Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-01-2025 14:08

General

  • Target

    Echotest.exe

  • Size

    3.8MB

  • MD5

    a6055484fbf56a8cfe6a8ce1ad5fe91c

  • SHA1

    5e159ecd3265c619dcaae0dbdfaa71fa0533c6f6

  • SHA256

    7a2e63f7601af70c3660110cd7d0967d909b2c5ad2ab3bdf834c85d900fe5c94

  • SHA512

    6f0dc67e4c14b34cc000e3ad1886f4586d02bba55f5ae8f7ae46eb7269f9603b9120ffe7053fc2cfd91ee3f2f6eb250a47e6cad53e73cbe9e637cfc6f9f847f7

  • SSDEEP

    98304:yTApDs2KOw0axITDx00qlvqZpXSfU7dFDSfJtMKSGM:Cp2Kf0ZTDx0z88fUdEIKSGM

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Echotest.exe
    "C:\Users\Admin\AppData\Local\Temp\Echotest.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:732
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\PortServerhostSvc\0u1xIFn5uBTahgPweE61XDW6gni0pA9hGvjOu.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\PortServerhostSvc\deeiCKZkZiO4AO25b.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1812
        • C:\PortServerhostSvc\ChainComponentBroker.exe
          "C:\PortServerhostSvc/ChainComponentBroker.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4072
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\eRkT6yrmV3.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1560
            • C:\Windows\system32\chcp.com
              chcp 65001
              6⤵
                PID:3848
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                6⤵
                  PID:4204
                • C:\Recovery\WindowsRE\MoUsoCoreWorker.exe
                  "C:\Recovery\WindowsRE\MoUsoCoreWorker.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3168

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\PortServerhostSvc\0u1xIFn5uBTahgPweE61XDW6gni0pA9hGvjOu.vbe

        Filesize

        213B

        MD5

        1756f8178d512638ebc8309601aee1da

        SHA1

        b860c43f352f88394555c3e9377114d03265554d

        SHA256

        4b404d99abccf5a372b76f904723e69d2c52746305f51d26c82d4a59842e4aaa

        SHA512

        be69f0e7ce83717de283f44e95ba46c6d192d926060315bd43c393fd5dacf89213fd41e545586c27479f678fa29ad4b4a12823c163e8d555a071488981d6b622

      • C:\PortServerhostSvc\ChainComponentBroker.exe

        Filesize

        3.5MB

        MD5

        748b7d9fafaffefe123f11305dd0383b

        SHA1

        9e94086fce6fc65a72e2f339cb5cffeb3545390c

        SHA256

        8c9eb584cec3f2640cbdb865cdbb38413f63e7d1485d41bde77bc56624b00890

        SHA512

        4ab9d407d0d8f5e8ab6c9f8a802fedbfe5b49eccc590e52495dbb1ee0f948b65c7bc3aefbc94c6a500c22453114a423404e9ce00b74642d8c9314d6c032e9354

      • C:\PortServerhostSvc\deeiCKZkZiO4AO25b.bat

        Filesize

        88B

        MD5

        c8423ea58aa138504ea50ad34e8dcd74

        SHA1

        f3054ba306c1605084d4c4ac6b213b3130061d85

        SHA256

        a02c0e705931f16ed8c56c6797eab6f0a1f14fbc4237f529244278b3c117feae

        SHA512

        7151a7f841b05c0a1d1f48f176416ee8988508bee65f9253a9973284ab83cfdf2898ade5979bd30e5a80e2fe41cfc849ebdc8fa0b526be9369b50d32ab4d321b

      • C:\Users\Admin\AppData\Local\Temp\eRkT6yrmV3.bat

        Filesize

        217B

        MD5

        5c7de5b01eadd1f0d189974bc04f37fc

        SHA1

        e9d666b911391488dac791f23dae53d43ee5477c

        SHA256

        50d8b99c4a03dfcc05a9e53d0195f646d58edf3ffefe0219822952250affefa5

        SHA512

        feef8bc0500f56088c20bf92e84ad2596f46a402d0f9d3e23d2643a3019a58a1e6794db73ffb5847f82e0994193af3baa9c2169d774bcf8ff46d7636181f11b9

      • memory/3168-102-0x000000001D9C0000-0x000000001DA2B000-memory.dmp

        Filesize

        428KB

      • memory/4072-32-0x000000001B9B0000-0x000000001B9C2000-memory.dmp

        Filesize

        72KB

      • memory/4072-39-0x000000001D510000-0x000000001DA38000-memory.dmp

        Filesize

        5.2MB

      • memory/4072-19-0x000000001B8E0000-0x000000001B8FC000-memory.dmp

        Filesize

        112KB

      • memory/4072-20-0x000000001B960000-0x000000001B9B0000-memory.dmp

        Filesize

        320KB

      • memory/4072-22-0x0000000002F90000-0x0000000002FA0000-memory.dmp

        Filesize

        64KB

      • memory/4072-24-0x000000001B910000-0x000000001B928000-memory.dmp

        Filesize

        96KB

      • memory/4072-26-0x000000001B880000-0x000000001B890000-memory.dmp

        Filesize

        64KB

      • memory/4072-28-0x000000001B890000-0x000000001B8A0000-memory.dmp

        Filesize

        64KB

      • memory/4072-30-0x000000001B8A0000-0x000000001B8AE000-memory.dmp

        Filesize

        56KB

      • memory/4072-15-0x000000001B8B0000-0x000000001B8D6000-memory.dmp

        Filesize

        152KB

      • memory/4072-34-0x000000001B930000-0x000000001B940000-memory.dmp

        Filesize

        64KB

      • memory/4072-36-0x000000001CFA0000-0x000000001CFB6000-memory.dmp

        Filesize

        88KB

      • memory/4072-38-0x000000001CFC0000-0x000000001CFD2000-memory.dmp

        Filesize

        72KB

      • memory/4072-17-0x0000000002E30000-0x0000000002E3E000-memory.dmp

        Filesize

        56KB

      • memory/4072-41-0x000000001B940000-0x000000001B94E000-memory.dmp

        Filesize

        56KB

      • memory/4072-43-0x000000001B950000-0x000000001B960000-memory.dmp

        Filesize

        64KB

      • memory/4072-45-0x000000001B9D0000-0x000000001B9E0000-memory.dmp

        Filesize

        64KB

      • memory/4072-47-0x000000001D040000-0x000000001D09A000-memory.dmp

        Filesize

        360KB

      • memory/4072-49-0x000000001CFE0000-0x000000001CFEE000-memory.dmp

        Filesize

        56KB

      • memory/4072-51-0x000000001CFF0000-0x000000001D000000-memory.dmp

        Filesize

        64KB

      • memory/4072-53-0x000000001D000000-0x000000001D00E000-memory.dmp

        Filesize

        56KB

      • memory/4072-55-0x000000001D2A0000-0x000000001D2B8000-memory.dmp

        Filesize

        96KB

      • memory/4072-57-0x000000001D010000-0x000000001D01C000-memory.dmp

        Filesize

        48KB

      • memory/4072-59-0x000000001D310000-0x000000001D35E000-memory.dmp

        Filesize

        312KB

      • memory/4072-13-0x00000000009E0000-0x0000000000D6C000-memory.dmp

        Filesize

        3.5MB

      • memory/4072-12-0x00007FFBE08D3000-0x00007FFBE08D5000-memory.dmp

        Filesize

        8KB