Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe
Resource
win10v2004-20220812-en
General
-
Target
0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe
-
Size
381KB
-
MD5
096ba81061b9b3b7936a4bd0dfb4c4aa
-
SHA1
2fe63a93896d34bf9d99a5ff0463b64df7bca0cf
-
SHA256
0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7
-
SHA512
900c3708d10901b510cc17c818db33000e439e17c9c653d9cad4bd26eefe884d3a1e007991ba563eda7b0da820f4e14d123e07480dd9818d6ee873b2ac5835fe
-
SSDEEP
6144:Gsf/8tS6zpoyWktBnmYAlcw0hvd96/LM69hMNyJwOf:GsX8AYFTtBmYKcD196/oySNyqOf
Malware Config
Extracted
darkcomet
CC
212.7.192.244:1337
DC_MUTEX-8DTXF5E
-
gencode
lN8zNVYPTGKV
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 684 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 952 tap.exe 584 tap.exe -
resource yara_rule behavioral1/memory/684-60-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/684-62-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/684-63-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/684-67-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/684-68-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/684-69-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/684-73-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1712-99-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/1712-102-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/1712-103-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/1712-106-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/684-108-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/584-110-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1712-111-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/1712-112-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/1712-114-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/584-115-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1712-116-0x0000000000400000-0x00000000004BB000-memory.dmp upx -
Loads dropped DLL 6 IoCs
pid Process 752 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 684 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 684 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 684 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 684 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 684 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\TapNet = "C:\\Users\\Admin\\AppData\\Roaming\\tapinterface\\tap.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 752 set thread context of 684 752 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 28 PID 952 set thread context of 584 952 tap.exe 33 PID 952 set thread context of 1712 952 tap.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 752 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe Token: SeShutdownPrivilege 752 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe Token: SeShutdownPrivilege 752 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe Token: SeShutdownPrivilege 752 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe Token: SeShutdownPrivilege 752 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe Token: SeShutdownPrivilege 752 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe Token: SeShutdownPrivilege 952 tap.exe Token: SeShutdownPrivilege 952 tap.exe Token: SeShutdownPrivilege 952 tap.exe Token: SeShutdownPrivilege 952 tap.exe Token: SeShutdownPrivilege 952 tap.exe Token: SeShutdownPrivilege 952 tap.exe Token: SeIncreaseQuotaPrivilege 1712 svchost.exe Token: SeSecurityPrivilege 1712 svchost.exe Token: SeTakeOwnershipPrivilege 1712 svchost.exe Token: SeLoadDriverPrivilege 1712 svchost.exe Token: SeSystemProfilePrivilege 1712 svchost.exe Token: SeSystemtimePrivilege 1712 svchost.exe Token: SeProfSingleProcessPrivilege 1712 svchost.exe Token: SeIncBasePriorityPrivilege 1712 svchost.exe Token: SeCreatePagefilePrivilege 1712 svchost.exe Token: SeBackupPrivilege 1712 svchost.exe Token: SeRestorePrivilege 1712 svchost.exe Token: SeShutdownPrivilege 1712 svchost.exe Token: SeDebugPrivilege 1712 svchost.exe Token: SeSystemEnvironmentPrivilege 1712 svchost.exe Token: SeChangeNotifyPrivilege 1712 svchost.exe Token: SeRemoteShutdownPrivilege 1712 svchost.exe Token: SeUndockPrivilege 1712 svchost.exe Token: SeManageVolumePrivilege 1712 svchost.exe Token: SeImpersonatePrivilege 1712 svchost.exe Token: SeCreateGlobalPrivilege 1712 svchost.exe Token: 33 1712 svchost.exe Token: 34 1712 svchost.exe Token: 35 1712 svchost.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe Token: SeDebugPrivilege 584 tap.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 752 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 684 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 952 tap.exe 584 tap.exe 1712 svchost.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 752 wrote to memory of 684 752 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 28 PID 752 wrote to memory of 684 752 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 28 PID 752 wrote to memory of 684 752 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 28 PID 752 wrote to memory of 684 752 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 28 PID 752 wrote to memory of 684 752 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 28 PID 752 wrote to memory of 684 752 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 28 PID 752 wrote to memory of 684 752 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 28 PID 752 wrote to memory of 684 752 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 28 PID 684 wrote to memory of 1748 684 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 29 PID 684 wrote to memory of 1748 684 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 29 PID 684 wrote to memory of 1748 684 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 29 PID 684 wrote to memory of 1748 684 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 29 PID 1748 wrote to memory of 956 1748 cmd.exe 31 PID 1748 wrote to memory of 956 1748 cmd.exe 31 PID 1748 wrote to memory of 956 1748 cmd.exe 31 PID 1748 wrote to memory of 956 1748 cmd.exe 31 PID 684 wrote to memory of 952 684 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 32 PID 684 wrote to memory of 952 684 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 32 PID 684 wrote to memory of 952 684 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 32 PID 684 wrote to memory of 952 684 0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe 32 PID 952 wrote to memory of 584 952 tap.exe 33 PID 952 wrote to memory of 584 952 tap.exe 33 PID 952 wrote to memory of 584 952 tap.exe 33 PID 952 wrote to memory of 584 952 tap.exe 33 PID 952 wrote to memory of 584 952 tap.exe 33 PID 952 wrote to memory of 584 952 tap.exe 33 PID 952 wrote to memory of 584 952 tap.exe 33 PID 952 wrote to memory of 584 952 tap.exe 33 PID 952 wrote to memory of 1712 952 tap.exe 34 PID 952 wrote to memory of 1712 952 tap.exe 34 PID 952 wrote to memory of 1712 952 tap.exe 34 PID 952 wrote to memory of 1712 952 tap.exe 34 PID 952 wrote to memory of 1712 952 tap.exe 34 PID 952 wrote to memory of 1712 952 tap.exe 34 PID 952 wrote to memory of 1712 952 tap.exe 34 PID 952 wrote to memory of 1712 952 tap.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe"C:\Users\Admin\AppData\Local\Temp\0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe"C:\Users\Admin\AppData\Local\Temp\0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\XVUYL.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "TapNet" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\tapinterface\tap.exe" /f4⤵
- Adds Run key to start application
PID:956
-
-
-
C:\Users\Admin\AppData\Roaming\tapinterface\tap.exe"C:\Users\Admin\AppData\Roaming\tapinterface\tap.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Roaming\tapinterface\tap.exe"C:\Users\Admin\AppData\Roaming\tapinterface\tap.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:584
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1712
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe
Filesize381KB
MD5096ba81061b9b3b7936a4bd0dfb4c4aa
SHA12fe63a93896d34bf9d99a5ff0463b64df7bca0cf
SHA2560a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7
SHA512900c3708d10901b510cc17c818db33000e439e17c9c653d9cad4bd26eefe884d3a1e007991ba563eda7b0da820f4e14d123e07480dd9818d6ee873b2ac5835fe
-
Filesize
144B
MD5517aa80e282d1f1a3ea764d1a5f32ed8
SHA1990331d6b551d436d81f5aac0914b7ed7fa51136
SHA256fc1c4d0d8ea5d27476e23c49b7dacd40cd9dac4763303ad838774984a2bdc81d
SHA512caf370281540e19a15ac5a44204788525fb181f714bf396af2fc3f717e80c132e55e0a0db82e230c8469c29c3ab49f3a697dbb85141201405334b5420540abc7
-
Filesize
381KB
MD537e5f85a00103f12fe599b63b482c184
SHA10f23c5f894f8c8e17c97013a44648c3b6edd1345
SHA2560923743bbf216a4cebb7c4eb636d7c0d51c2076451b0b9de594c8c5802804848
SHA5121d892f40f04d4193465a0821ea2bd86b351a08a8e50f6f1871a7dff035744bfc41dc671f0a16b6e19765c374a64808fb19e90c0b5246b25be489672f17719c0e
-
Filesize
381KB
MD537e5f85a00103f12fe599b63b482c184
SHA10f23c5f894f8c8e17c97013a44648c3b6edd1345
SHA2560923743bbf216a4cebb7c4eb636d7c0d51c2076451b0b9de594c8c5802804848
SHA5121d892f40f04d4193465a0821ea2bd86b351a08a8e50f6f1871a7dff035744bfc41dc671f0a16b6e19765c374a64808fb19e90c0b5246b25be489672f17719c0e
-
Filesize
381KB
MD537e5f85a00103f12fe599b63b482c184
SHA10f23c5f894f8c8e17c97013a44648c3b6edd1345
SHA2560923743bbf216a4cebb7c4eb636d7c0d51c2076451b0b9de594c8c5802804848
SHA5121d892f40f04d4193465a0821ea2bd86b351a08a8e50f6f1871a7dff035744bfc41dc671f0a16b6e19765c374a64808fb19e90c0b5246b25be489672f17719c0e
-
\Users\Admin\AppData\Local\Temp\0a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7.exe
Filesize381KB
MD5096ba81061b9b3b7936a4bd0dfb4c4aa
SHA12fe63a93896d34bf9d99a5ff0463b64df7bca0cf
SHA2560a906f93430bea742fa7b463f5c44fd59359641b8ff7ffd17fad0aee6956d9f7
SHA512900c3708d10901b510cc17c818db33000e439e17c9c653d9cad4bd26eefe884d3a1e007991ba563eda7b0da820f4e14d123e07480dd9818d6ee873b2ac5835fe
-
Filesize
381KB
MD537e5f85a00103f12fe599b63b482c184
SHA10f23c5f894f8c8e17c97013a44648c3b6edd1345
SHA2560923743bbf216a4cebb7c4eb636d7c0d51c2076451b0b9de594c8c5802804848
SHA5121d892f40f04d4193465a0821ea2bd86b351a08a8e50f6f1871a7dff035744bfc41dc671f0a16b6e19765c374a64808fb19e90c0b5246b25be489672f17719c0e
-
Filesize
381KB
MD537e5f85a00103f12fe599b63b482c184
SHA10f23c5f894f8c8e17c97013a44648c3b6edd1345
SHA2560923743bbf216a4cebb7c4eb636d7c0d51c2076451b0b9de594c8c5802804848
SHA5121d892f40f04d4193465a0821ea2bd86b351a08a8e50f6f1871a7dff035744bfc41dc671f0a16b6e19765c374a64808fb19e90c0b5246b25be489672f17719c0e
-
Filesize
381KB
MD537e5f85a00103f12fe599b63b482c184
SHA10f23c5f894f8c8e17c97013a44648c3b6edd1345
SHA2560923743bbf216a4cebb7c4eb636d7c0d51c2076451b0b9de594c8c5802804848
SHA5121d892f40f04d4193465a0821ea2bd86b351a08a8e50f6f1871a7dff035744bfc41dc671f0a16b6e19765c374a64808fb19e90c0b5246b25be489672f17719c0e
-
Filesize
381KB
MD537e5f85a00103f12fe599b63b482c184
SHA10f23c5f894f8c8e17c97013a44648c3b6edd1345
SHA2560923743bbf216a4cebb7c4eb636d7c0d51c2076451b0b9de594c8c5802804848
SHA5121d892f40f04d4193465a0821ea2bd86b351a08a8e50f6f1871a7dff035744bfc41dc671f0a16b6e19765c374a64808fb19e90c0b5246b25be489672f17719c0e
-
Filesize
381KB
MD537e5f85a00103f12fe599b63b482c184
SHA10f23c5f894f8c8e17c97013a44648c3b6edd1345
SHA2560923743bbf216a4cebb7c4eb636d7c0d51c2076451b0b9de594c8c5802804848
SHA5121d892f40f04d4193465a0821ea2bd86b351a08a8e50f6f1871a7dff035744bfc41dc671f0a16b6e19765c374a64808fb19e90c0b5246b25be489672f17719c0e