Analysis
-
max time kernel
143s -
max time network
188s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 22:56
Static task
static1
Behavioral task
behavioral1
Sample
5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe
Resource
win10v2004-20220721-en
General
-
Target
5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe
-
Size
782KB
-
MD5
80b7945f8e8fcdd55b75e1473ea4427b
-
SHA1
7b233834a7fd5a1263fc354f7e8c2258f5a75e66
-
SHA256
5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9
-
SHA512
0f25181af50d9e7ddfcc734ed876447eeea0f5be4c1dc6fdcd097784673915ce3fb6830ba22a87fc50bff2711af1d3f03d56d2eb1c8c6b78cec5e4291671bc6c
Malware Config
Extracted
darkcomet
Hacked
185.24.233.5:2014
DCMIN_MUTEX-FQ792JQ
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
z0xXl46NUTbS
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
DarkComet RAT
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\DCSCMIN\\IMDCSC.exe" 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe -
Executes dropped EXE 2 IoCs
Processes:
IMDCSC.exeIMDCSC.exepid process 1972 IMDCSC.exe 268 IMDCSC.exe -
Loads dropped DLL 2 IoCs
Processes:
5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exepid process 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\DarkComet RAT = "C:\\Users\\Admin\\Documents\\DCSCMIN\\IMDCSC.exe" 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exeIMDCSC.exedescription pid process target process PID 1652 set thread context of 2032 1652 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe PID 1972 set thread context of 268 1972 IMDCSC.exe IMDCSC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exeIMDCSC.exedescription pid process Token: SeIncreaseQuotaPrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeSecurityPrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeTakeOwnershipPrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeLoadDriverPrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeSystemProfilePrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeSystemtimePrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeProfSingleProcessPrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeIncBasePriorityPrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeCreatePagefilePrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeBackupPrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeRestorePrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeShutdownPrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeDebugPrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeSystemEnvironmentPrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeChangeNotifyPrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeRemoteShutdownPrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeUndockPrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeManageVolumePrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeImpersonatePrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeCreateGlobalPrivilege 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: 33 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: 34 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: 35 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe Token: SeIncreaseQuotaPrivilege 268 IMDCSC.exe Token: SeSecurityPrivilege 268 IMDCSC.exe Token: SeTakeOwnershipPrivilege 268 IMDCSC.exe Token: SeLoadDriverPrivilege 268 IMDCSC.exe Token: SeSystemProfilePrivilege 268 IMDCSC.exe Token: SeSystemtimePrivilege 268 IMDCSC.exe Token: SeProfSingleProcessPrivilege 268 IMDCSC.exe Token: SeIncBasePriorityPrivilege 268 IMDCSC.exe Token: SeCreatePagefilePrivilege 268 IMDCSC.exe Token: SeBackupPrivilege 268 IMDCSC.exe Token: SeRestorePrivilege 268 IMDCSC.exe Token: SeShutdownPrivilege 268 IMDCSC.exe Token: SeDebugPrivilege 268 IMDCSC.exe Token: SeSystemEnvironmentPrivilege 268 IMDCSC.exe Token: SeChangeNotifyPrivilege 268 IMDCSC.exe Token: SeRemoteShutdownPrivilege 268 IMDCSC.exe Token: SeUndockPrivilege 268 IMDCSC.exe Token: SeManageVolumePrivilege 268 IMDCSC.exe Token: SeImpersonatePrivilege 268 IMDCSC.exe Token: SeCreateGlobalPrivilege 268 IMDCSC.exe Token: 33 268 IMDCSC.exe Token: 34 268 IMDCSC.exe Token: 35 268 IMDCSC.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exeIMDCSC.exeIMDCSC.exepid process 1652 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 1972 IMDCSC.exe 268 IMDCSC.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exeIMDCSC.exedescription pid process target process PID 1652 wrote to memory of 2032 1652 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe PID 1652 wrote to memory of 2032 1652 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe PID 1652 wrote to memory of 2032 1652 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe PID 1652 wrote to memory of 2032 1652 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe PID 1652 wrote to memory of 2032 1652 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe PID 1652 wrote to memory of 2032 1652 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe PID 1652 wrote to memory of 2032 1652 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe PID 1652 wrote to memory of 2032 1652 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe PID 1652 wrote to memory of 2032 1652 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe PID 1652 wrote to memory of 2032 1652 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe PID 1652 wrote to memory of 2032 1652 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe PID 1652 wrote to memory of 2032 1652 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe PID 1652 wrote to memory of 2032 1652 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe PID 1652 wrote to memory of 2032 1652 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe PID 1652 wrote to memory of 2032 1652 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe PID 2032 wrote to memory of 1972 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe IMDCSC.exe PID 2032 wrote to memory of 1972 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe IMDCSC.exe PID 2032 wrote to memory of 1972 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe IMDCSC.exe PID 2032 wrote to memory of 1972 2032 5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe IMDCSC.exe PID 1972 wrote to memory of 268 1972 IMDCSC.exe IMDCSC.exe PID 1972 wrote to memory of 268 1972 IMDCSC.exe IMDCSC.exe PID 1972 wrote to memory of 268 1972 IMDCSC.exe IMDCSC.exe PID 1972 wrote to memory of 268 1972 IMDCSC.exe IMDCSC.exe PID 1972 wrote to memory of 268 1972 IMDCSC.exe IMDCSC.exe PID 1972 wrote to memory of 268 1972 IMDCSC.exe IMDCSC.exe PID 1972 wrote to memory of 268 1972 IMDCSC.exe IMDCSC.exe PID 1972 wrote to memory of 268 1972 IMDCSC.exe IMDCSC.exe PID 1972 wrote to memory of 268 1972 IMDCSC.exe IMDCSC.exe PID 1972 wrote to memory of 268 1972 IMDCSC.exe IMDCSC.exe PID 1972 wrote to memory of 268 1972 IMDCSC.exe IMDCSC.exe PID 1972 wrote to memory of 268 1972 IMDCSC.exe IMDCSC.exe PID 1972 wrote to memory of 268 1972 IMDCSC.exe IMDCSC.exe PID 1972 wrote to memory of 268 1972 IMDCSC.exe IMDCSC.exe PID 1972 wrote to memory of 268 1972 IMDCSC.exe IMDCSC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe"C:\Users\Admin\AppData\Local\Temp\5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe"C:\Users\Admin\AppData\Local\Temp\5d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exeFilesize
782KB
MD580b7945f8e8fcdd55b75e1473ea4427b
SHA17b233834a7fd5a1263fc354f7e8c2258f5a75e66
SHA2565d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9
SHA5120f25181af50d9e7ddfcc734ed876447eeea0f5be4c1dc6fdcd097784673915ce3fb6830ba22a87fc50bff2711af1d3f03d56d2eb1c8c6b78cec5e4291671bc6c
-
C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exeFilesize
782KB
MD580b7945f8e8fcdd55b75e1473ea4427b
SHA17b233834a7fd5a1263fc354f7e8c2258f5a75e66
SHA2565d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9
SHA5120f25181af50d9e7ddfcc734ed876447eeea0f5be4c1dc6fdcd097784673915ce3fb6830ba22a87fc50bff2711af1d3f03d56d2eb1c8c6b78cec5e4291671bc6c
-
C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exeFilesize
782KB
MD580b7945f8e8fcdd55b75e1473ea4427b
SHA17b233834a7fd5a1263fc354f7e8c2258f5a75e66
SHA2565d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9
SHA5120f25181af50d9e7ddfcc734ed876447eeea0f5be4c1dc6fdcd097784673915ce3fb6830ba22a87fc50bff2711af1d3f03d56d2eb1c8c6b78cec5e4291671bc6c
-
\Users\Admin\Documents\DCSCMIN\IMDCSC.exeFilesize
782KB
MD580b7945f8e8fcdd55b75e1473ea4427b
SHA17b233834a7fd5a1263fc354f7e8c2258f5a75e66
SHA2565d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9
SHA5120f25181af50d9e7ddfcc734ed876447eeea0f5be4c1dc6fdcd097784673915ce3fb6830ba22a87fc50bff2711af1d3f03d56d2eb1c8c6b78cec5e4291671bc6c
-
\Users\Admin\Documents\DCSCMIN\IMDCSC.exeFilesize
782KB
MD580b7945f8e8fcdd55b75e1473ea4427b
SHA17b233834a7fd5a1263fc354f7e8c2258f5a75e66
SHA2565d9c62bdcbf7ef67f96af6286601d2a37c04912e7461cc3e00522c1c812e24d9
SHA5120f25181af50d9e7ddfcc734ed876447eeea0f5be4c1dc6fdcd097784673915ce3fb6830ba22a87fc50bff2711af1d3f03d56d2eb1c8c6b78cec5e4291671bc6c
-
memory/268-80-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/268-79-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/268-73-0x000000000048F888-mapping.dmp
-
memory/1652-61-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/1652-56-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/1972-66-0x0000000000000000-mapping.dmp
-
memory/1972-70-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/1972-76-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/2032-63-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2032-62-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2032-59-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2032-60-0x00000000756C1000-0x00000000756C3000-memory.dmpFilesize
8KB
-
memory/2032-58-0x000000000048F888-mapping.dmp
-
memory/2032-57-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB