Analysis
-
max time kernel
115s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 20:50
Static task
static1
Behavioral task
behavioral1
Sample
8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe
Resource
win7v20201028
General
-
Target
8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe
-
Size
1.5MB
-
MD5
f7f98f7827a8eee2a8eba4542f6c4ff8
-
SHA1
f504d82d6826cf7d8defa916f71be01a46c6db09
-
SHA256
8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50
-
SHA512
b6fe1a75af8bb1818ec7af6d7f98288e09466d7b7deabdd015b312c0b94942badcbd554a52042e1d2b737525b501673f5b776d0b68fb8c245730a65c3f7b5ef1
Malware Config
Extracted
darkcomet
Runescape
mrsnickers03.no-ip.biz:340
DC_MUTEX-6ZFK11A
-
gencode
uNwew4gojxtu
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
ichader.exeichader.exeichader.exepid process 2116 ichader.exe 2084 ichader.exe 636 ichader.exe -
Processes:
resource yara_rule behavioral2/memory/2796-4-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2796-6-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2796-7-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/636-29-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/636-38-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/636-39-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\java = "C:\\Users\\Admin\\AppData\\Roaming\\IDM\\ichader.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exeichader.exedescription pid process target process PID 944 set thread context of 3148 944 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe svchost.exe PID 944 set thread context of 2796 944 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe PID 2116 set thread context of 2140 2116 ichader.exe svchost.exe PID 2116 set thread context of 2084 2116 ichader.exe ichader.exe PID 2116 set thread context of 636 2116 ichader.exe ichader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 852 3148 WerFault.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
ichader.exeichader.exedescription pid process Token: SeIncreaseQuotaPrivilege 636 ichader.exe Token: SeSecurityPrivilege 636 ichader.exe Token: SeTakeOwnershipPrivilege 636 ichader.exe Token: SeLoadDriverPrivilege 636 ichader.exe Token: SeSystemProfilePrivilege 636 ichader.exe Token: SeSystemtimePrivilege 636 ichader.exe Token: SeProfSingleProcessPrivilege 636 ichader.exe Token: SeIncBasePriorityPrivilege 636 ichader.exe Token: SeCreatePagefilePrivilege 636 ichader.exe Token: SeBackupPrivilege 636 ichader.exe Token: SeRestorePrivilege 636 ichader.exe Token: SeShutdownPrivilege 636 ichader.exe Token: SeDebugPrivilege 636 ichader.exe Token: SeSystemEnvironmentPrivilege 636 ichader.exe Token: SeChangeNotifyPrivilege 636 ichader.exe Token: SeRemoteShutdownPrivilege 636 ichader.exe Token: SeUndockPrivilege 636 ichader.exe Token: SeManageVolumePrivilege 636 ichader.exe Token: SeImpersonatePrivilege 636 ichader.exe Token: SeCreateGlobalPrivilege 636 ichader.exe Token: 33 636 ichader.exe Token: 34 636 ichader.exe Token: 35 636 ichader.exe Token: 36 636 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe Token: SeDebugPrivilege 2084 ichader.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exeichader.exesvchost.exeichader.exeichader.exepid process 944 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe 2796 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe 2116 ichader.exe 2140 svchost.exe 2084 ichader.exe 636 ichader.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.execmd.exeichader.exedescription pid process target process PID 944 wrote to memory of 3148 944 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe svchost.exe PID 944 wrote to memory of 3148 944 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe svchost.exe PID 944 wrote to memory of 3148 944 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe svchost.exe PID 944 wrote to memory of 3148 944 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe svchost.exe PID 944 wrote to memory of 2796 944 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe PID 944 wrote to memory of 2796 944 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe PID 944 wrote to memory of 2796 944 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe PID 944 wrote to memory of 2796 944 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe PID 944 wrote to memory of 2796 944 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe PID 944 wrote to memory of 2796 944 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe PID 944 wrote to memory of 2796 944 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe PID 944 wrote to memory of 2796 944 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe PID 2796 wrote to memory of 668 2796 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe cmd.exe PID 2796 wrote to memory of 668 2796 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe cmd.exe PID 2796 wrote to memory of 668 2796 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe cmd.exe PID 668 wrote to memory of 3796 668 cmd.exe reg.exe PID 668 wrote to memory of 3796 668 cmd.exe reg.exe PID 668 wrote to memory of 3796 668 cmd.exe reg.exe PID 2796 wrote to memory of 2116 2796 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe ichader.exe PID 2796 wrote to memory of 2116 2796 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe ichader.exe PID 2796 wrote to memory of 2116 2796 8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe ichader.exe PID 2116 wrote to memory of 2140 2116 ichader.exe svchost.exe PID 2116 wrote to memory of 2140 2116 ichader.exe svchost.exe PID 2116 wrote to memory of 2140 2116 ichader.exe svchost.exe PID 2116 wrote to memory of 2140 2116 ichader.exe svchost.exe PID 2116 wrote to memory of 2140 2116 ichader.exe svchost.exe PID 2116 wrote to memory of 2140 2116 ichader.exe svchost.exe PID 2116 wrote to memory of 2140 2116 ichader.exe svchost.exe PID 2116 wrote to memory of 2140 2116 ichader.exe svchost.exe PID 2116 wrote to memory of 2140 2116 ichader.exe svchost.exe PID 2116 wrote to memory of 2084 2116 ichader.exe ichader.exe PID 2116 wrote to memory of 2084 2116 ichader.exe ichader.exe PID 2116 wrote to memory of 2084 2116 ichader.exe ichader.exe PID 2116 wrote to memory of 2084 2116 ichader.exe ichader.exe PID 2116 wrote to memory of 2084 2116 ichader.exe ichader.exe PID 2116 wrote to memory of 2084 2116 ichader.exe ichader.exe PID 2116 wrote to memory of 2084 2116 ichader.exe ichader.exe PID 2116 wrote to memory of 2084 2116 ichader.exe ichader.exe PID 2116 wrote to memory of 636 2116 ichader.exe ichader.exe PID 2116 wrote to memory of 636 2116 ichader.exe ichader.exe PID 2116 wrote to memory of 636 2116 ichader.exe ichader.exe PID 2116 wrote to memory of 636 2116 ichader.exe ichader.exe PID 2116 wrote to memory of 636 2116 ichader.exe ichader.exe PID 2116 wrote to memory of 636 2116 ichader.exe ichader.exe PID 2116 wrote to memory of 636 2116 ichader.exe ichader.exe PID 2116 wrote to memory of 636 2116 ichader.exe ichader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe"C:\Users\Admin\AppData\Local\Temp\8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3148 -s 1003⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe"C:\Users\Admin\AppData\Local\Temp\8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QOMRE.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "java" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\IDM\ichader.exe" /f4⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\QOMRE.batMD5
92353035f01403e26aa2ff51c3963238
SHA1d13f167c73bfce23a2deab8ce7c4ce9f78759ff4
SHA2562e72a8542f8f809bfb1e4adfb481c7c5e6dc00dda7970c74692ba8d83ea0a870
SHA51274560e33477caae3c7bc13914e4ae3c6911bbcfe257b2833155c236a158db0aca17478beb9d97f648ff1ea566005260f511361771c74203195107f4e82cce7df
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
188354ea53b4a68a5842676461f7d30c
SHA19543729c1516f6c4572e59f6d190705dee8c964c
SHA25671e003fade1c08b8957e5d003c47734d0242e49cd7f7f157de49d7b88e9b0c01
SHA5122e2a48e55d561b9c5a44d646ff1422660dc1158cd227be2ceaceaa6428e2f45b46efdd20f063df51e23609648c4319e9f331ffe72cc83136083841b76e80949d
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
188354ea53b4a68a5842676461f7d30c
SHA19543729c1516f6c4572e59f6d190705dee8c964c
SHA25671e003fade1c08b8957e5d003c47734d0242e49cd7f7f157de49d7b88e9b0c01
SHA5122e2a48e55d561b9c5a44d646ff1422660dc1158cd227be2ceaceaa6428e2f45b46efdd20f063df51e23609648c4319e9f331ffe72cc83136083841b76e80949d
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
188354ea53b4a68a5842676461f7d30c
SHA19543729c1516f6c4572e59f6d190705dee8c964c
SHA25671e003fade1c08b8957e5d003c47734d0242e49cd7f7f157de49d7b88e9b0c01
SHA5122e2a48e55d561b9c5a44d646ff1422660dc1158cd227be2ceaceaa6428e2f45b46efdd20f063df51e23609648c4319e9f331ffe72cc83136083841b76e80949d
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
188354ea53b4a68a5842676461f7d30c
SHA19543729c1516f6c4572e59f6d190705dee8c964c
SHA25671e003fade1c08b8957e5d003c47734d0242e49cd7f7f157de49d7b88e9b0c01
SHA5122e2a48e55d561b9c5a44d646ff1422660dc1158cd227be2ceaceaa6428e2f45b46efdd20f063df51e23609648c4319e9f331ffe72cc83136083841b76e80949d
-
memory/636-39-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/636-38-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/636-33-0x0000000072FA0000-0x0000000073033000-memory.dmpFilesize
588KB
-
memory/636-29-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/636-31-0x00000000004B5210-mapping.dmp
-
memory/668-11-0x0000000000000000-mapping.dmp
-
memory/852-10-0x0000000004EA0000-0x0000000004EA1000-memory.dmpFilesize
4KB
-
memory/2084-30-0x0000000072FA0000-0x0000000073033000-memory.dmpFilesize
588KB
-
memory/2084-26-0x00000000004085D0-mapping.dmp
-
memory/2116-14-0x0000000000000000-mapping.dmp
-
memory/2116-17-0x0000000072FA0000-0x0000000073033000-memory.dmpFilesize
588KB
-
memory/2140-20-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2140-22-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2140-23-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2140-21-0x000000000040B000-mapping.dmp
-
memory/2796-7-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/2796-6-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/2796-5-0x00000000004085D0-mapping.dmp
-
memory/2796-4-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/3148-3-0x000000000040B000-mapping.dmp
-
memory/3796-13-0x0000000000000000-mapping.dmp