Analysis
-
max time kernel
4s -
max time network
145s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 20:44
Static task
static1
Behavioral task
behavioral1
Sample
05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe
Resource
win7v20201028
General
-
Target
05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe
-
Size
1.5MB
-
MD5
7850f2d801d0b3098635ac4fb5c13f44
-
SHA1
d3fceea6dbfff15d1b56e0b4f50c2f09d6768d28
-
SHA256
05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb
-
SHA512
5347b22ce57359fac0a7ccee84407403467120e5f2158cc236798617651ea5e3f8bc9c564391de47022f9e96626d89ff172b295a0614c11351926c2c8267de1b
Malware Config
Extracted
darkcomet
Runescape
mrsnickers03.no-ip.biz:340
DC_MUTEX-6ZFK11A
-
gencode
uNwew4gojxtu
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Processes:
resource yara_rule behavioral1/memory/396-35-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/396-39-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/396-40-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1332-95-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1332-100-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1332-102-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
Processes:
05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exedescription pid process target process PID 1096 set thread context of 604 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe svchost.exe PID 1096 set thread context of 396 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe 604 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exesvchost.exe05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exepid process 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe 604 svchost.exe 396 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exedescription pid process target process PID 1096 wrote to memory of 604 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe svchost.exe PID 1096 wrote to memory of 604 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe svchost.exe PID 1096 wrote to memory of 604 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe svchost.exe PID 1096 wrote to memory of 604 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe svchost.exe PID 1096 wrote to memory of 604 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe svchost.exe PID 1096 wrote to memory of 604 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe svchost.exe PID 1096 wrote to memory of 604 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe svchost.exe PID 1096 wrote to memory of 604 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe svchost.exe PID 1096 wrote to memory of 604 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe svchost.exe PID 1096 wrote to memory of 604 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe svchost.exe PID 1096 wrote to memory of 396 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe PID 1096 wrote to memory of 396 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe PID 1096 wrote to memory of 396 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe PID 1096 wrote to memory of 396 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe PID 1096 wrote to memory of 396 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe PID 1096 wrote to memory of 396 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe PID 1096 wrote to memory of 396 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe PID 1096 wrote to memory of 396 1096 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe 05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe"C:\Users\Admin\AppData\Local\Temp\05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:604 -
C:\Users\Admin\AppData\Local\Temp\05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe"C:\Users\Admin\AppData\Local\Temp\05be3efe39ee1452a29d47648ec7babbd522df92abf484ac915915214f18eddb.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:396
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4a26c1166e68b912ffa4551ba79b4094
SHA13214c6801dfdf514b26f634da234ea37c7f31f23
SHA2561db4aa8908126ff2655d283c0e4b70569808218bb10f531faa51b5b1b066f197
SHA512da248390d67e6dc69a47621d26afba561fdf6188a10fe652dc127306271c6be252d16fa41307ceaaf1565709cfabab1e6f8c040e37e4052a47cf325808ba3bbb
-
MD5
4a26c1166e68b912ffa4551ba79b4094
SHA13214c6801dfdf514b26f634da234ea37c7f31f23
SHA2561db4aa8908126ff2655d283c0e4b70569808218bb10f531faa51b5b1b066f197
SHA512da248390d67e6dc69a47621d26afba561fdf6188a10fe652dc127306271c6be252d16fa41307ceaaf1565709cfabab1e6f8c040e37e4052a47cf325808ba3bbb
-
MD5
4a26c1166e68b912ffa4551ba79b4094
SHA13214c6801dfdf514b26f634da234ea37c7f31f23
SHA2561db4aa8908126ff2655d283c0e4b70569808218bb10f531faa51b5b1b066f197
SHA512da248390d67e6dc69a47621d26afba561fdf6188a10fe652dc127306271c6be252d16fa41307ceaaf1565709cfabab1e6f8c040e37e4052a47cf325808ba3bbb
-
MD5
4a26c1166e68b912ffa4551ba79b4094
SHA13214c6801dfdf514b26f634da234ea37c7f31f23
SHA2561db4aa8908126ff2655d283c0e4b70569808218bb10f531faa51b5b1b066f197
SHA512da248390d67e6dc69a47621d26afba561fdf6188a10fe652dc127306271c6be252d16fa41307ceaaf1565709cfabab1e6f8c040e37e4052a47cf325808ba3bbb
-
MD5
4a26c1166e68b912ffa4551ba79b4094
SHA13214c6801dfdf514b26f634da234ea37c7f31f23
SHA2561db4aa8908126ff2655d283c0e4b70569808218bb10f531faa51b5b1b066f197
SHA512da248390d67e6dc69a47621d26afba561fdf6188a10fe652dc127306271c6be252d16fa41307ceaaf1565709cfabab1e6f8c040e37e4052a47cf325808ba3bbb
-
MD5
4a26c1166e68b912ffa4551ba79b4094
SHA13214c6801dfdf514b26f634da234ea37c7f31f23
SHA2561db4aa8908126ff2655d283c0e4b70569808218bb10f531faa51b5b1b066f197
SHA512da248390d67e6dc69a47621d26afba561fdf6188a10fe652dc127306271c6be252d16fa41307ceaaf1565709cfabab1e6f8c040e37e4052a47cf325808ba3bbb
-
MD5
4a26c1166e68b912ffa4551ba79b4094
SHA13214c6801dfdf514b26f634da234ea37c7f31f23
SHA2561db4aa8908126ff2655d283c0e4b70569808218bb10f531faa51b5b1b066f197
SHA512da248390d67e6dc69a47621d26afba561fdf6188a10fe652dc127306271c6be252d16fa41307ceaaf1565709cfabab1e6f8c040e37e4052a47cf325808ba3bbb
-
MD5
4a26c1166e68b912ffa4551ba79b4094
SHA13214c6801dfdf514b26f634da234ea37c7f31f23
SHA2561db4aa8908126ff2655d283c0e4b70569808218bb10f531faa51b5b1b066f197
SHA512da248390d67e6dc69a47621d26afba561fdf6188a10fe652dc127306271c6be252d16fa41307ceaaf1565709cfabab1e6f8c040e37e4052a47cf325808ba3bbb