Analysis
-
max time kernel
200s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 16:01
Behavioral task
behavioral1
Sample
764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe
Resource
win10v2004-20220812-en
General
-
Target
764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe
-
Size
658KB
-
MD5
0674a60816e7162d22f1832b3df30b31
-
SHA1
d750d65c5d9765c0bfacb9a1b57858661315acdc
-
SHA256
764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed
-
SHA512
dea1a1a449314d41436a56e1fe0d1fcc787eb930cb3389828b8364c1a426cd1505bdeb1e404522501f177aecd45f02376ca2310a0468eaf98ae1d7eadd478426
-
SSDEEP
12288:S9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hV:+Z1xuVVjfFoynPaVBUR8f+kN10EBz
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-DC6HLND
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
PPwM5rwApZoL
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe -
Executes dropped EXE 1 IoCs
pid Process 3772 msdcsc.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeSecurityPrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeTakeOwnershipPrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeLoadDriverPrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeSystemProfilePrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeSystemtimePrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeProfSingleProcessPrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeIncBasePriorityPrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeCreatePagefilePrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeBackupPrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeRestorePrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeShutdownPrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeDebugPrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeSystemEnvironmentPrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeChangeNotifyPrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeRemoteShutdownPrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeUndockPrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeManageVolumePrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeImpersonatePrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeCreateGlobalPrivilege 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: 33 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: 34 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: 35 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: 36 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe Token: SeIncreaseQuotaPrivilege 3772 msdcsc.exe Token: SeSecurityPrivilege 3772 msdcsc.exe Token: SeTakeOwnershipPrivilege 3772 msdcsc.exe Token: SeLoadDriverPrivilege 3772 msdcsc.exe Token: SeSystemProfilePrivilege 3772 msdcsc.exe Token: SeSystemtimePrivilege 3772 msdcsc.exe Token: SeProfSingleProcessPrivilege 3772 msdcsc.exe Token: SeIncBasePriorityPrivilege 3772 msdcsc.exe Token: SeCreatePagefilePrivilege 3772 msdcsc.exe Token: SeBackupPrivilege 3772 msdcsc.exe Token: SeRestorePrivilege 3772 msdcsc.exe Token: SeShutdownPrivilege 3772 msdcsc.exe Token: SeDebugPrivilege 3772 msdcsc.exe Token: SeSystemEnvironmentPrivilege 3772 msdcsc.exe Token: SeChangeNotifyPrivilege 3772 msdcsc.exe Token: SeRemoteShutdownPrivilege 3772 msdcsc.exe Token: SeUndockPrivilege 3772 msdcsc.exe Token: SeManageVolumePrivilege 3772 msdcsc.exe Token: SeImpersonatePrivilege 3772 msdcsc.exe Token: SeCreateGlobalPrivilege 3772 msdcsc.exe Token: 33 3772 msdcsc.exe Token: 34 3772 msdcsc.exe Token: 35 3772 msdcsc.exe Token: 36 3772 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3772 msdcsc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3772 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe 80 PID 2100 wrote to memory of 3772 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe 80 PID 2100 wrote to memory of 3772 2100 764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe 80 PID 3772 wrote to memory of 2200 3772 msdcsc.exe 81 PID 3772 wrote to memory of 2200 3772 msdcsc.exe 81 PID 3772 wrote to memory of 2200 3772 msdcsc.exe 81 PID 3772 wrote to memory of 4440 3772 msdcsc.exe 82 PID 3772 wrote to memory of 4440 3772 msdcsc.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe"C:\Users\Admin\AppData\Local\Temp\764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:2200
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵PID:4440
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
658KB
MD50674a60816e7162d22f1832b3df30b31
SHA1d750d65c5d9765c0bfacb9a1b57858661315acdc
SHA256764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed
SHA512dea1a1a449314d41436a56e1fe0d1fcc787eb930cb3389828b8364c1a426cd1505bdeb1e404522501f177aecd45f02376ca2310a0468eaf98ae1d7eadd478426
-
Filesize
658KB
MD50674a60816e7162d22f1832b3df30b31
SHA1d750d65c5d9765c0bfacb9a1b57858661315acdc
SHA256764e86db668d28c9c0f5a599eb703fe2c9ff967c6239417d04fbc0442b9cf4ed
SHA512dea1a1a449314d41436a56e1fe0d1fcc787eb930cb3389828b8364c1a426cd1505bdeb1e404522501f177aecd45f02376ca2310a0468eaf98ae1d7eadd478426