Analysis
-
max time kernel
151s -
max time network
144s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
15-08-2020 06:59
Static task
static1
Behavioral task
behavioral1
Sample
74556POZ_pdf.exe
Resource
win7v200722
General
-
Target
74556POZ_pdf.exe
-
Size
749KB
-
MD5
8c783ee344384ce8f3282675e961c3c0
-
SHA1
eb699861cb2ec0fdc2fb736c6f4eba93133f2100
-
SHA256
bbc8f1873aefb2518b9675fdda8446a2ba7dc159bab9bfd08b40e19b654ea8bb
-
SHA512
ed6ab8e3d8cc3a6cbbadd944d59f8112d9bb4fba2c73d9d476be4e2a9ab929e4836626e113efb72d184b275ea5c8653494fe6e8834571f0bd89f24b83d913aec
Malware Config
Extracted
darkcomet
Good News
boki.zapto.org:1905
DCMIN_MUTEX-ZAT3FJZ
-
gencode
BrxJcaQU7jzd
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1840-2-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1840-4-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1840-5-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
74556POZ_pdf.exedescription pid process target process PID 1588 set thread context of 1840 1588 74556POZ_pdf.exe 74556POZ_pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
74556POZ_pdf.exepid process 1588 74556POZ_pdf.exe 1588 74556POZ_pdf.exe 1588 74556POZ_pdf.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
74556POZ_pdf.exe74556POZ_pdf.exedescription pid process Token: SeDebugPrivilege 1588 74556POZ_pdf.exe Token: SeIncreaseQuotaPrivilege 1840 74556POZ_pdf.exe Token: SeSecurityPrivilege 1840 74556POZ_pdf.exe Token: SeTakeOwnershipPrivilege 1840 74556POZ_pdf.exe Token: SeLoadDriverPrivilege 1840 74556POZ_pdf.exe Token: SeSystemProfilePrivilege 1840 74556POZ_pdf.exe Token: SeSystemtimePrivilege 1840 74556POZ_pdf.exe Token: SeProfSingleProcessPrivilege 1840 74556POZ_pdf.exe Token: SeIncBasePriorityPrivilege 1840 74556POZ_pdf.exe Token: SeCreatePagefilePrivilege 1840 74556POZ_pdf.exe Token: SeBackupPrivilege 1840 74556POZ_pdf.exe Token: SeRestorePrivilege 1840 74556POZ_pdf.exe Token: SeShutdownPrivilege 1840 74556POZ_pdf.exe Token: SeDebugPrivilege 1840 74556POZ_pdf.exe Token: SeSystemEnvironmentPrivilege 1840 74556POZ_pdf.exe Token: SeChangeNotifyPrivilege 1840 74556POZ_pdf.exe Token: SeRemoteShutdownPrivilege 1840 74556POZ_pdf.exe Token: SeUndockPrivilege 1840 74556POZ_pdf.exe Token: SeManageVolumePrivilege 1840 74556POZ_pdf.exe Token: SeImpersonatePrivilege 1840 74556POZ_pdf.exe Token: SeCreateGlobalPrivilege 1840 74556POZ_pdf.exe Token: 33 1840 74556POZ_pdf.exe Token: 34 1840 74556POZ_pdf.exe Token: 35 1840 74556POZ_pdf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
74556POZ_pdf.exepid process 1840 74556POZ_pdf.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
74556POZ_pdf.exedescription pid process target process PID 1588 wrote to memory of 1856 1588 74556POZ_pdf.exe schtasks.exe PID 1588 wrote to memory of 1856 1588 74556POZ_pdf.exe schtasks.exe PID 1588 wrote to memory of 1856 1588 74556POZ_pdf.exe schtasks.exe PID 1588 wrote to memory of 1856 1588 74556POZ_pdf.exe schtasks.exe PID 1588 wrote to memory of 1908 1588 74556POZ_pdf.exe 74556POZ_pdf.exe PID 1588 wrote to memory of 1908 1588 74556POZ_pdf.exe 74556POZ_pdf.exe PID 1588 wrote to memory of 1908 1588 74556POZ_pdf.exe 74556POZ_pdf.exe PID 1588 wrote to memory of 1908 1588 74556POZ_pdf.exe 74556POZ_pdf.exe PID 1588 wrote to memory of 1736 1588 74556POZ_pdf.exe 74556POZ_pdf.exe PID 1588 wrote to memory of 1736 1588 74556POZ_pdf.exe 74556POZ_pdf.exe PID 1588 wrote to memory of 1736 1588 74556POZ_pdf.exe 74556POZ_pdf.exe PID 1588 wrote to memory of 1736 1588 74556POZ_pdf.exe 74556POZ_pdf.exe PID 1588 wrote to memory of 1840 1588 74556POZ_pdf.exe 74556POZ_pdf.exe PID 1588 wrote to memory of 1840 1588 74556POZ_pdf.exe 74556POZ_pdf.exe PID 1588 wrote to memory of 1840 1588 74556POZ_pdf.exe 74556POZ_pdf.exe PID 1588 wrote to memory of 1840 1588 74556POZ_pdf.exe 74556POZ_pdf.exe PID 1588 wrote to memory of 1840 1588 74556POZ_pdf.exe 74556POZ_pdf.exe PID 1588 wrote to memory of 1840 1588 74556POZ_pdf.exe 74556POZ_pdf.exe PID 1588 wrote to memory of 1840 1588 74556POZ_pdf.exe 74556POZ_pdf.exe PID 1588 wrote to memory of 1840 1588 74556POZ_pdf.exe 74556POZ_pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74556POZ_pdf.exe"C:\Users\Admin\AppData\Local\Temp\74556POZ_pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\igDEjuKnNuUIk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3532.tmp"2⤵
- Creates scheduled task(s)
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\74556POZ_pdf.exe"C:\Users\Admin\AppData\Local\Temp\74556POZ_pdf.exe"2⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\74556POZ_pdf.exe"C:\Users\Admin\AppData\Local\Temp\74556POZ_pdf.exe"2⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\74556POZ_pdf.exe"C:\Users\Admin\AppData\Local\Temp\74556POZ_pdf.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1840
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp3532.tmpMD5
972e63a309fae6b004778ee8d896b768
SHA142e855adc0977d4debe959d48f99acb71d71f66f
SHA256d63bfdfae8b8be990220b702b50f9443a956da501b1d182f6c6bf5264b9372be
SHA512ea2b6e3a3068e5a9a7590066c67e7027f14b9bffd2ec1efb1c9a2607959e56b6c0a7ff65495c9d6a4282731113c7a6907ae6f88dd713d777913ec3029023f31f
-
memory/1840-2-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1840-3-0x00000000004B5000-mapping.dmp
-
memory/1840-4-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1840-5-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1856-0-0x0000000000000000-mapping.dmp