Analysis
-
max time kernel
150s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
22-11-2022 20:21
Static task
static1
Behavioral task
behavioral1
Sample
a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe
Resource
win10v2004-20221111-en
General
-
Target
a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe
-
Size
1.4MB
-
MD5
dc07030af6c807db6ffcb1eea9805846
-
SHA1
03a4f4daad133a8c3b1fd8297317df194a4d9184
-
SHA256
a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8
-
SHA512
91127b471c7620028dbbd220c6f7706a856827097158656b609a6cab5b10e553b9afff4f1bc3754e88bf4fc857e139e673e71d0a9fb2ba9a0c5216a69a2d2d15
-
SSDEEP
24576:x3Oqr/iK/TH5yHTtqaw/Kf9hoWSXBMo0xZUEKLolSuWDyDf02g+I7LEn/XD:9trKK/TH5yHTtqaOKfjVdo0tlRWDAk3Q
Malware Config
Extracted
darkcomet
Bot
sallad.chickenkiller.com:9331
DC_MUTEX-NTQ979W
-
gencode
3ngHr6j4cxcy
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\java.exe" a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe -
Executes dropped EXE 1 IoCs
Processes:
notepad .exepid process 468 notepad .exe -
Loads dropped DLL 1 IoCs
Processes:
a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exepid process 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exedescription pid process target process PID 1748 set thread context of 468 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe notepad .exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exepid process 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exenotepad .exedescription pid process Token: SeDebugPrivilege 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe Token: SeIncreaseQuotaPrivilege 468 notepad .exe Token: SeSecurityPrivilege 468 notepad .exe Token: SeTakeOwnershipPrivilege 468 notepad .exe Token: SeLoadDriverPrivilege 468 notepad .exe Token: SeSystemProfilePrivilege 468 notepad .exe Token: SeSystemtimePrivilege 468 notepad .exe Token: SeProfSingleProcessPrivilege 468 notepad .exe Token: SeIncBasePriorityPrivilege 468 notepad .exe Token: SeCreatePagefilePrivilege 468 notepad .exe Token: SeBackupPrivilege 468 notepad .exe Token: SeRestorePrivilege 468 notepad .exe Token: SeShutdownPrivilege 468 notepad .exe Token: SeDebugPrivilege 468 notepad .exe Token: SeSystemEnvironmentPrivilege 468 notepad .exe Token: SeChangeNotifyPrivilege 468 notepad .exe Token: SeRemoteShutdownPrivilege 468 notepad .exe Token: SeUndockPrivilege 468 notepad .exe Token: SeManageVolumePrivilege 468 notepad .exe Token: SeImpersonatePrivilege 468 notepad .exe Token: SeCreateGlobalPrivilege 468 notepad .exe Token: 33 468 notepad .exe Token: 34 468 notepad .exe Token: 35 468 notepad .exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
notepad .exepid process 468 notepad .exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.execmd.exewscript.exedescription pid process target process PID 1748 wrote to memory of 1316 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe cmd.exe PID 1748 wrote to memory of 1316 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe cmd.exe PID 1748 wrote to memory of 1316 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe cmd.exe PID 1748 wrote to memory of 1316 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe cmd.exe PID 1748 wrote to memory of 468 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe notepad .exe PID 1748 wrote to memory of 468 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe notepad .exe PID 1748 wrote to memory of 468 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe notepad .exe PID 1748 wrote to memory of 468 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe notepad .exe PID 1748 wrote to memory of 468 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe notepad .exe PID 1316 wrote to memory of 836 1316 cmd.exe wscript.exe PID 1316 wrote to memory of 836 1316 cmd.exe wscript.exe PID 1316 wrote to memory of 836 1316 cmd.exe wscript.exe PID 1316 wrote to memory of 836 1316 cmd.exe wscript.exe PID 1748 wrote to memory of 468 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe notepad .exe PID 1748 wrote to memory of 468 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe notepad .exe PID 1748 wrote to memory of 468 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe notepad .exe PID 1748 wrote to memory of 468 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe notepad .exe PID 1748 wrote to memory of 468 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe notepad .exe PID 1748 wrote to memory of 468 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe notepad .exe PID 1748 wrote to memory of 468 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe notepad .exe PID 1748 wrote to memory of 468 1748 a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe notepad .exe PID 836 wrote to memory of 1412 836 wscript.exe cmd.exe PID 836 wrote to memory of 1412 836 wscript.exe cmd.exe PID 836 wrote to memory of 1412 836 wscript.exe cmd.exe PID 836 wrote to memory of 1412 836 wscript.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe"C:\Users\Admin\AppData\Local\Temp\a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\\mata.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wscript.exewscript.exe "C:\Users\Admin\AppData\Roaming\invs.vbs" "C:\Users\Admin\AppData\Roaming\mata2.bat3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\mata2.bat" "4⤵
-
C:\Users\Admin\AppData\Roaming\notepad .exe"C:\Users\Admin\AppData\Roaming\notepad .exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\invs.vbsFilesize
78B
MD5c578d9653b22800c3eb6b6a51219bbb8
SHA1a97aa251901bbe179a48dbc7a0c1872e163b1f2d
SHA25620a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2
SHA5123ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d
-
C:\Users\Admin\AppData\Roaming\java.exeFilesize
1.4MB
MD5dc07030af6c807db6ffcb1eea9805846
SHA103a4f4daad133a8c3b1fd8297317df194a4d9184
SHA256a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8
SHA51291127b471c7620028dbbd220c6f7706a856827097158656b609a6cab5b10e553b9afff4f1bc3754e88bf4fc857e139e673e71d0a9fb2ba9a0c5216a69a2d2d15
-
C:\Users\Admin\AppData\Roaming\mata.batFilesize
53B
MD5f417bac860bfd32fbcceefb244bcbb87
SHA131a711807edad75399620a8b6f5da449c64723ef
SHA2567e80f3cbb012881bf931f99903be9dc541ea00f1173944390f35c17e83fc6068
SHA5129d904c40c37a136a6f658626abc068132f415edf4121d46c928e8d619981e5d0bdd7be2eddb5e27bffc311a1c0545ab10eb25af5477b423884b9ff2a612e10e3
-
C:\Users\Admin\AppData\Roaming\mata2.batFilesize
53B
MD5031605858c66d2561d6919500e5b4967
SHA19bcaba936b24fbc0b41fc1554a2a3f06bf10bd86
SHA256e30913fc4efecaa0864524b2b976bd920735babf6201bb719bf22235fa190e45
SHA5121f8538c572d7c83b99f4cbbcae6d56e752149b1f97014ae22d06d805e93a9fc338a94af1698731b2c193009fe012dd60531aa0cff869317fa4bcf9567cc5e362
-
C:\Users\Admin\AppData\Roaming\notepad .exeFilesize
54KB
MD50f01571a3e4c71eb4313175aae86488e
SHA12ba648afe2cd52edf5f25e304f77d457abf7ac0e
SHA2568cc51c4c2efc8c6a401aa83a0aeced0925d5d9d2a43192f35561893cdf704022
SHA512159dfbb7d385bf92f4fc48ca389b89d69f6c2616e90dfa056e725d7da78a3702694a28f9c5cab7b55adc4d4dbd7bfe5d272c8b1c9931e3ac95f6326d74576794
-
C:\Users\Admin\AppData\Roaming\notepad .exeFilesize
54KB
MD50f01571a3e4c71eb4313175aae86488e
SHA12ba648afe2cd52edf5f25e304f77d457abf7ac0e
SHA2568cc51c4c2efc8c6a401aa83a0aeced0925d5d9d2a43192f35561893cdf704022
SHA512159dfbb7d385bf92f4fc48ca389b89d69f6c2616e90dfa056e725d7da78a3702694a28f9c5cab7b55adc4d4dbd7bfe5d272c8b1c9931e3ac95f6326d74576794
-
C:\Users\Admin\AppData\Roaming\rundll11-.txtFilesize
1.4MB
MD5dc07030af6c807db6ffcb1eea9805846
SHA103a4f4daad133a8c3b1fd8297317df194a4d9184
SHA256a3c96604b01d189879f5076b3c94d0b10a19cd1a8e3e7935349c7036363b47b8
SHA51291127b471c7620028dbbd220c6f7706a856827097158656b609a6cab5b10e553b9afff4f1bc3754e88bf4fc857e139e673e71d0a9fb2ba9a0c5216a69a2d2d15
-
\Users\Admin\AppData\Roaming\notepad .exeFilesize
54KB
MD50f01571a3e4c71eb4313175aae86488e
SHA12ba648afe2cd52edf5f25e304f77d457abf7ac0e
SHA2568cc51c4c2efc8c6a401aa83a0aeced0925d5d9d2a43192f35561893cdf704022
SHA512159dfbb7d385bf92f4fc48ca389b89d69f6c2616e90dfa056e725d7da78a3702694a28f9c5cab7b55adc4d4dbd7bfe5d272c8b1c9931e3ac95f6326d74576794
-
memory/468-62-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/468-60-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/468-69-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/468-68-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/468-71-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/468-64-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/468-66-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/468-58-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/468-85-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/468-83-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/468-79-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/468-88-0x0000000000401000-0x000000000048F000-memory.dmpFilesize
568KB
-
memory/468-81-0x000000000048F888-mapping.dmp
-
memory/468-87-0x000000000048F000-0x0000000000491000-memory.dmpFilesize
8KB
-
memory/836-59-0x0000000000000000-mapping.dmp
-
memory/1316-55-0x0000000000000000-mapping.dmp
-
memory/1412-77-0x0000000000000000-mapping.dmp
-
memory/1748-75-0x0000000074C90000-0x000000007523B000-memory.dmpFilesize
5.7MB
-
memory/1748-80-0x0000000074C90000-0x000000007523B000-memory.dmpFilesize
5.7MB
-
memory/1748-54-0x0000000076191000-0x0000000076193000-memory.dmpFilesize
8KB
-
memory/1748-90-0x0000000074C90000-0x000000007523B000-memory.dmpFilesize
5.7MB