Analysis
-
max time kernel
153s -
max time network
181s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 00:14
Behavioral task
behavioral1
Sample
38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe
Resource
win7-20220718-en
General
-
Target
38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe
-
Size
283KB
-
MD5
a621055f753ae69983b149c494e24929
-
SHA1
c84337eb41ff9f6f9c2a999292db7e3066a379e3
-
SHA256
38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b
-
SHA512
5d1be5fb16549c3b120c6c7a20e3086c764ee9bdf4faad0d22875057193bcb1aded84147b32e00e8df95fcf3e2c0e8e2948a1bfaaef0aef4408f38172d400de8
Malware Config
Extracted
darkcomet
Guest16
IP: 95.153.133.216:1604
DC_MUTEX-0P8M51K
-
gencode
TGWq7XBoqMps
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe -
Processes:
38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe -
Drops file in Drivers directory 1 IoCs
Processes:
38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 1588 attrib.exe 1236 attrib.exe -
Processes:
resource yara_rule behavioral1/memory/2032-55-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2032-62-0x0000000000400000-0x00000000004C7000-memory.dmp upx -
Processes:
38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exepid process 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exedescription pid process Token: SeIncreaseQuotaPrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeSecurityPrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeTakeOwnershipPrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeLoadDriverPrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeSystemProfilePrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeSystemtimePrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeProfSingleProcessPrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeIncBasePriorityPrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeCreatePagefilePrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeBackupPrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeRestorePrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeShutdownPrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeDebugPrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeSystemEnvironmentPrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeChangeNotifyPrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeRemoteShutdownPrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeUndockPrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeManageVolumePrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeImpersonatePrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: SeCreateGlobalPrivilege 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: 33 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: 34 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Token: 35 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exepid process 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.execmd.execmd.exedescription pid process target process PID 2032 wrote to memory of 1604 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe cmd.exe PID 2032 wrote to memory of 1604 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe cmd.exe PID 2032 wrote to memory of 1604 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe cmd.exe PID 2032 wrote to memory of 1604 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe cmd.exe PID 2032 wrote to memory of 1452 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe cmd.exe PID 2032 wrote to memory of 1452 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe cmd.exe PID 2032 wrote to memory of 1452 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe cmd.exe PID 2032 wrote to memory of 1452 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe cmd.exe PID 1604 wrote to memory of 1588 1604 cmd.exe attrib.exe PID 1604 wrote to memory of 1588 1604 cmd.exe attrib.exe PID 1604 wrote to memory of 1588 1604 cmd.exe attrib.exe PID 1604 wrote to memory of 1588 1604 cmd.exe attrib.exe PID 1452 wrote to memory of 1236 1452 cmd.exe attrib.exe PID 1452 wrote to memory of 1236 1452 cmd.exe attrib.exe PID 1452 wrote to memory of 1236 1452 cmd.exe attrib.exe PID 1452 wrote to memory of 1236 1452 cmd.exe attrib.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe PID 2032 wrote to memory of 1764 2032 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe notepad.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" 38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 1588 attrib.exe 1236 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe"C:\Users\Admin\AppData\Local\Temp\38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe"1⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Windows security modification
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\38fe7ad463b1d9b9ac351df7e7669c31ec0a456aa941c3207c7cf5c0a6e3ad8b.exe" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1236-59-0x0000000000000000-mapping.dmp
-
memory/1452-57-0x0000000000000000-mapping.dmp
-
memory/1588-58-0x0000000000000000-mapping.dmp
-
memory/1604-56-0x0000000000000000-mapping.dmp
-
memory/1764-60-0x0000000000000000-mapping.dmp
-
memory/2032-54-0x0000000076071000-0x0000000076073000-memory.dmpFilesize
8KB
-
memory/2032-55-0x0000000000400000-0x00000000004C7000-memory.dmpFilesize
796KB
-
memory/2032-62-0x0000000000400000-0x00000000004C7000-memory.dmpFilesize
796KB