Analysis
-
max time kernel
6s -
max time network
128s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 20:44
Static task
static1
Behavioral task
behavioral1
Sample
248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe
Resource
win7v20201028
General
-
Target
248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe
-
Size
1.5MB
-
MD5
368388bd7d8ea845d3e78b9fe35052e2
-
SHA1
7350161b91820035c14c201b4f0f010873537fda
-
SHA256
248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6
-
SHA512
01f21de158447cd7f2bafbcbd32a61bf5491ac2b1dff32e813cd76a3c442f135c3adb34296abb48ad0ef46e81e6f5009aaccbe5c71a1dd0d7cfbf818d8038894
Malware Config
Extracted
darkcomet
Runescape
mrsnickers03.no-ip.biz:340
DC_MUTEX-6ZFK11A
-
gencode
uNwew4gojxtu
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1004-35-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1004-37-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1004-40-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1320-95-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1320-101-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1320-102-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
Processes:
248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exedescription pid process target process PID 1040 set thread context of 1592 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe svchost.exe PID 1040 set thread context of 1004 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exesvchost.exe248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exepid process 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe 1592 svchost.exe 1004 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exedescription pid process target process PID 1040 wrote to memory of 1592 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe svchost.exe PID 1040 wrote to memory of 1592 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe svchost.exe PID 1040 wrote to memory of 1592 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe svchost.exe PID 1040 wrote to memory of 1592 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe svchost.exe PID 1040 wrote to memory of 1592 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe svchost.exe PID 1040 wrote to memory of 1592 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe svchost.exe PID 1040 wrote to memory of 1592 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe svchost.exe PID 1040 wrote to memory of 1592 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe svchost.exe PID 1040 wrote to memory of 1592 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe svchost.exe PID 1040 wrote to memory of 1592 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe svchost.exe PID 1040 wrote to memory of 1004 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe PID 1040 wrote to memory of 1004 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe PID 1040 wrote to memory of 1004 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe PID 1040 wrote to memory of 1004 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe PID 1040 wrote to memory of 1004 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe PID 1040 wrote to memory of 1004 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe PID 1040 wrote to memory of 1004 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe PID 1040 wrote to memory of 1004 1040 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe 248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe"C:\Users\Admin\AppData\Local\Temp\248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe"C:\Users\Admin\AppData\Local\Temp\248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1004
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\NJKVS.batMD5
92353035f01403e26aa2ff51c3963238
SHA1d13f167c73bfce23a2deab8ce7c4ce9f78759ff4
SHA2562e72a8542f8f809bfb1e4adfb481c7c5e6dc00dda7970c74692ba8d83ea0a870
SHA51274560e33477caae3c7bc13914e4ae3c6911bbcfe257b2833155c236a158db0aca17478beb9d97f648ff1ea566005260f511361771c74203195107f4e82cce7df
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
4401da11826e074ce6a9c0d31980505d
SHA1a2ec4827dcff1714ccbd5bd24fc795a5c211145c
SHA256daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4
SHA512562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
4401da11826e074ce6a9c0d31980505d
SHA1a2ec4827dcff1714ccbd5bd24fc795a5c211145c
SHA256daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4
SHA512562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
4401da11826e074ce6a9c0d31980505d
SHA1a2ec4827dcff1714ccbd5bd24fc795a5c211145c
SHA256daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4
SHA512562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
4401da11826e074ce6a9c0d31980505d
SHA1a2ec4827dcff1714ccbd5bd24fc795a5c211145c
SHA256daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4
SHA512562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217
-
\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
4401da11826e074ce6a9c0d31980505d
SHA1a2ec4827dcff1714ccbd5bd24fc795a5c211145c
SHA256daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4
SHA512562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217
-
\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
4401da11826e074ce6a9c0d31980505d
SHA1a2ec4827dcff1714ccbd5bd24fc795a5c211145c
SHA256daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4
SHA512562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217
-
\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
4401da11826e074ce6a9c0d31980505d
SHA1a2ec4827dcff1714ccbd5bd24fc795a5c211145c
SHA256daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4
SHA512562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217
-
\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
4401da11826e074ce6a9c0d31980505d
SHA1a2ec4827dcff1714ccbd5bd24fc795a5c211145c
SHA256daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4
SHA512562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217
-
\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
4401da11826e074ce6a9c0d31980505d
SHA1a2ec4827dcff1714ccbd5bd24fc795a5c211145c
SHA256daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4
SHA512562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217
-
memory/556-43-0x0000000000000000-mapping.dmp
-
memory/624-71-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-76-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-83-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-82-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-81-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-80-0x0000000000668000-0x0000000000669000-memory.dmpFilesize
4KB
-
memory/624-79-0x0000000000668000-0x0000000000669000-memory.dmpFilesize
4KB
-
memory/624-78-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-77-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-75-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-72-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-70-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-69-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-64-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-66-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-65-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-63-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-61-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-62-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-60-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-59-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-58-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-57-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-56-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-55-0x0000000000666000-0x0000000000667000-memory.dmpFilesize
4KB
-
memory/624-51-0x0000000000000000-mapping.dmp
-
memory/676-45-0x0000000000000000-mapping.dmp
-
memory/1004-35-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1004-36-0x00000000004085D0-mapping.dmp
-
memory/1004-37-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1004-40-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1040-2-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-18-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-11-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-13-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-12-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-4-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-9-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-3-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-6-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-7-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-8-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-17-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-29-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-30-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-28-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-10-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-26-0x0000000000278000-0x0000000000279000-memory.dmpFilesize
4KB
-
memory/1040-27-0x0000000000278000-0x0000000000279000-memory.dmpFilesize
4KB
-
memory/1040-16-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-5-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-19-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-23-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-22-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-25-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1040-24-0x0000000000276000-0x0000000000277000-memory.dmpFilesize
4KB
-
memory/1320-95-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1320-97-0x00000000004B5210-mapping.dmp
-
memory/1320-101-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1320-102-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1592-31-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1592-33-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1592-34-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1592-32-0x000000000040B000-mapping.dmp
-
memory/1892-90-0x00000000004085D0-mapping.dmp
-
memory/2008-84-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2008-86-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2008-85-0x000000000040B000-mapping.dmp