Analysis
-
max time kernel
151s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
17-05-2021 04:20
Behavioral task
behavioral1
Sample
be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe
-
Size
744KB
-
MD5
a019db3bbafc6c2b3e1e42b1f8dc21ae
-
SHA1
1a6a386444a67f48b25320831ccdb7437181c65f
-
SHA256
be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6
-
SHA512
c49422d469a0fc8c8689ac8193c64cdaf7e68bae1fef65ed30feb29fbc6d03484c1789e6f836cc016d4eb50f6e4ac595a80497ee74d2f6b0d44ce72b8fce2ca5
Malware Config
Extracted
Family
darkcomet
Botnet
Guest16
C2
boreasfgasd.ddns.net:1604
Mutex
DC_MUTEX-C2M4WWM
Attributes
-
gencode
boVCPNsNcng5
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1788-60-0x0000000000400000-0x00000000004BA000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exedescription pid process target process PID 536 set thread context of 1788 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe iexplore.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exeiexplore.exedescription pid process Token: SeIncreaseQuotaPrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeSecurityPrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeTakeOwnershipPrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeLoadDriverPrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeSystemProfilePrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeSystemtimePrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeProfSingleProcessPrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeIncBasePriorityPrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeCreatePagefilePrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeBackupPrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeRestorePrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeShutdownPrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeDebugPrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeSystemEnvironmentPrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeChangeNotifyPrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeRemoteShutdownPrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeUndockPrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeManageVolumePrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeImpersonatePrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeCreateGlobalPrivilege 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: 33 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: 34 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: 35 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe Token: SeIncreaseQuotaPrivilege 1788 iexplore.exe Token: SeSecurityPrivilege 1788 iexplore.exe Token: SeTakeOwnershipPrivilege 1788 iexplore.exe Token: SeLoadDriverPrivilege 1788 iexplore.exe Token: SeSystemProfilePrivilege 1788 iexplore.exe Token: SeSystemtimePrivilege 1788 iexplore.exe Token: SeProfSingleProcessPrivilege 1788 iexplore.exe Token: SeIncBasePriorityPrivilege 1788 iexplore.exe Token: SeCreatePagefilePrivilege 1788 iexplore.exe Token: SeBackupPrivilege 1788 iexplore.exe Token: SeRestorePrivilege 1788 iexplore.exe Token: SeShutdownPrivilege 1788 iexplore.exe Token: SeDebugPrivilege 1788 iexplore.exe Token: SeSystemEnvironmentPrivilege 1788 iexplore.exe Token: SeChangeNotifyPrivilege 1788 iexplore.exe Token: SeRemoteShutdownPrivilege 1788 iexplore.exe Token: SeUndockPrivilege 1788 iexplore.exe Token: SeManageVolumePrivilege 1788 iexplore.exe Token: SeImpersonatePrivilege 1788 iexplore.exe Token: SeCreateGlobalPrivilege 1788 iexplore.exe Token: 33 1788 iexplore.exe Token: 34 1788 iexplore.exe Token: 35 1788 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
iexplore.exepid process 1788 iexplore.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exedescription pid process target process PID 536 wrote to memory of 1788 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe iexplore.exe PID 536 wrote to memory of 1788 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe iexplore.exe PID 536 wrote to memory of 1788 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe iexplore.exe PID 536 wrote to memory of 1788 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe iexplore.exe PID 536 wrote to memory of 1788 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe iexplore.exe PID 536 wrote to memory of 1788 536 be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe"C:\Users\Admin\AppData\Local\Temp\be3b1f4935d322fc7994d78ab9a9dcf7f5ec5e4001d1abaa534bd4d4ec322ad6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1788