Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
17-05-2021 04:36
Behavioral task
behavioral1
Sample
a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe
Resource
win10v20210410
General
-
Target
a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe
-
Size
690KB
-
MD5
27593b60c26da879d8e0f6c5ce8b3c3c
-
SHA1
e050280ed8225f06c61f11b22ee9bdc32aac2777
-
SHA256
a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b
-
SHA512
17d74c7b47bfad005a6726388509fb996d126a721d20d43d61a550261f57942dcc2e74bbad78e96e0a83ebacd92eac1160f720b82630b30d16e5b438a35589ee
Malware Config
Extracted
darkcomet
PB+RP
react1on.no-ip.biz:1004
DC_MUTEX-9Z9HPRZ
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
bfAgAtl5pkim
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 3604 msdcsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msdcsc.exepid process 3604 msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeSecurityPrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeTakeOwnershipPrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeLoadDriverPrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeSystemProfilePrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeSystemtimePrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeProfSingleProcessPrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeIncBasePriorityPrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeCreatePagefilePrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeBackupPrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeRestorePrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeShutdownPrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeDebugPrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeSystemEnvironmentPrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeChangeNotifyPrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeRemoteShutdownPrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeUndockPrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeManageVolumePrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeImpersonatePrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeCreateGlobalPrivilege 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: 33 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: 34 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: 35 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: 36 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe Token: SeIncreaseQuotaPrivilege 3604 msdcsc.exe Token: SeSecurityPrivilege 3604 msdcsc.exe Token: SeTakeOwnershipPrivilege 3604 msdcsc.exe Token: SeLoadDriverPrivilege 3604 msdcsc.exe Token: SeSystemProfilePrivilege 3604 msdcsc.exe Token: SeSystemtimePrivilege 3604 msdcsc.exe Token: SeProfSingleProcessPrivilege 3604 msdcsc.exe Token: SeIncBasePriorityPrivilege 3604 msdcsc.exe Token: SeCreatePagefilePrivilege 3604 msdcsc.exe Token: SeBackupPrivilege 3604 msdcsc.exe Token: SeRestorePrivilege 3604 msdcsc.exe Token: SeShutdownPrivilege 3604 msdcsc.exe Token: SeDebugPrivilege 3604 msdcsc.exe Token: SeSystemEnvironmentPrivilege 3604 msdcsc.exe Token: SeChangeNotifyPrivilege 3604 msdcsc.exe Token: SeRemoteShutdownPrivilege 3604 msdcsc.exe Token: SeUndockPrivilege 3604 msdcsc.exe Token: SeManageVolumePrivilege 3604 msdcsc.exe Token: SeImpersonatePrivilege 3604 msdcsc.exe Token: SeCreateGlobalPrivilege 3604 msdcsc.exe Token: 33 3604 msdcsc.exe Token: 34 3604 msdcsc.exe Token: 35 3604 msdcsc.exe Token: 36 3604 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msdcsc.exepid process 3604 msdcsc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exemsdcsc.exedescription pid process target process PID 500 wrote to memory of 3604 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe msdcsc.exe PID 500 wrote to memory of 3604 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe msdcsc.exe PID 500 wrote to memory of 3604 500 a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe msdcsc.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe PID 3604 wrote to memory of 3704 3604 msdcsc.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe"C:\Users\Admin\AppData\Local\Temp\a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:500 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵PID:3704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
27593b60c26da879d8e0f6c5ce8b3c3c
SHA1e050280ed8225f06c61f11b22ee9bdc32aac2777
SHA256a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b
SHA51217d74c7b47bfad005a6726388509fb996d126a721d20d43d61a550261f57942dcc2e74bbad78e96e0a83ebacd92eac1160f720b82630b30d16e5b438a35589ee
-
MD5
27593b60c26da879d8e0f6c5ce8b3c3c
SHA1e050280ed8225f06c61f11b22ee9bdc32aac2777
SHA256a70e2b46ebb363cb0c07bbac058096b337510dc6cfd3bebd7c8ba2c2965b948b
SHA51217d74c7b47bfad005a6726388509fb996d126a721d20d43d61a550261f57942dcc2e74bbad78e96e0a83ebacd92eac1160f720b82630b30d16e5b438a35589ee