Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 14:08
Static task
static1
Behavioral task
behavioral1
Sample
Echotest.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Echotest.exe
Resource
win10v2004-20241007-en
General
-
Target
Echotest.exe
-
Size
3.8MB
-
MD5
a6055484fbf56a8cfe6a8ce1ad5fe91c
-
SHA1
5e159ecd3265c619dcaae0dbdfaa71fa0533c6f6
-
SHA256
7a2e63f7601af70c3660110cd7d0967d909b2c5ad2ab3bdf834c85d900fe5c94
-
SHA512
6f0dc67e4c14b34cc000e3ad1886f4586d02bba55f5ae8f7ae46eb7269f9603b9120ffe7053fc2cfd91ee3f2f6eb250a47e6cad53e73cbe9e637cfc6f9f847f7
-
SSDEEP
98304:yTApDs2KOw0axITDx00qlvqZpXSfU7dFDSfJtMKSGM:Cp2Kf0ZTDx0z88fUdEIKSGM
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Echotest.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ChainComponentBroker.exe -
Executes dropped EXE 2 IoCs
pid Process 4072 ChainComponentBroker.exe 3168 MoUsoCoreWorker.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ShellExperiences\StartMenuExperienceHost.exe ChainComponentBroker.exe File created C:\Windows\ShellExperiences\55b276f4edf653 ChainComponentBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Echotest.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings Echotest.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ChainComponentBroker.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe 4072 ChainComponentBroker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4072 ChainComponentBroker.exe Token: SeDebugPrivilege 3168 MoUsoCoreWorker.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 732 wrote to memory of 2800 732 Echotest.exe 83 PID 732 wrote to memory of 2800 732 Echotest.exe 83 PID 732 wrote to memory of 2800 732 Echotest.exe 83 PID 2800 wrote to memory of 1812 2800 WScript.exe 96 PID 2800 wrote to memory of 1812 2800 WScript.exe 96 PID 2800 wrote to memory of 1812 2800 WScript.exe 96 PID 1812 wrote to memory of 4072 1812 cmd.exe 98 PID 1812 wrote to memory of 4072 1812 cmd.exe 98 PID 4072 wrote to memory of 1560 4072 ChainComponentBroker.exe 99 PID 4072 wrote to memory of 1560 4072 ChainComponentBroker.exe 99 PID 1560 wrote to memory of 3848 1560 cmd.exe 101 PID 1560 wrote to memory of 3848 1560 cmd.exe 101 PID 1560 wrote to memory of 4204 1560 cmd.exe 102 PID 1560 wrote to memory of 4204 1560 cmd.exe 102 PID 1560 wrote to memory of 3168 1560 cmd.exe 104 PID 1560 wrote to memory of 3168 1560 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\Echotest.exe"C:\Users\Admin\AppData\Local\Temp\Echotest.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\PortServerhostSvc\0u1xIFn5uBTahgPweE61XDW6gni0pA9hGvjOu.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\PortServerhostSvc\deeiCKZkZiO4AO25b.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\PortServerhostSvc\ChainComponentBroker.exe"C:\PortServerhostSvc/ChainComponentBroker.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\eRkT6yrmV3.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:3848
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:4204
-
-
C:\Recovery\WindowsRE\MoUsoCoreWorker.exe"C:\Recovery\WindowsRE\MoUsoCoreWorker.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213B
MD51756f8178d512638ebc8309601aee1da
SHA1b860c43f352f88394555c3e9377114d03265554d
SHA2564b404d99abccf5a372b76f904723e69d2c52746305f51d26c82d4a59842e4aaa
SHA512be69f0e7ce83717de283f44e95ba46c6d192d926060315bd43c393fd5dacf89213fd41e545586c27479f678fa29ad4b4a12823c163e8d555a071488981d6b622
-
Filesize
3.5MB
MD5748b7d9fafaffefe123f11305dd0383b
SHA19e94086fce6fc65a72e2f339cb5cffeb3545390c
SHA2568c9eb584cec3f2640cbdb865cdbb38413f63e7d1485d41bde77bc56624b00890
SHA5124ab9d407d0d8f5e8ab6c9f8a802fedbfe5b49eccc590e52495dbb1ee0f948b65c7bc3aefbc94c6a500c22453114a423404e9ce00b74642d8c9314d6c032e9354
-
Filesize
88B
MD5c8423ea58aa138504ea50ad34e8dcd74
SHA1f3054ba306c1605084d4c4ac6b213b3130061d85
SHA256a02c0e705931f16ed8c56c6797eab6f0a1f14fbc4237f529244278b3c117feae
SHA5127151a7f841b05c0a1d1f48f176416ee8988508bee65f9253a9973284ab83cfdf2898ade5979bd30e5a80e2fe41cfc849ebdc8fa0b526be9369b50d32ab4d321b
-
Filesize
217B
MD55c7de5b01eadd1f0d189974bc04f37fc
SHA1e9d666b911391488dac791f23dae53d43ee5477c
SHA25650d8b99c4a03dfcc05a9e53d0195f646d58edf3ffefe0219822952250affefa5
SHA512feef8bc0500f56088c20bf92e84ad2596f46a402d0f9d3e23d2643a3019a58a1e6794db73ffb5847f82e0994193af3baa9c2169d774bcf8ff46d7636181f11b9