Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 20:11
Static task
static1
Behavioral task
behavioral1
Sample
5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe
Resource
win10v2004-20220721-en
General
-
Target
5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe
-
Size
831KB
-
MD5
8c47d220c6f5462e850bc975b7b3250a
-
SHA1
be17048d36e5759ac477c48bcc00834f987daf0c
-
SHA256
5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989
-
SHA512
f913467a56df8ad018b86f113b4d0da5d51bcc3c4337b2cfad6afd2091dc8f096225284f46f1f8373e22be7ecaf1063f5ea8bdcc109a9f14e42691c29392bd87
Malware Config
Extracted
darkcomet
Crypt
BiNC.no-ip.biz:1604
DC_MUTEX-0GJMXZ4
-
gencode
MALR2k7k9YBe
-
install
false
-
offline_keylogger
false
-
persistence
false
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Local\\Temp\\file.exe" 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exedescription pid process target process PID 1824 set thread context of 1932 1824 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1932 set thread context of 820 1932 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exedescription pid process Token: SeIncreaseQuotaPrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeSecurityPrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeTakeOwnershipPrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeLoadDriverPrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeSystemProfilePrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeSystemtimePrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeProfSingleProcessPrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeIncBasePriorityPrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeCreatePagefilePrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeBackupPrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeRestorePrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeShutdownPrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeDebugPrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeSystemEnvironmentPrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeChangeNotifyPrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeRemoteShutdownPrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeUndockPrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeManageVolumePrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeImpersonatePrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: SeCreateGlobalPrivilege 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: 33 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: 34 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe Token: 35 820 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exedescription pid process target process PID 1824 wrote to memory of 1932 1824 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1824 wrote to memory of 1932 1824 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1824 wrote to memory of 1932 1824 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1824 wrote to memory of 1932 1824 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1824 wrote to memory of 1932 1824 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1824 wrote to memory of 1932 1824 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1824 wrote to memory of 1932 1824 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1824 wrote to memory of 1932 1824 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1824 wrote to memory of 1932 1824 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1824 wrote to memory of 1932 1824 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1824 wrote to memory of 1932 1824 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1932 wrote to memory of 820 1932 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1932 wrote to memory of 820 1932 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1932 wrote to memory of 820 1932 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1932 wrote to memory of 820 1932 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1932 wrote to memory of 820 1932 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1932 wrote to memory of 820 1932 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1932 wrote to memory of 820 1932 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1932 wrote to memory of 820 1932 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1932 wrote to memory of 820 1932 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1932 wrote to memory of 820 1932 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1932 wrote to memory of 820 1932 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1932 wrote to memory of 820 1932 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe PID 1932 wrote to memory of 820 1932 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe 5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe"C:\Users\Admin\AppData\Local\Temp\5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe"C:\Users\Admin\AppData\Local\Temp\5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe"C:\Users\Admin\AppData\Local\Temp\5e7890cdd80b87072615fe92c2d46af7b8a3f15e81310e13678f2cd78530f989.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/820-81-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/820-82-0x000000000048F888-mapping.dmp
-
memory/820-70-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/820-88-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/820-72-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/820-87-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/820-86-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/820-74-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/820-84-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/820-79-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/820-67-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/820-68-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/820-77-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/820-76-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1932-63-0x0000000000401110-mapping.dmp
-
memory/1932-59-0x0000000000400000-0x00000000004AC000-memory.dmpFilesize
688KB
-
memory/1932-57-0x0000000000400000-0x00000000004AC000-memory.dmpFilesize
688KB
-
memory/1932-65-0x0000000075741000-0x0000000075743000-memory.dmpFilesize
8KB
-
memory/1932-54-0x0000000000400000-0x00000000004AC000-memory.dmpFilesize
688KB
-
memory/1932-55-0x0000000000400000-0x00000000004AC000-memory.dmpFilesize
688KB
-
memory/1932-83-0x0000000000400000-0x00000000004AC000-memory.dmpFilesize
688KB
-
memory/1932-66-0x0000000000400000-0x00000000004AC000-memory.dmpFilesize
688KB
-
memory/1932-62-0x0000000000400000-0x00000000004AC000-memory.dmpFilesize
688KB
-
memory/1932-60-0x0000000000400000-0x00000000004AC000-memory.dmpFilesize
688KB
-
memory/1932-58-0x0000000000400000-0x00000000004AC000-memory.dmpFilesize
688KB