Analysis
-
max time kernel
153s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 14:47
Behavioral task
behavioral1
Sample
f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe
Resource
win7-20220812-en
General
-
Target
f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe
-
Size
251KB
-
MD5
849f77e376036b2381b3a0899c705d50
-
SHA1
bf22b89aa161759dd70f3944b2e99f850dfb02ee
-
SHA256
f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254
-
SHA512
ba43e3a9bf54f486f038bd30a11078ed21dd3ea6484d2d2e118895c4f53431b539bbb397138b22de2043277f303240fed021d9dfc7e5e48bbbf178c6acf67efe
-
SSDEEP
6144:/YcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37:wcW7KEZlPzCy37
Malware Config
Extracted
darkcomet
Test1
roguehack.no-ip.biz:70
DC_MUTEX-1V41W5P
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
o7XD3VtoPQi3
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 1132 msdcsc.exe -
Processes:
resource yara_rule behavioral1/memory/1112-54-0x0000000000400000-0x00000000004B7000-memory.dmp upx \Users\Admin\Documents\MSDCSC\msdcsc.exe upx \Users\Admin\Documents\MSDCSC\msdcsc.exe upx C:\Users\Admin\Documents\MSDCSC\msdcsc.exe upx behavioral1/memory/1132-62-0x0000000000400000-0x00000000004B7000-memory.dmp upx C:\Users\Admin\Documents\MSDCSC\msdcsc.exe upx behavioral1/memory/1112-64-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1132-65-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exepid process 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeSecurityPrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeTakeOwnershipPrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeLoadDriverPrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeSystemProfilePrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeSystemtimePrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeProfSingleProcessPrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeIncBasePriorityPrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeCreatePagefilePrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeBackupPrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeRestorePrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeShutdownPrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeDebugPrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeSystemEnvironmentPrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeChangeNotifyPrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeRemoteShutdownPrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeUndockPrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeManageVolumePrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeImpersonatePrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeCreateGlobalPrivilege 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: 33 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: 34 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: 35 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe Token: SeIncreaseQuotaPrivilege 1132 msdcsc.exe Token: SeSecurityPrivilege 1132 msdcsc.exe Token: SeTakeOwnershipPrivilege 1132 msdcsc.exe Token: SeLoadDriverPrivilege 1132 msdcsc.exe Token: SeSystemProfilePrivilege 1132 msdcsc.exe Token: SeSystemtimePrivilege 1132 msdcsc.exe Token: SeProfSingleProcessPrivilege 1132 msdcsc.exe Token: SeIncBasePriorityPrivilege 1132 msdcsc.exe Token: SeCreatePagefilePrivilege 1132 msdcsc.exe Token: SeBackupPrivilege 1132 msdcsc.exe Token: SeRestorePrivilege 1132 msdcsc.exe Token: SeShutdownPrivilege 1132 msdcsc.exe Token: SeDebugPrivilege 1132 msdcsc.exe Token: SeSystemEnvironmentPrivilege 1132 msdcsc.exe Token: SeChangeNotifyPrivilege 1132 msdcsc.exe Token: SeRemoteShutdownPrivilege 1132 msdcsc.exe Token: SeUndockPrivilege 1132 msdcsc.exe Token: SeManageVolumePrivilege 1132 msdcsc.exe Token: SeImpersonatePrivilege 1132 msdcsc.exe Token: SeCreateGlobalPrivilege 1132 msdcsc.exe Token: 33 1132 msdcsc.exe Token: 34 1132 msdcsc.exe Token: 35 1132 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msdcsc.exepid process 1132 msdcsc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exedescription pid process target process PID 1112 wrote to memory of 1132 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe msdcsc.exe PID 1112 wrote to memory of 1132 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe msdcsc.exe PID 1112 wrote to memory of 1132 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe msdcsc.exe PID 1112 wrote to memory of 1132 1112 f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe msdcsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe"C:\Users\Admin\AppData\Local\Temp\f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
251KB
MD5849f77e376036b2381b3a0899c705d50
SHA1bf22b89aa161759dd70f3944b2e99f850dfb02ee
SHA256f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254
SHA512ba43e3a9bf54f486f038bd30a11078ed21dd3ea6484d2d2e118895c4f53431b539bbb397138b22de2043277f303240fed021d9dfc7e5e48bbbf178c6acf67efe
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
251KB
MD5849f77e376036b2381b3a0899c705d50
SHA1bf22b89aa161759dd70f3944b2e99f850dfb02ee
SHA256f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254
SHA512ba43e3a9bf54f486f038bd30a11078ed21dd3ea6484d2d2e118895c4f53431b539bbb397138b22de2043277f303240fed021d9dfc7e5e48bbbf178c6acf67efe
-
\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
251KB
MD5849f77e376036b2381b3a0899c705d50
SHA1bf22b89aa161759dd70f3944b2e99f850dfb02ee
SHA256f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254
SHA512ba43e3a9bf54f486f038bd30a11078ed21dd3ea6484d2d2e118895c4f53431b539bbb397138b22de2043277f303240fed021d9dfc7e5e48bbbf178c6acf67efe
-
\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
251KB
MD5849f77e376036b2381b3a0899c705d50
SHA1bf22b89aa161759dd70f3944b2e99f850dfb02ee
SHA256f1969fe13d3943817a7514b0740252db27ee1519ac57388daaa712c04de35254
SHA512ba43e3a9bf54f486f038bd30a11078ed21dd3ea6484d2d2e118895c4f53431b539bbb397138b22de2043277f303240fed021d9dfc7e5e48bbbf178c6acf67efe
-
memory/1112-54-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1112-55-0x0000000075351000-0x0000000075353000-memory.dmpFilesize
8KB
-
memory/1112-61-0x0000000003280000-0x0000000003337000-memory.dmpFilesize
732KB
-
memory/1112-64-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1132-58-0x0000000000000000-mapping.dmp
-
memory/1132-62-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1132-65-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB