Analysis
-
max time kernel
151s -
max time network
79s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 15:52
Static task
static1
Behavioral task
behavioral1
Sample
7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe
Resource
win7-20220812-en
General
-
Target
7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe
-
Size
357KB
-
MD5
445b348512ff56a95b2912bec61dbdd1
-
SHA1
24eb3d44b8f192230cb8019ed0f606c6293751f8
-
SHA256
7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233
-
SHA512
575170a0e4af69dbed6423d4f8258d9cd0b23dfb78b17cf5ee447b1c653229fd0cdd73271c64669dcf40c6ca6ccb0ce410f8acf6d83a20c0a42081ba0319a8e7
-
SSDEEP
6144:pD2r5WlgraH6wd5CsZ28ewwGWIv4de+WYgblLSkbUg3/:pDA8lTa6CsErG+deizkv
Malware Config
Extracted
darkcomet
BENIN BOY
beninboy.no-ip.org:1605
DC_MUTEX-EK2Y453
-
gencode
FEc5UT8Bh8Yx
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1280 bootres.exe 1068 SharedReg.exe 1508 bootres.exe -
resource yara_rule behavioral1/memory/1724-57-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1724-59-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1724-60-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1724-62-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1724-64-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1724-66-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1724-67-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1724-73-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1724-82-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1256-102-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1280 bootres.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Boot Resource Library = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\bootres.exe" bootres.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Boot Resource Library = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\bootres.exe" bootres.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1964 set thread context of 1724 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 28 PID 1068 set thread context of 1256 1068 SharedReg.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1280 bootres.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1280 bootres.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1280 bootres.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1280 bootres.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1280 bootres.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1280 bootres.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1280 bootres.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1280 bootres.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1280 bootres.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1068 SharedReg.exe 1068 SharedReg.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1068 SharedReg.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1068 SharedReg.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1068 SharedReg.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1068 SharedReg.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 1068 SharedReg.exe 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeDebugPrivilege 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe Token: 33 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe Token: SeIncBasePriorityPrivilege 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe Token: SeIncreaseQuotaPrivilege 1724 AppLaunch.exe Token: SeSecurityPrivilege 1724 AppLaunch.exe Token: SeTakeOwnershipPrivilege 1724 AppLaunch.exe Token: SeLoadDriverPrivilege 1724 AppLaunch.exe Token: SeSystemProfilePrivilege 1724 AppLaunch.exe Token: SeSystemtimePrivilege 1724 AppLaunch.exe Token: SeProfSingleProcessPrivilege 1724 AppLaunch.exe Token: SeIncBasePriorityPrivilege 1724 AppLaunch.exe Token: SeCreatePagefilePrivilege 1724 AppLaunch.exe Token: SeBackupPrivilege 1724 AppLaunch.exe Token: SeRestorePrivilege 1724 AppLaunch.exe Token: SeShutdownPrivilege 1724 AppLaunch.exe Token: SeDebugPrivilege 1724 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 1724 AppLaunch.exe Token: SeChangeNotifyPrivilege 1724 AppLaunch.exe Token: SeRemoteShutdownPrivilege 1724 AppLaunch.exe Token: SeUndockPrivilege 1724 AppLaunch.exe Token: SeManageVolumePrivilege 1724 AppLaunch.exe Token: SeImpersonatePrivilege 1724 AppLaunch.exe Token: SeCreateGlobalPrivilege 1724 AppLaunch.exe Token: 33 1724 AppLaunch.exe Token: 34 1724 AppLaunch.exe Token: 35 1724 AppLaunch.exe Token: SeDebugPrivilege 1280 bootres.exe Token: SeDebugPrivilege 1068 SharedReg.exe Token: 33 1068 SharedReg.exe Token: SeIncBasePriorityPrivilege 1068 SharedReg.exe Token: SeDebugPrivilege 1508 bootres.exe Token: SeIncreaseQuotaPrivilege 1256 AppLaunch.exe Token: SeSecurityPrivilege 1256 AppLaunch.exe Token: SeTakeOwnershipPrivilege 1256 AppLaunch.exe Token: SeLoadDriverPrivilege 1256 AppLaunch.exe Token: SeSystemProfilePrivilege 1256 AppLaunch.exe Token: SeSystemtimePrivilege 1256 AppLaunch.exe Token: SeProfSingleProcessPrivilege 1256 AppLaunch.exe Token: SeIncBasePriorityPrivilege 1256 AppLaunch.exe Token: SeCreatePagefilePrivilege 1256 AppLaunch.exe Token: SeBackupPrivilege 1256 AppLaunch.exe Token: SeRestorePrivilege 1256 AppLaunch.exe Token: SeShutdownPrivilege 1256 AppLaunch.exe Token: SeDebugPrivilege 1256 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 1256 AppLaunch.exe Token: SeChangeNotifyPrivilege 1256 AppLaunch.exe Token: SeRemoteShutdownPrivilege 1256 AppLaunch.exe Token: SeUndockPrivilege 1256 AppLaunch.exe Token: SeManageVolumePrivilege 1256 AppLaunch.exe Token: SeImpersonatePrivilege 1256 AppLaunch.exe Token: SeCreateGlobalPrivilege 1256 AppLaunch.exe Token: 33 1256 AppLaunch.exe Token: 34 1256 AppLaunch.exe Token: 35 1256 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1724 AppLaunch.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1724 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 28 PID 1964 wrote to memory of 1724 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 28 PID 1964 wrote to memory of 1724 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 28 PID 1964 wrote to memory of 1724 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 28 PID 1964 wrote to memory of 1724 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 28 PID 1964 wrote to memory of 1724 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 28 PID 1964 wrote to memory of 1724 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 28 PID 1964 wrote to memory of 1724 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 28 PID 1964 wrote to memory of 1724 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 28 PID 1964 wrote to memory of 1724 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 28 PID 1964 wrote to memory of 1724 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 28 PID 1964 wrote to memory of 1280 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 29 PID 1964 wrote to memory of 1280 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 29 PID 1964 wrote to memory of 1280 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 29 PID 1964 wrote to memory of 1280 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 29 PID 1280 wrote to memory of 1068 1280 bootres.exe 30 PID 1280 wrote to memory of 1068 1280 bootres.exe 30 PID 1280 wrote to memory of 1068 1280 bootres.exe 30 PID 1280 wrote to memory of 1068 1280 bootres.exe 30 PID 1964 wrote to memory of 1508 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 31 PID 1964 wrote to memory of 1508 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 31 PID 1964 wrote to memory of 1508 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 31 PID 1964 wrote to memory of 1508 1964 7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe 31 PID 1068 wrote to memory of 1256 1068 SharedReg.exe 32 PID 1068 wrote to memory of 1256 1068 SharedReg.exe 32 PID 1068 wrote to memory of 1256 1068 SharedReg.exe 32 PID 1068 wrote to memory of 1256 1068 SharedReg.exe 32 PID 1068 wrote to memory of 1256 1068 SharedReg.exe 32 PID 1068 wrote to memory of 1256 1068 SharedReg.exe 32 PID 1068 wrote to memory of 1256 1068 SharedReg.exe 32 PID 1068 wrote to memory of 1256 1068 SharedReg.exe 32 PID 1068 wrote to memory of 1256 1068 SharedReg.exe 32 PID 1068 wrote to memory of 1256 1068 SharedReg.exe 32 PID 1068 wrote to memory of 1256 1068 SharedReg.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe"C:\Users\Admin\AppData\Local\Temp\7987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1724
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\bootres.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\bootres.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\SharedReg.exe"C:\Users\Admin\AppData\Local\Temp\SharedReg.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\bootres.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\bootres.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
357KB
MD5445b348512ff56a95b2912bec61dbdd1
SHA124eb3d44b8f192230cb8019ed0f606c6293751f8
SHA2567987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233
SHA512575170a0e4af69dbed6423d4f8258d9cd0b23dfb78b17cf5ee447b1c653229fd0cdd73271c64669dcf40c6ca6ccb0ce410f8acf6d83a20c0a42081ba0319a8e7
-
Filesize
357KB
MD5445b348512ff56a95b2912bec61dbdd1
SHA124eb3d44b8f192230cb8019ed0f606c6293751f8
SHA2567987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233
SHA512575170a0e4af69dbed6423d4f8258d9cd0b23dfb78b17cf5ee447b1c653229fd0cdd73271c64669dcf40c6ca6ccb0ce410f8acf6d83a20c0a42081ba0319a8e7
-
Filesize
7KB
MD52e74010faa0b3cc0ff1dcff309da03b3
SHA1a85388fc3bc465b67e3a5b0c1f2621954b5c62f8
SHA25671bad58cb9a8cc79ca7d5d97b9e68eafff79c65832ca94e3f010b475151f2b50
SHA51218984e9a9d8548d28793f865be88f377fb7439a73af06b1f18ed9af54e1e3bda98600effde306c1bc8c9300d839c3e58694e39587e42aa10e4f0db45d5653f08
-
Filesize
7KB
MD52e74010faa0b3cc0ff1dcff309da03b3
SHA1a85388fc3bc465b67e3a5b0c1f2621954b5c62f8
SHA25671bad58cb9a8cc79ca7d5d97b9e68eafff79c65832ca94e3f010b475151f2b50
SHA51218984e9a9d8548d28793f865be88f377fb7439a73af06b1f18ed9af54e1e3bda98600effde306c1bc8c9300d839c3e58694e39587e42aa10e4f0db45d5653f08
-
Filesize
7KB
MD52e74010faa0b3cc0ff1dcff309da03b3
SHA1a85388fc3bc465b67e3a5b0c1f2621954b5c62f8
SHA25671bad58cb9a8cc79ca7d5d97b9e68eafff79c65832ca94e3f010b475151f2b50
SHA51218984e9a9d8548d28793f865be88f377fb7439a73af06b1f18ed9af54e1e3bda98600effde306c1bc8c9300d839c3e58694e39587e42aa10e4f0db45d5653f08
-
Filesize
357KB
MD5445b348512ff56a95b2912bec61dbdd1
SHA124eb3d44b8f192230cb8019ed0f606c6293751f8
SHA2567987bf9d806353760c55ac04660ca64e7b229ad0610881c5897de6200d042233
SHA512575170a0e4af69dbed6423d4f8258d9cd0b23dfb78b17cf5ee447b1c653229fd0cdd73271c64669dcf40c6ca6ccb0ce410f8acf6d83a20c0a42081ba0319a8e7
-
Filesize
7KB
MD52e74010faa0b3cc0ff1dcff309da03b3
SHA1a85388fc3bc465b67e3a5b0c1f2621954b5c62f8
SHA25671bad58cb9a8cc79ca7d5d97b9e68eafff79c65832ca94e3f010b475151f2b50
SHA51218984e9a9d8548d28793f865be88f377fb7439a73af06b1f18ed9af54e1e3bda98600effde306c1bc8c9300d839c3e58694e39587e42aa10e4f0db45d5653f08