Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe
Resource
win10v2004-20220901-en
General
-
Target
d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe
-
Size
800KB
-
MD5
962b6297bfe02e597197fc3d104558f0
-
SHA1
1cf73f2d2e62f6076466bc8dbeed93aaa44643ca
-
SHA256
d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f
-
SHA512
85d663827c02c509705e2a689bf520fdd0b82d68e2f3e9cf0fe9b1b239425685c37636ce9fc74412630b668dc80fba8a1c13dc7bbaec40af0bc90aade95616fb
-
SSDEEP
12288:qS1hFDxZFbhf3T/aBkuqyGunESWdXYwPaF4dDenvKv+Ie:1FPH7YkTvSWN5PI4M9I
Malware Config
Extracted
darkcomet
Guest16
185.84.181.81:100
DC_MUTEX-0DKXA0V
-
gencode
M5VVBQQEtzRs
-
install
false
-
offline_keylogger
true
-
persistence
false
Extracted
pony
http://lynch.herobo.com/pcss/gate.php
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 4424 #68858363.exe 1240 NcbService.exe 2344 BthHFSrv.exe 1012 #68858363.exe 992 NcbService.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation #68858363.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts #68858363.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook #68858363.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Load = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\NcbService.exe" NcbService.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2128 set thread context of 4480 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 89 PID 4424 set thread context of 1012 4424 #68858363.exe 94 PID 2344 set thread context of 1312 2344 BthHFSrv.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 1240 NcbService.exe 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 4424 #68858363.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 992 NcbService.exe 2344 BthHFSrv.exe 992 NcbService.exe 2344 BthHFSrv.exe 992 NcbService.exe 2344 BthHFSrv.exe 992 NcbService.exe 2344 BthHFSrv.exe 992 NcbService.exe 2344 BthHFSrv.exe 992 NcbService.exe 2344 BthHFSrv.exe 2344 BthHFSrv.exe 992 NcbService.exe 2344 BthHFSrv.exe 992 NcbService.exe 992 NcbService.exe 2344 BthHFSrv.exe 992 NcbService.exe 2344 BthHFSrv.exe 992 NcbService.exe 2344 BthHFSrv.exe 992 NcbService.exe 2344 BthHFSrv.exe 2344 BthHFSrv.exe 992 NcbService.exe 992 NcbService.exe 2344 BthHFSrv.exe 992 NcbService.exe 2344 BthHFSrv.exe 992 NcbService.exe 2344 BthHFSrv.exe 2344 BthHFSrv.exe 992 NcbService.exe 992 NcbService.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe Token: SeIncreaseQuotaPrivilege 4480 vbc.exe Token: SeSecurityPrivilege 4480 vbc.exe Token: SeTakeOwnershipPrivilege 4480 vbc.exe Token: SeLoadDriverPrivilege 4480 vbc.exe Token: SeSystemProfilePrivilege 4480 vbc.exe Token: SeSystemtimePrivilege 4480 vbc.exe Token: SeProfSingleProcessPrivilege 4480 vbc.exe Token: SeIncBasePriorityPrivilege 4480 vbc.exe Token: SeCreatePagefilePrivilege 4480 vbc.exe Token: SeBackupPrivilege 4480 vbc.exe Token: SeRestorePrivilege 4480 vbc.exe Token: SeShutdownPrivilege 4480 vbc.exe Token: SeDebugPrivilege 4480 vbc.exe Token: SeSystemEnvironmentPrivilege 4480 vbc.exe Token: SeChangeNotifyPrivilege 4480 vbc.exe Token: SeRemoteShutdownPrivilege 4480 vbc.exe Token: SeUndockPrivilege 4480 vbc.exe Token: SeManageVolumePrivilege 4480 vbc.exe Token: SeImpersonatePrivilege 4480 vbc.exe Token: SeCreateGlobalPrivilege 4480 vbc.exe Token: 33 4480 vbc.exe Token: 34 4480 vbc.exe Token: 35 4480 vbc.exe Token: 36 4480 vbc.exe Token: SeDebugPrivilege 1240 NcbService.exe Token: SeDebugPrivilege 4424 #68858363.exe Token: SeDebugPrivilege 2344 BthHFSrv.exe Token: SeImpersonatePrivilege 1012 #68858363.exe Token: SeTcbPrivilege 1012 #68858363.exe Token: SeChangeNotifyPrivilege 1012 #68858363.exe Token: SeCreateTokenPrivilege 1012 #68858363.exe Token: SeBackupPrivilege 1012 #68858363.exe Token: SeRestorePrivilege 1012 #68858363.exe Token: SeIncreaseQuotaPrivilege 1012 #68858363.exe Token: SeAssignPrimaryTokenPrivilege 1012 #68858363.exe Token: SeDebugPrivilege 992 NcbService.exe Token: SeImpersonatePrivilege 1012 #68858363.exe Token: SeTcbPrivilege 1012 #68858363.exe Token: SeChangeNotifyPrivilege 1012 #68858363.exe Token: SeCreateTokenPrivilege 1012 #68858363.exe Token: SeBackupPrivilege 1012 #68858363.exe Token: SeRestorePrivilege 1012 #68858363.exe Token: SeIncreaseQuotaPrivilege 1012 #68858363.exe Token: SeAssignPrimaryTokenPrivilege 1012 #68858363.exe Token: SeImpersonatePrivilege 1012 #68858363.exe Token: SeTcbPrivilege 1012 #68858363.exe Token: SeChangeNotifyPrivilege 1012 #68858363.exe Token: SeCreateTokenPrivilege 1012 #68858363.exe Token: SeBackupPrivilege 1012 #68858363.exe Token: SeRestorePrivilege 1012 #68858363.exe Token: SeIncreaseQuotaPrivilege 1012 #68858363.exe Token: SeAssignPrimaryTokenPrivilege 1012 #68858363.exe Token: SeImpersonatePrivilege 1012 #68858363.exe Token: SeTcbPrivilege 1012 #68858363.exe Token: SeChangeNotifyPrivilege 1012 #68858363.exe Token: SeCreateTokenPrivilege 1012 #68858363.exe Token: SeBackupPrivilege 1012 #68858363.exe Token: SeRestorePrivilege 1012 #68858363.exe Token: SeIncreaseQuotaPrivilege 1012 #68858363.exe Token: SeAssignPrimaryTokenPrivilege 1012 #68858363.exe Token: SeImpersonatePrivilege 1012 #68858363.exe Token: SeTcbPrivilege 1012 #68858363.exe Token: SeChangeNotifyPrivilege 1012 #68858363.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4480 vbc.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2128 wrote to memory of 4424 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 88 PID 2128 wrote to memory of 4424 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 88 PID 2128 wrote to memory of 4424 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 88 PID 2128 wrote to memory of 4480 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 89 PID 2128 wrote to memory of 4480 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 89 PID 2128 wrote to memory of 4480 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 89 PID 2128 wrote to memory of 4480 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 89 PID 2128 wrote to memory of 4480 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 89 PID 2128 wrote to memory of 4480 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 89 PID 2128 wrote to memory of 4480 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 89 PID 2128 wrote to memory of 4480 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 89 PID 2128 wrote to memory of 4480 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 89 PID 2128 wrote to memory of 4480 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 89 PID 2128 wrote to memory of 4480 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 89 PID 2128 wrote to memory of 4480 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 89 PID 2128 wrote to memory of 1240 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 90 PID 2128 wrote to memory of 1240 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 90 PID 2128 wrote to memory of 1240 2128 d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe 90 PID 1240 wrote to memory of 2344 1240 NcbService.exe 93 PID 1240 wrote to memory of 2344 1240 NcbService.exe 93 PID 1240 wrote to memory of 2344 1240 NcbService.exe 93 PID 4424 wrote to memory of 1012 4424 #68858363.exe 94 PID 4424 wrote to memory of 1012 4424 #68858363.exe 94 PID 4424 wrote to memory of 1012 4424 #68858363.exe 94 PID 4424 wrote to memory of 1012 4424 #68858363.exe 94 PID 4424 wrote to memory of 1012 4424 #68858363.exe 94 PID 4424 wrote to memory of 1012 4424 #68858363.exe 94 PID 4424 wrote to memory of 1012 4424 #68858363.exe 94 PID 4424 wrote to memory of 1012 4424 #68858363.exe 94 PID 4424 wrote to memory of 992 4424 #68858363.exe 96 PID 4424 wrote to memory of 992 4424 #68858363.exe 96 PID 4424 wrote to memory of 992 4424 #68858363.exe 96 PID 2344 wrote to memory of 1312 2344 BthHFSrv.exe 98 PID 2344 wrote to memory of 1312 2344 BthHFSrv.exe 98 PID 2344 wrote to memory of 1312 2344 BthHFSrv.exe 98 PID 2344 wrote to memory of 1312 2344 BthHFSrv.exe 98 PID 2344 wrote to memory of 1312 2344 BthHFSrv.exe 98 PID 2344 wrote to memory of 1312 2344 BthHFSrv.exe 98 PID 2344 wrote to memory of 1312 2344 BthHFSrv.exe 98 PID 2344 wrote to memory of 1312 2344 BthHFSrv.exe 98 PID 2344 wrote to memory of 1312 2344 BthHFSrv.exe 98 PID 2344 wrote to memory of 1312 2344 BthHFSrv.exe 98 PID 2344 wrote to memory of 1312 2344 BthHFSrv.exe 98 PID 2344 wrote to memory of 1312 2344 BthHFSrv.exe 98 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook #68858363.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe"C:\Users\Admin\AppData\Local\Temp\d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\Desktop\#68858363.exe"C:\Users\Admin\Desktop\#68858363.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\Desktop\#68858363.exe"C:\Users\Admin\Desktop\#68858363.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
PID:1012
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\NcbService.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\NcbService.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4480
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\NcbService.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\NcbService.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\BthHFSrv.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\BthHFSrv3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"4⤵PID:1312
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
404B
MD515b6596d028baa2a113143d1828bcc36
SHA1f1be43126c4e765fe499718c388823d44bf1fef1
SHA256529f9fde2234067382b4c6fb8e5aee49d8a8b1b85c82b0bdae425fa2a0264f75
SHA512f2a6cb8498f596c7bf9178ea32a245dbb3657f43a179f378ce952ce5cb8580810cd67ef1efb623bcf6cd796d74e2c9b7bc42cb8665ead397546ce3b400181e83
-
Filesize
800KB
MD5962b6297bfe02e597197fc3d104558f0
SHA11cf73f2d2e62f6076466bc8dbeed93aaa44643ca
SHA256d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f
SHA51285d663827c02c509705e2a689bf520fdd0b82d68e2f3e9cf0fe9b1b239425685c37636ce9fc74412630b668dc80fba8a1c13dc7bbaec40af0bc90aade95616fb
-
Filesize
800KB
MD5962b6297bfe02e597197fc3d104558f0
SHA11cf73f2d2e62f6076466bc8dbeed93aaa44643ca
SHA256d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f
SHA51285d663827c02c509705e2a689bf520fdd0b82d68e2f3e9cf0fe9b1b239425685c37636ce9fc74412630b668dc80fba8a1c13dc7bbaec40af0bc90aade95616fb
-
Filesize
9KB
MD548628262e75352bc581317d1a6c3a96d
SHA1fb09a89eb6e51aac584b3866f6be347e32c8651e
SHA256572f5216d3428ab7bdceb4761d7144bf9754f0b37dcad1f5c649b7220d464da8
SHA5124278fb2ce5523e2cc791c775886c8b0c0ed2417bb12f55445f61cd6520559ba2a929009b591aaafdb207e340bc63fecd8b33c10fe30f2d14d48e4c655f82aaf8
-
Filesize
9KB
MD548628262e75352bc581317d1a6c3a96d
SHA1fb09a89eb6e51aac584b3866f6be347e32c8651e
SHA256572f5216d3428ab7bdceb4761d7144bf9754f0b37dcad1f5c649b7220d464da8
SHA5124278fb2ce5523e2cc791c775886c8b0c0ed2417bb12f55445f61cd6520559ba2a929009b591aaafdb207e340bc63fecd8b33c10fe30f2d14d48e4c655f82aaf8
-
Filesize
9KB
MD548628262e75352bc581317d1a6c3a96d
SHA1fb09a89eb6e51aac584b3866f6be347e32c8651e
SHA256572f5216d3428ab7bdceb4761d7144bf9754f0b37dcad1f5c649b7220d464da8
SHA5124278fb2ce5523e2cc791c775886c8b0c0ed2417bb12f55445f61cd6520559ba2a929009b591aaafdb207e340bc63fecd8b33c10fe30f2d14d48e4c655f82aaf8
-
Filesize
9KB
MD548628262e75352bc581317d1a6c3a96d
SHA1fb09a89eb6e51aac584b3866f6be347e32c8651e
SHA256572f5216d3428ab7bdceb4761d7144bf9754f0b37dcad1f5c649b7220d464da8
SHA5124278fb2ce5523e2cc791c775886c8b0c0ed2417bb12f55445f61cd6520559ba2a929009b591aaafdb207e340bc63fecd8b33c10fe30f2d14d48e4c655f82aaf8
-
Filesize
252KB
MD5b5650bec1d01746d75e461ef2dc85630
SHA12ba8dc54781ae6b70c084eb799dce114ef861f4d
SHA2560647f8e4204684f97500ee4ac84e0e99d666b7f14aa199e5fc6427b6b39b0ea2
SHA51277ec6763d338cabff95835f6ca26d45c9ada0546cde8ce3a1a712aa13ce35b1773e0087cd9af9b73583eff70ab024a5d624b8394e55dbcdb4fa895bd1b23a6e3
-
Filesize
252KB
MD5b5650bec1d01746d75e461ef2dc85630
SHA12ba8dc54781ae6b70c084eb799dce114ef861f4d
SHA2560647f8e4204684f97500ee4ac84e0e99d666b7f14aa199e5fc6427b6b39b0ea2
SHA51277ec6763d338cabff95835f6ca26d45c9ada0546cde8ce3a1a712aa13ce35b1773e0087cd9af9b73583eff70ab024a5d624b8394e55dbcdb4fa895bd1b23a6e3
-
Filesize
252KB
MD5b5650bec1d01746d75e461ef2dc85630
SHA12ba8dc54781ae6b70c084eb799dce114ef861f4d
SHA2560647f8e4204684f97500ee4ac84e0e99d666b7f14aa199e5fc6427b6b39b0ea2
SHA51277ec6763d338cabff95835f6ca26d45c9ada0546cde8ce3a1a712aa13ce35b1773e0087cd9af9b73583eff70ab024a5d624b8394e55dbcdb4fa895bd1b23a6e3