Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10 -
submitted
06-07-2020 06:38
Static task
static1
Behavioral task
behavioral1
Sample
7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe
Resource
win7
General
-
Target
7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe
-
Size
1.5MB
-
MD5
49b156bbea23cd6434d7829ed25b051a
-
SHA1
075007dabafb065909e0d7d1cb4a1ec05724e9ec
-
SHA256
7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2
-
SHA512
19dcbb72d9c3b065587731066bc4ad50968978c1569ae7aad8680722333555926a7977762674ec8d5d98add1c06b6e265b80687528b9689940dfc5c3f4c8460b
Malware Config
Extracted
darkcomet
Runescape
mrsnickers03.no-ip.biz:340
DC_MUTEX-6ZFK11A
-
gencode
uNwew4gojxtu
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 2208 created 3160 2208 WerFault.exe svchost.exe -
Executes dropped EXE 3 IoCs
Processes:
ichader.exeichader.exeichader.exepid process 3356 ichader.exe 3348 ichader.exe 1796 ichader.exe -
Processes:
resource yara_rule behavioral2/memory/3528-6-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3528-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3528-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1796-28-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1796-34-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1796-36-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\java = "C:\\Users\\Admin\\AppData\\Roaming\\IDM\\ichader.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exeichader.exedescription pid process target process PID 732 set thread context of 1888 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe svchost.exe PID 732 set thread context of 3528 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe PID 3356 set thread context of 3160 3356 ichader.exe svchost.exe PID 3356 set thread context of 3348 3356 ichader.exe ichader.exe PID 3356 set thread context of 1796 3356 ichader.exe ichader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3188 3160 WerFault.exe svchost.exe 2208 3160 WerFault.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
ichader.exeichader.exedescription pid process Token: SeIncreaseQuotaPrivilege 1796 ichader.exe Token: SeSecurityPrivilege 1796 ichader.exe Token: SeTakeOwnershipPrivilege 1796 ichader.exe Token: SeLoadDriverPrivilege 1796 ichader.exe Token: SeSystemProfilePrivilege 1796 ichader.exe Token: SeSystemtimePrivilege 1796 ichader.exe Token: SeProfSingleProcessPrivilege 1796 ichader.exe Token: SeIncBasePriorityPrivilege 1796 ichader.exe Token: SeCreatePagefilePrivilege 1796 ichader.exe Token: SeBackupPrivilege 1796 ichader.exe Token: SeRestorePrivilege 1796 ichader.exe Token: SeShutdownPrivilege 1796 ichader.exe Token: SeDebugPrivilege 1796 ichader.exe Token: SeSystemEnvironmentPrivilege 1796 ichader.exe Token: SeChangeNotifyPrivilege 1796 ichader.exe Token: SeRemoteShutdownPrivilege 1796 ichader.exe Token: SeUndockPrivilege 1796 ichader.exe Token: SeManageVolumePrivilege 1796 ichader.exe Token: SeImpersonatePrivilege 1796 ichader.exe Token: SeCreateGlobalPrivilege 1796 ichader.exe Token: 33 1796 ichader.exe Token: 34 1796 ichader.exe Token: 35 1796 ichader.exe Token: 36 1796 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe Token: SeDebugPrivilege 3348 ichader.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exesvchost.exe7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exeichader.exeichader.exeichader.exepid process 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe 1888 svchost.exe 3528 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe 3356 ichader.exe 3348 ichader.exe 1796 ichader.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.execmd.exeichader.exedescription pid process target process PID 732 wrote to memory of 1888 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe svchost.exe PID 732 wrote to memory of 1888 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe svchost.exe PID 732 wrote to memory of 1888 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe svchost.exe PID 732 wrote to memory of 1888 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe svchost.exe PID 732 wrote to memory of 1888 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe svchost.exe PID 732 wrote to memory of 1888 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe svchost.exe PID 732 wrote to memory of 1888 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe svchost.exe PID 732 wrote to memory of 1888 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe svchost.exe PID 732 wrote to memory of 1888 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe svchost.exe PID 732 wrote to memory of 3528 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe PID 732 wrote to memory of 3528 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe PID 732 wrote to memory of 3528 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe PID 732 wrote to memory of 3528 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe PID 732 wrote to memory of 3528 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe PID 732 wrote to memory of 3528 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe PID 732 wrote to memory of 3528 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe PID 732 wrote to memory of 3528 732 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe PID 3528 wrote to memory of 3808 3528 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe cmd.exe PID 3528 wrote to memory of 3808 3528 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe cmd.exe PID 3528 wrote to memory of 3808 3528 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe cmd.exe PID 3808 wrote to memory of 1628 3808 cmd.exe reg.exe PID 3808 wrote to memory of 1628 3808 cmd.exe reg.exe PID 3808 wrote to memory of 1628 3808 cmd.exe reg.exe PID 3528 wrote to memory of 3356 3528 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe ichader.exe PID 3528 wrote to memory of 3356 3528 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe ichader.exe PID 3528 wrote to memory of 3356 3528 7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe ichader.exe PID 3356 wrote to memory of 3160 3356 ichader.exe svchost.exe PID 3356 wrote to memory of 3160 3356 ichader.exe svchost.exe PID 3356 wrote to memory of 3160 3356 ichader.exe svchost.exe PID 3356 wrote to memory of 3160 3356 ichader.exe svchost.exe PID 3356 wrote to memory of 3160 3356 ichader.exe svchost.exe PID 3356 wrote to memory of 3160 3356 ichader.exe svchost.exe PID 3356 wrote to memory of 3160 3356 ichader.exe svchost.exe PID 3356 wrote to memory of 3160 3356 ichader.exe svchost.exe PID 3356 wrote to memory of 3160 3356 ichader.exe svchost.exe PID 3356 wrote to memory of 3348 3356 ichader.exe ichader.exe PID 3356 wrote to memory of 3348 3356 ichader.exe ichader.exe PID 3356 wrote to memory of 3348 3356 ichader.exe ichader.exe PID 3356 wrote to memory of 3348 3356 ichader.exe ichader.exe PID 3356 wrote to memory of 3348 3356 ichader.exe ichader.exe PID 3356 wrote to memory of 3348 3356 ichader.exe ichader.exe PID 3356 wrote to memory of 3348 3356 ichader.exe ichader.exe PID 3356 wrote to memory of 3348 3356 ichader.exe ichader.exe PID 3356 wrote to memory of 1796 3356 ichader.exe ichader.exe PID 3356 wrote to memory of 1796 3356 ichader.exe ichader.exe PID 3356 wrote to memory of 1796 3356 ichader.exe ichader.exe PID 3356 wrote to memory of 1796 3356 ichader.exe ichader.exe PID 3356 wrote to memory of 1796 3356 ichader.exe ichader.exe PID 3356 wrote to memory of 1796 3356 ichader.exe ichader.exe PID 3356 wrote to memory of 1796 3356 ichader.exe ichader.exe PID 3356 wrote to memory of 1796 3356 ichader.exe ichader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe"C:\Users\Admin\AppData\Local\Temp\7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe"C:\Users\Admin\AppData\Local\Temp\7e5ee35cbbe65bf740654be40f4ac3c6c891073b96afb658eb1a42e4736618d2.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VBTXS.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "java" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\IDM\ichader.exe" /f4⤵
- Adds Run key to start application
PID:1628 -
C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:3160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 245⤵
- Program crash
PID:3188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 365⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:2208 -
C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3348 -
C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
92353035f01403e26aa2ff51c3963238
SHA1d13f167c73bfce23a2deab8ce7c4ce9f78759ff4
SHA2562e72a8542f8f809bfb1e4adfb481c7c5e6dc00dda7970c74692ba8d83ea0a870
SHA51274560e33477caae3c7bc13914e4ae3c6911bbcfe257b2833155c236a158db0aca17478beb9d97f648ff1ea566005260f511361771c74203195107f4e82cce7df
-
MD5
3deadfc5801062ac047053b5926ad532
SHA15c288a870ad622e7d1d32a54238533b66957268d
SHA2567c8a4eced281f9c13e916780de459e812e214625bcd5078741e477fc1b13bb80
SHA512b8dce85f7653a7ff320bfc0c08534f28777635e1a3e625e837597aa33c3975fcc03db4323ec99f376dc873e951012be652971b07a3a2fd56f6d16247fddee626
-
MD5
3deadfc5801062ac047053b5926ad532
SHA15c288a870ad622e7d1d32a54238533b66957268d
SHA2567c8a4eced281f9c13e916780de459e812e214625bcd5078741e477fc1b13bb80
SHA512b8dce85f7653a7ff320bfc0c08534f28777635e1a3e625e837597aa33c3975fcc03db4323ec99f376dc873e951012be652971b07a3a2fd56f6d16247fddee626
-
MD5
3deadfc5801062ac047053b5926ad532
SHA15c288a870ad622e7d1d32a54238533b66957268d
SHA2567c8a4eced281f9c13e916780de459e812e214625bcd5078741e477fc1b13bb80
SHA512b8dce85f7653a7ff320bfc0c08534f28777635e1a3e625e837597aa33c3975fcc03db4323ec99f376dc873e951012be652971b07a3a2fd56f6d16247fddee626
-
MD5
3deadfc5801062ac047053b5926ad532
SHA15c288a870ad622e7d1d32a54238533b66957268d
SHA2567c8a4eced281f9c13e916780de459e812e214625bcd5078741e477fc1b13bb80
SHA512b8dce85f7653a7ff320bfc0c08534f28777635e1a3e625e837597aa33c3975fcc03db4323ec99f376dc873e951012be652971b07a3a2fd56f6d16247fddee626