Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
24-05-2021 13:09
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order 781.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Malware Config
Extracted
Family
darkcomet
Botnet
May 2021
C2
bonding79.ddns.net:3316
goodgt79.ddns.net:3316
whatis79.ddns.net:3316
smath79.ddns.net:3316
jacknop79.ddns.net:3316
chrisle79.ddns.net:3316
Mutex
DC_MUTEX-PPMNGQA
Attributes
-
gencode
AUQYBsRj2TWk
-
install
false
-
offline_keylogger
true
-
password
Password20$
-
persistence
false
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
Purchase Order 781.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\k6l50Mr8Exu7gS7Z\\PWC3fqGzjgxO.exe\",explorer.exe" Purchase Order 781.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Purchase Order 781.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Purchase Order 781.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Purchase Order 781.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
Purchase Order 781.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Wine Purchase Order 781.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Purchase Order 781.exedescription pid process target process PID 1864 set thread context of 1504 1864 Purchase Order 781.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Purchase Order 781.exepid process 1864 Purchase Order 781.exe 1864 Purchase Order 781.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
Processes:
Purchase Order 781.exevbc.exedescription pid process Token: SeDebugPrivilege 1864 Purchase Order 781.exe Token: SeDebugPrivilege 1864 Purchase Order 781.exe Token: SeIncreaseQuotaPrivilege 1504 vbc.exe Token: SeSecurityPrivilege 1504 vbc.exe Token: SeTakeOwnershipPrivilege 1504 vbc.exe Token: SeLoadDriverPrivilege 1504 vbc.exe Token: SeSystemProfilePrivilege 1504 vbc.exe Token: SeSystemtimePrivilege 1504 vbc.exe Token: SeProfSingleProcessPrivilege 1504 vbc.exe Token: SeIncBasePriorityPrivilege 1504 vbc.exe Token: SeCreatePagefilePrivilege 1504 vbc.exe Token: SeBackupPrivilege 1504 vbc.exe Token: SeRestorePrivilege 1504 vbc.exe Token: SeShutdownPrivilege 1504 vbc.exe Token: SeDebugPrivilege 1504 vbc.exe Token: SeSystemEnvironmentPrivilege 1504 vbc.exe Token: SeChangeNotifyPrivilege 1504 vbc.exe Token: SeRemoteShutdownPrivilege 1504 vbc.exe Token: SeUndockPrivilege 1504 vbc.exe Token: SeManageVolumePrivilege 1504 vbc.exe Token: SeImpersonatePrivilege 1504 vbc.exe Token: SeCreateGlobalPrivilege 1504 vbc.exe Token: 33 1504 vbc.exe Token: 34 1504 vbc.exe Token: 35 1504 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vbc.exepid process 1504 vbc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Purchase Order 781.exedescription pid process target process PID 1864 wrote to memory of 1504 1864 Purchase Order 781.exe vbc.exe PID 1864 wrote to memory of 1504 1864 Purchase Order 781.exe vbc.exe PID 1864 wrote to memory of 1504 1864 Purchase Order 781.exe vbc.exe PID 1864 wrote to memory of 1504 1864 Purchase Order 781.exe vbc.exe PID 1864 wrote to memory of 1504 1864 Purchase Order 781.exe vbc.exe PID 1864 wrote to memory of 1504 1864 Purchase Order 781.exe vbc.exe PID 1864 wrote to memory of 1504 1864 Purchase Order 781.exe vbc.exe PID 1864 wrote to memory of 1504 1864 Purchase Order 781.exe vbc.exe PID 1864 wrote to memory of 1504 1864 Purchase Order 781.exe vbc.exe PID 1864 wrote to memory of 1504 1864 Purchase Order 781.exe vbc.exe PID 1864 wrote to memory of 1504 1864 Purchase Order 781.exe vbc.exe PID 1864 wrote to memory of 1504 1864 Purchase Order 781.exe vbc.exe PID 1864 wrote to memory of 1504 1864 Purchase Order 781.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order 781.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order 781.exe"1⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1504