Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 20:44
Static task
static1
Behavioral task
behavioral1
Sample
6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe
Resource
win7v20201028
General
-
Target
6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe
-
Size
1.5MB
-
MD5
5e0c56aa4d8ab74ab7c1401c05720f15
-
SHA1
b4f0cfd99d686ce6f724e4328d21edec5f56dd1b
-
SHA256
6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559
-
SHA512
f73bbc8d8cdfd5f8a18f624ea5aee83ce05d6566ad018fd5dd7541202f0d033feb7bf60afcd1f80ea601f2efd0477b1f05feeaa09883f6ce1b3210d5d323e44e
Malware Config
Extracted
darkcomet
Runescape
mrsnickers03.no-ip.biz:340
DC_MUTEX-6ZFK11A
-
gencode
uNwew4gojxtu
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
ichader.exeichader.exeichader.exepid process 4080 ichader.exe 3692 ichader.exe 3972 ichader.exe -
Processes:
resource yara_rule behavioral2/memory/324-4-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/324-6-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/324-7-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3972-30-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3972-36-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3972-37-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\java = "C:\\Users\\Admin\\AppData\\Roaming\\IDM\\ichader.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exeichader.exedescription pid process target process PID 1100 set thread context of 3752 1100 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe svchost.exe PID 1100 set thread context of 324 1100 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe PID 4080 set thread context of 3848 4080 ichader.exe svchost.exe PID 4080 set thread context of 3692 4080 ichader.exe ichader.exe PID 4080 set thread context of 3972 4080 ichader.exe ichader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 960 3752 WerFault.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
ichader.exeichader.exedescription pid process Token: SeIncreaseQuotaPrivilege 3972 ichader.exe Token: SeSecurityPrivilege 3972 ichader.exe Token: SeTakeOwnershipPrivilege 3972 ichader.exe Token: SeLoadDriverPrivilege 3972 ichader.exe Token: SeSystemProfilePrivilege 3972 ichader.exe Token: SeSystemtimePrivilege 3972 ichader.exe Token: SeProfSingleProcessPrivilege 3972 ichader.exe Token: SeIncBasePriorityPrivilege 3972 ichader.exe Token: SeCreatePagefilePrivilege 3972 ichader.exe Token: SeBackupPrivilege 3972 ichader.exe Token: SeRestorePrivilege 3972 ichader.exe Token: SeShutdownPrivilege 3972 ichader.exe Token: SeDebugPrivilege 3972 ichader.exe Token: SeSystemEnvironmentPrivilege 3972 ichader.exe Token: SeChangeNotifyPrivilege 3972 ichader.exe Token: SeRemoteShutdownPrivilege 3972 ichader.exe Token: SeUndockPrivilege 3972 ichader.exe Token: SeManageVolumePrivilege 3972 ichader.exe Token: SeImpersonatePrivilege 3972 ichader.exe Token: SeCreateGlobalPrivilege 3972 ichader.exe Token: 33 3972 ichader.exe Token: 34 3972 ichader.exe Token: 35 3972 ichader.exe Token: 36 3972 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe Token: SeDebugPrivilege 3692 ichader.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exeichader.exesvchost.exeichader.exeichader.exepid process 1100 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe 324 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe 4080 ichader.exe 3848 svchost.exe 3692 ichader.exe 3972 ichader.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.execmd.exeichader.exedescription pid process target process PID 1100 wrote to memory of 3752 1100 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe svchost.exe PID 1100 wrote to memory of 3752 1100 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe svchost.exe PID 1100 wrote to memory of 3752 1100 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe svchost.exe PID 1100 wrote to memory of 3752 1100 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe svchost.exe PID 1100 wrote to memory of 324 1100 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe PID 1100 wrote to memory of 324 1100 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe PID 1100 wrote to memory of 324 1100 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe PID 1100 wrote to memory of 324 1100 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe PID 1100 wrote to memory of 324 1100 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe PID 1100 wrote to memory of 324 1100 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe PID 1100 wrote to memory of 324 1100 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe PID 1100 wrote to memory of 324 1100 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe PID 324 wrote to memory of 1920 324 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe cmd.exe PID 324 wrote to memory of 1920 324 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe cmd.exe PID 324 wrote to memory of 1920 324 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe cmd.exe PID 1920 wrote to memory of 976 1920 cmd.exe reg.exe PID 1920 wrote to memory of 976 1920 cmd.exe reg.exe PID 1920 wrote to memory of 976 1920 cmd.exe reg.exe PID 324 wrote to memory of 4080 324 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe ichader.exe PID 324 wrote to memory of 4080 324 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe ichader.exe PID 324 wrote to memory of 4080 324 6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe ichader.exe PID 4080 wrote to memory of 3848 4080 ichader.exe svchost.exe PID 4080 wrote to memory of 3848 4080 ichader.exe svchost.exe PID 4080 wrote to memory of 3848 4080 ichader.exe svchost.exe PID 4080 wrote to memory of 3848 4080 ichader.exe svchost.exe PID 4080 wrote to memory of 3848 4080 ichader.exe svchost.exe PID 4080 wrote to memory of 3848 4080 ichader.exe svchost.exe PID 4080 wrote to memory of 3848 4080 ichader.exe svchost.exe PID 4080 wrote to memory of 3848 4080 ichader.exe svchost.exe PID 4080 wrote to memory of 3848 4080 ichader.exe svchost.exe PID 4080 wrote to memory of 3692 4080 ichader.exe ichader.exe PID 4080 wrote to memory of 3692 4080 ichader.exe ichader.exe PID 4080 wrote to memory of 3692 4080 ichader.exe ichader.exe PID 4080 wrote to memory of 3692 4080 ichader.exe ichader.exe PID 4080 wrote to memory of 3692 4080 ichader.exe ichader.exe PID 4080 wrote to memory of 3692 4080 ichader.exe ichader.exe PID 4080 wrote to memory of 3692 4080 ichader.exe ichader.exe PID 4080 wrote to memory of 3692 4080 ichader.exe ichader.exe PID 4080 wrote to memory of 3972 4080 ichader.exe ichader.exe PID 4080 wrote to memory of 3972 4080 ichader.exe ichader.exe PID 4080 wrote to memory of 3972 4080 ichader.exe ichader.exe PID 4080 wrote to memory of 3972 4080 ichader.exe ichader.exe PID 4080 wrote to memory of 3972 4080 ichader.exe ichader.exe PID 4080 wrote to memory of 3972 4080 ichader.exe ichader.exe PID 4080 wrote to memory of 3972 4080 ichader.exe ichader.exe PID 4080 wrote to memory of 3972 4080 ichader.exe ichader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe"C:\Users\Admin\AppData\Local\Temp\6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 923⤵
- Program crash
PID:960 -
C:\Users\Admin\AppData\Local\Temp\6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe"C:\Users\Admin\AppData\Local\Temp\6710915f32e35614181300eba4f4b49e24bbda5774f31abf84b78552565a8559.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IRYJF.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "java" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\IDM\ichader.exe" /f4⤵
- Adds Run key to start application
PID:976 -
C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3848 -
C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3692 -
C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3972
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IRYJF.batMD5
92353035f01403e26aa2ff51c3963238
SHA1d13f167c73bfce23a2deab8ce7c4ce9f78759ff4
SHA2562e72a8542f8f809bfb1e4adfb481c7c5e6dc00dda7970c74692ba8d83ea0a870
SHA51274560e33477caae3c7bc13914e4ae3c6911bbcfe257b2833155c236a158db0aca17478beb9d97f648ff1ea566005260f511361771c74203195107f4e82cce7df
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
40ac4f7238cf48af41ea8f8f96848df4
SHA19251cd0bea50bf1c4d133d535ccf7eda3def7a07
SHA2568ba6888fed3fbb5f1b919adb139cb2d5faeeeb934663ad9fcb8058e95d25e444
SHA512056838ae89ef29401a189fe0d697e5604dec1b66686be6344c6ae3503b26d298a76bf558d45415ca0d399e724d249bf99e0a9113c44827a98a3c03c9a81c2a92
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
40ac4f7238cf48af41ea8f8f96848df4
SHA19251cd0bea50bf1c4d133d535ccf7eda3def7a07
SHA2568ba6888fed3fbb5f1b919adb139cb2d5faeeeb934663ad9fcb8058e95d25e444
SHA512056838ae89ef29401a189fe0d697e5604dec1b66686be6344c6ae3503b26d298a76bf558d45415ca0d399e724d249bf99e0a9113c44827a98a3c03c9a81c2a92
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
40ac4f7238cf48af41ea8f8f96848df4
SHA19251cd0bea50bf1c4d133d535ccf7eda3def7a07
SHA2568ba6888fed3fbb5f1b919adb139cb2d5faeeeb934663ad9fcb8058e95d25e444
SHA512056838ae89ef29401a189fe0d697e5604dec1b66686be6344c6ae3503b26d298a76bf558d45415ca0d399e724d249bf99e0a9113c44827a98a3c03c9a81c2a92
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
40ac4f7238cf48af41ea8f8f96848df4
SHA19251cd0bea50bf1c4d133d535ccf7eda3def7a07
SHA2568ba6888fed3fbb5f1b919adb139cb2d5faeeeb934663ad9fcb8058e95d25e444
SHA512056838ae89ef29401a189fe0d697e5604dec1b66686be6344c6ae3503b26d298a76bf558d45415ca0d399e724d249bf99e0a9113c44827a98a3c03c9a81c2a92
-
memory/324-4-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/324-5-0x00000000004085D0-mapping.dmp
-
memory/324-6-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/324-7-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/960-8-0x0000000004680000-0x0000000004681000-memory.dmpFilesize
4KB
-
memory/976-13-0x0000000000000000-mapping.dmp
-
memory/1920-11-0x0000000000000000-mapping.dmp
-
memory/3692-29-0x00000000735D0000-0x0000000073663000-memory.dmpFilesize
588KB
-
memory/3692-27-0x00000000004085D0-mapping.dmp
-
memory/3752-3-0x000000000040B000-mapping.dmp
-
memory/3848-20-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/3848-21-0x000000000040B000-mapping.dmp
-
memory/3848-22-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/3848-23-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/3972-31-0x00000000004B5210-mapping.dmp
-
memory/3972-34-0x00000000735D0000-0x0000000073663000-memory.dmpFilesize
588KB
-
memory/3972-30-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/3972-36-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/3972-37-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/4080-17-0x00000000735D0000-0x0000000073663000-memory.dmpFilesize
588KB
-
memory/4080-14-0x0000000000000000-mapping.dmp