Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 23:39
Behavioral task
behavioral1
Sample
96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe
Resource
win7-20220812-en
General
-
Target
96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe
-
Size
436KB
-
MD5
68921ea14e8cdfc8f8775263632802a0
-
SHA1
12b5d5437cf20e1eba91826bec9411b0c69098ff
-
SHA256
96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171
-
SHA512
8161a10dc45457c5050623e10d2169725607285b480e42c9bb5c15110289991bdb28ec9cad86e42f95d3db3a1d21dfdc08d525e9258f4183482cbf9fe130f61d
-
SSDEEP
12288:GcW7KEZlPzCy37oStLov/v6AYYYYYYYYYYYRYYYYYYYYYYL:KKiRzC0hsDYYYYYYYYYYYRYYYYYYYYYY
Malware Config
Extracted
darkcomet
Guest16
cybergatenou4r.zapto.org:1604
DC_MUTEX-Z78F0FY
-
InstallPath
explorer\update.exe
-
gencode
iggsNm91khSs
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
update
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\INetCookies\\explorer\\update.exe" 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4912 attrib.exe 3436 attrib.exe -
resource yara_rule behavioral2/memory/1868-132-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/1868-137-0x0000000000400000-0x0000000000513000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\update = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\INetCookies\\explorer\\update.exe" 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeSecurityPrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeTakeOwnershipPrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeLoadDriverPrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeSystemProfilePrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeSystemtimePrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeProfSingleProcessPrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeIncBasePriorityPrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeCreatePagefilePrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeBackupPrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeRestorePrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeShutdownPrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeDebugPrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeSystemEnvironmentPrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeChangeNotifyPrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeRemoteShutdownPrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeUndockPrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeManageVolumePrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeImpersonatePrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: SeCreateGlobalPrivilege 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: 33 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: 34 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: 35 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe Token: 36 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1868 wrote to memory of 5052 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe 81 PID 1868 wrote to memory of 5052 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe 81 PID 1868 wrote to memory of 5052 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe 81 PID 1868 wrote to memory of 4772 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe 83 PID 1868 wrote to memory of 4772 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe 83 PID 1868 wrote to memory of 4772 1868 96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe 83 PID 5052 wrote to memory of 4912 5052 cmd.exe 85 PID 5052 wrote to memory of 4912 5052 cmd.exe 85 PID 5052 wrote to memory of 4912 5052 cmd.exe 85 PID 4772 wrote to memory of 3436 4772 cmd.exe 86 PID 4772 wrote to memory of 3436 4772 cmd.exe 86 PID 4772 wrote to memory of 3436 4772 cmd.exe 86 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4912 attrib.exe 3436 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe"C:\Users\Admin\AppData\Local\Temp\96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\96fa2d60fb2e27d71fd21d7bebb2cdaf0f650ed3683ae829d6b17a19c1ec2171.exe" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4912
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3436
-
-