Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 00:51
Static task
static1
Behavioral task
behavioral1
Sample
1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe
Resource
win10v2004-20220812-en
General
-
Target
1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe
-
Size
952KB
-
MD5
0795df23de1c401e96a153b026ed8600
-
SHA1
b4e1861b4579634e16b4c93578176f336c7de5a2
-
SHA256
1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7
-
SHA512
099e715551d5ddd10b7a0e313e4c220396f360cf5cfed39922242fe38031efed4940ef524386582575f46a413f0ec27c69617298022f2bb3523ee1d005357e97
-
SSDEEP
12288:byyy7Z3z4I8NXOGjwwG/ZjXsAHHz79p9NM5Tz103j2CF4TxQUOfhVPOSAE//VAci:baCI2OewFJN4mkxyHnnew1SatLRzD
Malware Config
Extracted
darkcomet
010
shades.no-ip.org:1604
DC_MUTEX-DA5KEY9
-
gencode
vdj7j58DDDAn
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1996 micoffice.exe 428 micoffice.exe 1044 micoffice.exe -
resource yara_rule behavioral1/memory/1836-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1836-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1836-62-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1836-65-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1836-66-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1836-69-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1836-115-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/428-120-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/428-123-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 1836 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 1836 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 1836 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 1836 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 1836 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\msoffice = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftOffice\\micoffice.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1932 set thread context of 1836 1932 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 28 PID 1996 set thread context of 428 1996 micoffice.exe 33 PID 1996 set thread context of 1044 1996 micoffice.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1044 micoffice.exe Token: SeSecurityPrivilege 1044 micoffice.exe Token: SeTakeOwnershipPrivilege 1044 micoffice.exe Token: SeLoadDriverPrivilege 1044 micoffice.exe Token: SeSystemProfilePrivilege 1044 micoffice.exe Token: SeSystemtimePrivilege 1044 micoffice.exe Token: SeProfSingleProcessPrivilege 1044 micoffice.exe Token: SeIncBasePriorityPrivilege 1044 micoffice.exe Token: SeCreatePagefilePrivilege 1044 micoffice.exe Token: SeBackupPrivilege 1044 micoffice.exe Token: SeRestorePrivilege 1044 micoffice.exe Token: SeShutdownPrivilege 1044 micoffice.exe Token: SeDebugPrivilege 1044 micoffice.exe Token: SeSystemEnvironmentPrivilege 1044 micoffice.exe Token: SeChangeNotifyPrivilege 1044 micoffice.exe Token: SeRemoteShutdownPrivilege 1044 micoffice.exe Token: SeUndockPrivilege 1044 micoffice.exe Token: SeManageVolumePrivilege 1044 micoffice.exe Token: SeImpersonatePrivilege 1044 micoffice.exe Token: SeCreateGlobalPrivilege 1044 micoffice.exe Token: 33 1044 micoffice.exe Token: 34 1044 micoffice.exe Token: 35 1044 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe Token: SeDebugPrivilege 428 micoffice.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1932 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 1836 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 1996 micoffice.exe 428 micoffice.exe 1044 micoffice.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1836 1932 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 28 PID 1932 wrote to memory of 1836 1932 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 28 PID 1932 wrote to memory of 1836 1932 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 28 PID 1932 wrote to memory of 1836 1932 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 28 PID 1932 wrote to memory of 1836 1932 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 28 PID 1932 wrote to memory of 1836 1932 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 28 PID 1932 wrote to memory of 1836 1932 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 28 PID 1932 wrote to memory of 1836 1932 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 28 PID 1836 wrote to memory of 2036 1836 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 29 PID 1836 wrote to memory of 2036 1836 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 29 PID 1836 wrote to memory of 2036 1836 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 29 PID 1836 wrote to memory of 2036 1836 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 29 PID 2036 wrote to memory of 2040 2036 cmd.exe 31 PID 2036 wrote to memory of 2040 2036 cmd.exe 31 PID 2036 wrote to memory of 2040 2036 cmd.exe 31 PID 2036 wrote to memory of 2040 2036 cmd.exe 31 PID 1836 wrote to memory of 1996 1836 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 32 PID 1836 wrote to memory of 1996 1836 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 32 PID 1836 wrote to memory of 1996 1836 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 32 PID 1836 wrote to memory of 1996 1836 1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe 32 PID 1996 wrote to memory of 428 1996 micoffice.exe 33 PID 1996 wrote to memory of 428 1996 micoffice.exe 33 PID 1996 wrote to memory of 428 1996 micoffice.exe 33 PID 1996 wrote to memory of 428 1996 micoffice.exe 33 PID 1996 wrote to memory of 428 1996 micoffice.exe 33 PID 1996 wrote to memory of 428 1996 micoffice.exe 33 PID 1996 wrote to memory of 428 1996 micoffice.exe 33 PID 1996 wrote to memory of 428 1996 micoffice.exe 33 PID 1996 wrote to memory of 1044 1996 micoffice.exe 34 PID 1996 wrote to memory of 1044 1996 micoffice.exe 34 PID 1996 wrote to memory of 1044 1996 micoffice.exe 34 PID 1996 wrote to memory of 1044 1996 micoffice.exe 34 PID 1996 wrote to memory of 1044 1996 micoffice.exe 34 PID 1996 wrote to memory of 1044 1996 micoffice.exe 34 PID 1996 wrote to memory of 1044 1996 micoffice.exe 34 PID 1996 wrote to memory of 1044 1996 micoffice.exe 34 PID 1996 wrote to memory of 1044 1996 micoffice.exe 34 PID 1996 wrote to memory of 1044 1996 micoffice.exe 34 PID 1996 wrote to memory of 1044 1996 micoffice.exe 34 PID 1996 wrote to memory of 1044 1996 micoffice.exe 34 PID 1996 wrote to memory of 1044 1996 micoffice.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe"C:\Users\Admin\AppData\Local\Temp\1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe"C:\Users\Admin\AppData\Local\Temp\1dba91ed96b54ccb478d114990a4c7661b5e6b2be8ea8c6f180915aafcd1cdd7.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\NJHXV.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "msoffice" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe" /f4⤵
- Adds Run key to start application
PID:2040
-
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:428
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1044
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155B
MD5f07b93136766adced3c6f0d74d869da0
SHA1787c530f33687d758b41295e01d7a9a1bba3a467
SHA256cd603067047c028fe12d4b099d13b3681dd698d25bc32474184e9d8edd3ed701
SHA512050105a5f14939a37f653421b24959cc90cb082b20df5bb1a81335fd0ad5e70c740b43f1d6df0fc7324551425894668acc3af0c533c7d90ff149d84e844c2d10
-
Filesize
952KB
MD52601a063e79703ac7465bca851c732b7
SHA10e5207b496e2e6cede66f03ace6f2b9fd9826b50
SHA25646ac31f506ccc8b9b8c772de87aaa55808ab76d85f091bd796c03a1306d56d19
SHA5121c16bee8595e1610eb60f1b127524cbb6efd716572f0b53c1bf1b84932c35d710b550ab963d2cf28a0483b00233a2b523c8637dc1a1114802b8595dd83ca5064
-
Filesize
952KB
MD52601a063e79703ac7465bca851c732b7
SHA10e5207b496e2e6cede66f03ace6f2b9fd9826b50
SHA25646ac31f506ccc8b9b8c772de87aaa55808ab76d85f091bd796c03a1306d56d19
SHA5121c16bee8595e1610eb60f1b127524cbb6efd716572f0b53c1bf1b84932c35d710b550ab963d2cf28a0483b00233a2b523c8637dc1a1114802b8595dd83ca5064
-
Filesize
952KB
MD52601a063e79703ac7465bca851c732b7
SHA10e5207b496e2e6cede66f03ace6f2b9fd9826b50
SHA25646ac31f506ccc8b9b8c772de87aaa55808ab76d85f091bd796c03a1306d56d19
SHA5121c16bee8595e1610eb60f1b127524cbb6efd716572f0b53c1bf1b84932c35d710b550ab963d2cf28a0483b00233a2b523c8637dc1a1114802b8595dd83ca5064
-
Filesize
952KB
MD52601a063e79703ac7465bca851c732b7
SHA10e5207b496e2e6cede66f03ace6f2b9fd9826b50
SHA25646ac31f506ccc8b9b8c772de87aaa55808ab76d85f091bd796c03a1306d56d19
SHA5121c16bee8595e1610eb60f1b127524cbb6efd716572f0b53c1bf1b84932c35d710b550ab963d2cf28a0483b00233a2b523c8637dc1a1114802b8595dd83ca5064
-
Filesize
952KB
MD52601a063e79703ac7465bca851c732b7
SHA10e5207b496e2e6cede66f03ace6f2b9fd9826b50
SHA25646ac31f506ccc8b9b8c772de87aaa55808ab76d85f091bd796c03a1306d56d19
SHA5121c16bee8595e1610eb60f1b127524cbb6efd716572f0b53c1bf1b84932c35d710b550ab963d2cf28a0483b00233a2b523c8637dc1a1114802b8595dd83ca5064
-
Filesize
952KB
MD52601a063e79703ac7465bca851c732b7
SHA10e5207b496e2e6cede66f03ace6f2b9fd9826b50
SHA25646ac31f506ccc8b9b8c772de87aaa55808ab76d85f091bd796c03a1306d56d19
SHA5121c16bee8595e1610eb60f1b127524cbb6efd716572f0b53c1bf1b84932c35d710b550ab963d2cf28a0483b00233a2b523c8637dc1a1114802b8595dd83ca5064
-
Filesize
952KB
MD52601a063e79703ac7465bca851c732b7
SHA10e5207b496e2e6cede66f03ace6f2b9fd9826b50
SHA25646ac31f506ccc8b9b8c772de87aaa55808ab76d85f091bd796c03a1306d56d19
SHA5121c16bee8595e1610eb60f1b127524cbb6efd716572f0b53c1bf1b84932c35d710b550ab963d2cf28a0483b00233a2b523c8637dc1a1114802b8595dd83ca5064
-
Filesize
952KB
MD52601a063e79703ac7465bca851c732b7
SHA10e5207b496e2e6cede66f03ace6f2b9fd9826b50
SHA25646ac31f506ccc8b9b8c772de87aaa55808ab76d85f091bd796c03a1306d56d19
SHA5121c16bee8595e1610eb60f1b127524cbb6efd716572f0b53c1bf1b84932c35d710b550ab963d2cf28a0483b00233a2b523c8637dc1a1114802b8595dd83ca5064
-
Filesize
952KB
MD52601a063e79703ac7465bca851c732b7
SHA10e5207b496e2e6cede66f03ace6f2b9fd9826b50
SHA25646ac31f506ccc8b9b8c772de87aaa55808ab76d85f091bd796c03a1306d56d19
SHA5121c16bee8595e1610eb60f1b127524cbb6efd716572f0b53c1bf1b84932c35d710b550ab963d2cf28a0483b00233a2b523c8637dc1a1114802b8595dd83ca5064