBroker.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1488
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1BvsbKsI2N.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2740
            • C:\Windows\system32\chcp.com
              chcp 65001
              6⤵
                PID:4700
              • C:\Windows\system32\PING.EXE
                ping -n 10 localhost
                6⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:2260
              • C:\PortServerhostSvc\csrss.exe
                "C:\PortServerhostSvc\csrss.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                PID:1232

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PortServerhostSvc\0u1xIFn5uBTahgPweE61XDW6gni0pA9hGvjOu.vbe

      Filesize

      213B

      MD5

      1756f8178d512638ebc8309601aee1da

      SHA1

      b860c43f352f88394555c3e9377114d03265554d

      SHA256

      4b404d99abccf5a372b76f904723e69d2c52746305f51d26c82d4a59842e4aaa

      SHA512

      be69f0e7ce83717de283f44e95ba46c6d192d926060315bd43c393fd5dacf89213fd41e545586c27479f678fa29ad4b4a12823c163e8d555a071488981d6b622

    • C:\PortServerhostSvc\ChainComponentBroker.exe

      Filesize

      3.5MB

      MD5

      748b7d9fafaffefe123f11305dd0383b

      SHA1

      9e94086fce6fc65a72e2f339cb5cffeb3545390c

      SHA256

      8c9eb584cec3f2640cbdb865cdbb38413f63e7d1485d41bde77bc56624b00890

      SHA512

      4ab9d407d0d8f5e8ab6c9f8a802fedbfe5b49eccc590e52495dbb1ee0f948b65c7bc3aefbc94c6a500c22453114a423404e9ce00b74642d8c9314d6c032e9354

    • C:\PortServerhostSvc\deeiCKZkZiO4AO25b.bat

      Filesize

      88B

      MD5

      c8423ea58aa138504ea50ad34e8dcd74

      SHA1

      f3054ba306c1605084d4c4ac6b213b3130061d85

      SHA256

      a02c0e705931f16ed8c56c6797eab6f0a1f14fbc4237f529244278b3c117feae

      SHA512

      7151a7f841b05c0a1d1f48f176416ee8988508bee65f9253a9973284ab83cfdf2898ade5979bd30e5a80e2fe41cfc849ebdc8fa0b526be9369b50d32ab4d321b

    • C:\Users\Admin\AppData\Local\Temp\1BvsbKsI2N.bat

      Filesize

      158B

      MD5

      0b975687b8e36fd7823c6b611950137f

      SHA1

      1baf3dd94ea7afe3b7ca4913a78d4b49c5429e6b

      SHA256

      881c7e26116b2cb46553ce5435df360064912f34bae8dbf87be0579c3e34744b

      SHA512

      e435ad73afc88fca370f8d211e4c4f9eaf650b63fb647cd58629e0a5da4ac3250f78722763aba567335a3a1f8393a59a21c03686f9dc059560f54cf90dd35c1c

    • memory/1232-103-0x000000001FD50000-0x000000001FD9E000-memory.dmp

      Filesize

      312KB

    • memory/1488-36-0x000000001CEE0000-0x000000001CEF6000-memory.dmp

      Filesize

      88KB

    • memory/1488-39-0x000000001D450000-0x000000001D978000-memory.dmp

      Filesize

      5.2MB

    • memory/1488-19-0x0000000002F30000-0x0000000002F4C000-memory.dmp

      Filesize

      112KB

    • memory/1488-20-0x000000001CE50000-0x000000001CEA0000-memory.dmp

      Filesize

      320KB

    • memory/1488-22-0x00000000015E0000-0x00000000015F0000-memory.dmp

      Filesize

      64KB

    • memory/1488-24-0x000000001CE20000-0x000000001CE38000-memory.dmp

      Filesize

      96KB

    • memory/1488-26-0x00000000015F0000-0x0000000001600000-memory.dmp

      Filesize

      64KB

    • memory/1488-28-0x0000000002F50000-0x0000000002F60000-memory.dmp

      Filesize

      64KB

    • memory/1488-30-0x000000001CE00000-0x000000001CE0E000-memory.dmp

      Filesize

      56KB

    • memory/1488-32-0x000000001CEC0000-0x000000001CED2000-memory.dmp

      Filesize

      72KB

    • memory/1488-34-0x000000001CE10000-0x000000001CE20000-memory.dmp

      Filesize

      64KB

    • memory/1488-15-0x0000000002F00000-0x0000000002F26000-memory.dmp

      Filesize

      152KB

    • memory/1488-38-0x000000001CF00000-0x000000001CF12000-memory.dmp

      Filesize

      72KB

    • memory/1488-17-0x00000000015D0000-0x00000000015DE000-memory.dmp

      Filesize

      56KB

    • memory/1488-41-0x000000001CE40000-0x000000001CE4E000-memory.dmp

      Filesize

      56KB

    • memory/1488-43-0x000000001CEA0000-0x000000001CEB0000-memory.dmp

      Filesize

      64KB

    • memory/1488-45-0x000000001CEB0000-0x000000001CEC0000-memory.dmp

      Filesize

      64KB

    • memory/1488-47-0x000000001CF80000-0x000000001CFDA000-memory.dmp

      Filesize

      360KB

    • memory/1488-49-0x000000001CF20000-0x000000001CF2E000-memory.dmp

      Filesize

      56KB

    • memory/1488-51-0x000000001CF30000-0x000000001CF40000-memory.dmp

      Filesize

      64KB

    • memory/1488-53-0x000000001CF40000-0x000000001CF4E000-memory.dmp

      Filesize

      56KB

    • memory/1488-55-0x000000001CFE0000-0x000000001CFF8000-memory.dmp

      Filesize

      96KB

    • memory/1488-57-0x000000001CF50000-0x000000001CF5C000-memory.dmp

      Filesize

      48KB

    • memory/1488-59-0x000000001D050000-0x000000001D09E000-memory.dmp

      Filesize

      312KB

    • memory/1488-76-0x000000001D000000-0x000000001D04E000-memory.dmp

      Filesize

      312KB

    • memory/1488-13-0x0000000000930000-0x0000000000CBC000-memory.dmp

      Filesize

      3.5MB

    • memory/1488-12-0x00007FF929573000-0x00007FF929575000-memory.dmp

      Filesize

      8KB