Analysis
-
max time kernel
120s -
max time network
156s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 20:50
Static task
static1
Behavioral task
behavioral1
Sample
3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe
Resource
win7v20201028
General
-
Target
3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe
-
Size
1.5MB
-
MD5
a8d87f85abebd106b6c3fc3a340931c5
-
SHA1
b35b4b1c4a9c4729f021a1c7fbdeb1909eb5d84d
-
SHA256
3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d
-
SHA512
7d3b846b3481f31072c198e90c80f8957a4dd67834a125da12e21198bc58823e0da5e5114404c783bd7cae642ee31c187571fa1a1c337633219a91d249aade01
Malware Config
Extracted
darkcomet
Runescape
mrsnickers03.no-ip.biz:340
DC_MUTEX-6ZFK11A
-
gencode
uNwew4gojxtu
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
ichader.exeichader.exeichader.exepid process 996 ichader.exe 1588 ichader.exe 1784 ichader.exe -
Processes:
resource yara_rule behavioral2/memory/4084-4-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4084-6-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4084-7-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1784-30-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1784-38-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1784-39-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\java = "C:\\Users\\Admin\\AppData\\Roaming\\IDM\\ichader.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exeichader.exedescription pid process target process PID 4684 set thread context of 416 4684 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe svchost.exe PID 4684 set thread context of 4084 4684 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe PID 996 set thread context of 1412 996 ichader.exe svchost.exe PID 996 set thread context of 1588 996 ichader.exe ichader.exe PID 996 set thread context of 1784 996 ichader.exe ichader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3180 416 WerFault.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe 1412 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
ichader.exeichader.exedescription pid process Token: SeIncreaseQuotaPrivilege 1784 ichader.exe Token: SeSecurityPrivilege 1784 ichader.exe Token: SeTakeOwnershipPrivilege 1784 ichader.exe Token: SeLoadDriverPrivilege 1784 ichader.exe Token: SeSystemProfilePrivilege 1784 ichader.exe Token: SeSystemtimePrivilege 1784 ichader.exe Token: SeProfSingleProcessPrivilege 1784 ichader.exe Token: SeIncBasePriorityPrivilege 1784 ichader.exe Token: SeCreatePagefilePrivilege 1784 ichader.exe Token: SeBackupPrivilege 1784 ichader.exe Token: SeRestorePrivilege 1784 ichader.exe Token: SeShutdownPrivilege 1784 ichader.exe Token: SeDebugPrivilege 1784 ichader.exe Token: SeSystemEnvironmentPrivilege 1784 ichader.exe Token: SeChangeNotifyPrivilege 1784 ichader.exe Token: SeRemoteShutdownPrivilege 1784 ichader.exe Token: SeUndockPrivilege 1784 ichader.exe Token: SeManageVolumePrivilege 1784 ichader.exe Token: SeImpersonatePrivilege 1784 ichader.exe Token: SeCreateGlobalPrivilege 1784 ichader.exe Token: 33 1784 ichader.exe Token: 34 1784 ichader.exe Token: 35 1784 ichader.exe Token: 36 1784 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe Token: SeDebugPrivilege 1588 ichader.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exeichader.exesvchost.exeichader.exeichader.exepid process 4684 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe 4084 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe 996 ichader.exe 1412 svchost.exe 1588 ichader.exe 1784 ichader.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.execmd.exeichader.exedescription pid process target process PID 4684 wrote to memory of 416 4684 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe svchost.exe PID 4684 wrote to memory of 416 4684 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe svchost.exe PID 4684 wrote to memory of 416 4684 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe svchost.exe PID 4684 wrote to memory of 416 4684 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe svchost.exe PID 4684 wrote to memory of 4084 4684 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe PID 4684 wrote to memory of 4084 4684 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe PID 4684 wrote to memory of 4084 4684 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe PID 4684 wrote to memory of 4084 4684 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe PID 4684 wrote to memory of 4084 4684 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe PID 4684 wrote to memory of 4084 4684 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe PID 4684 wrote to memory of 4084 4684 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe PID 4684 wrote to memory of 4084 4684 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe PID 4084 wrote to memory of 4064 4084 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe cmd.exe PID 4084 wrote to memory of 4064 4084 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe cmd.exe PID 4084 wrote to memory of 4064 4084 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe cmd.exe PID 4064 wrote to memory of 792 4064 cmd.exe reg.exe PID 4064 wrote to memory of 792 4064 cmd.exe reg.exe PID 4064 wrote to memory of 792 4064 cmd.exe reg.exe PID 4084 wrote to memory of 996 4084 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe ichader.exe PID 4084 wrote to memory of 996 4084 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe ichader.exe PID 4084 wrote to memory of 996 4084 3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe ichader.exe PID 996 wrote to memory of 1412 996 ichader.exe svchost.exe PID 996 wrote to memory of 1412 996 ichader.exe svchost.exe PID 996 wrote to memory of 1412 996 ichader.exe svchost.exe PID 996 wrote to memory of 1412 996 ichader.exe svchost.exe PID 996 wrote to memory of 1412 996 ichader.exe svchost.exe PID 996 wrote to memory of 1412 996 ichader.exe svchost.exe PID 996 wrote to memory of 1412 996 ichader.exe svchost.exe PID 996 wrote to memory of 1412 996 ichader.exe svchost.exe PID 996 wrote to memory of 1412 996 ichader.exe svchost.exe PID 996 wrote to memory of 1588 996 ichader.exe ichader.exe PID 996 wrote to memory of 1588 996 ichader.exe ichader.exe PID 996 wrote to memory of 1588 996 ichader.exe ichader.exe PID 996 wrote to memory of 1588 996 ichader.exe ichader.exe PID 996 wrote to memory of 1588 996 ichader.exe ichader.exe PID 996 wrote to memory of 1588 996 ichader.exe ichader.exe PID 996 wrote to memory of 1588 996 ichader.exe ichader.exe PID 996 wrote to memory of 1588 996 ichader.exe ichader.exe PID 996 wrote to memory of 1784 996 ichader.exe ichader.exe PID 996 wrote to memory of 1784 996 ichader.exe ichader.exe PID 996 wrote to memory of 1784 996 ichader.exe ichader.exe PID 996 wrote to memory of 1784 996 ichader.exe ichader.exe PID 996 wrote to memory of 1784 996 ichader.exe ichader.exe PID 996 wrote to memory of 1784 996 ichader.exe ichader.exe PID 996 wrote to memory of 1784 996 ichader.exe ichader.exe PID 996 wrote to memory of 1784 996 ichader.exe ichader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe"C:\Users\Admin\AppData\Local\Temp\3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 416 -s 923⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe"C:\Users\Admin\AppData\Local\Temp\3a33bcbef59011becd7de5bcc3f0cea7bd19ad899c536ea483aa22ca081a135d.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IWVHP.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "java" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\IDM\ichader.exe" /f4⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"C:\Users\Admin\AppData\Roaming\IDM\ichader.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IWVHP.batMD5
92353035f01403e26aa2ff51c3963238
SHA1d13f167c73bfce23a2deab8ce7c4ce9f78759ff4
SHA2562e72a8542f8f809bfb1e4adfb481c7c5e6dc00dda7970c74692ba8d83ea0a870
SHA51274560e33477caae3c7bc13914e4ae3c6911bbcfe257b2833155c236a158db0aca17478beb9d97f648ff1ea566005260f511361771c74203195107f4e82cce7df
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
68547414de4e743f5baceab3c30b0d36
SHA1f9636cff8fa406af07b066bec0a978e7f52aaaa5
SHA2563dceef401bded638c3425cf10a50d329b0dfe4755b9156d47ac78f24ec356213
SHA51276dd8269ad935871918ecbb091944ead95bf0b6dbc58a3643a5618d8689a2a5e403388dc079420858a019b3d2b8a25dc1466ef9968e7747cf813ccd9fc1c4796
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
68547414de4e743f5baceab3c30b0d36
SHA1f9636cff8fa406af07b066bec0a978e7f52aaaa5
SHA2563dceef401bded638c3425cf10a50d329b0dfe4755b9156d47ac78f24ec356213
SHA51276dd8269ad935871918ecbb091944ead95bf0b6dbc58a3643a5618d8689a2a5e403388dc079420858a019b3d2b8a25dc1466ef9968e7747cf813ccd9fc1c4796
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
68547414de4e743f5baceab3c30b0d36
SHA1f9636cff8fa406af07b066bec0a978e7f52aaaa5
SHA2563dceef401bded638c3425cf10a50d329b0dfe4755b9156d47ac78f24ec356213
SHA51276dd8269ad935871918ecbb091944ead95bf0b6dbc58a3643a5618d8689a2a5e403388dc079420858a019b3d2b8a25dc1466ef9968e7747cf813ccd9fc1c4796
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
68547414de4e743f5baceab3c30b0d36
SHA1f9636cff8fa406af07b066bec0a978e7f52aaaa5
SHA2563dceef401bded638c3425cf10a50d329b0dfe4755b9156d47ac78f24ec356213
SHA51276dd8269ad935871918ecbb091944ead95bf0b6dbc58a3643a5618d8689a2a5e403388dc079420858a019b3d2b8a25dc1466ef9968e7747cf813ccd9fc1c4796
-
memory/416-3-0x000000000040B000-mapping.dmp
-
memory/792-13-0x0000000000000000-mapping.dmp
-
memory/996-14-0x0000000000000000-mapping.dmp
-
memory/996-17-0x0000000072F70000-0x0000000073003000-memory.dmpFilesize
588KB
-
memory/1412-21-0x000000000040B000-mapping.dmp
-
memory/1412-22-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1412-23-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1412-20-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1588-26-0x00000000004085D0-mapping.dmp
-
memory/1588-29-0x0000000072F70000-0x0000000073003000-memory.dmpFilesize
588KB
-
memory/1784-30-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1784-31-0x00000000004B5210-mapping.dmp
-
memory/1784-35-0x0000000072F70000-0x0000000073003000-memory.dmpFilesize
588KB
-
memory/1784-38-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1784-39-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/3180-10-0x0000000004C70000-0x0000000004C71000-memory.dmpFilesize
4KB
-
memory/4064-11-0x0000000000000000-mapping.dmp
-
memory/4084-7-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/4084-6-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/4084-4-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/4084-5-0x00000000004085D0-mapping.dmp