Analysis

  • max time kernel
    174s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 06:50

General

  • Target

    918ab61f99a66af67e75300e4fb5b58fe6547bab2d5468cc57dc7a2146b40c59.exe

  • Size

    1.3MB

  • MD5

    5b4676c83b81c115e4213863027a8cd8

  • SHA1

    c6ce3d2675c4fb5e160976ed0c1ee0ac7fdfda15

  • SHA256

    918ab61f99a66af67e75300e4fb5b58fe6547bab2d5468cc57dc7a2146b40c59

  • SHA512

    5799829fe0fc921fa91f93573d5ddfb155ab04541260a3b864e9cc68dc6512c1fe348f844cac6db09e5666efcb540efb1a3f65d93677aedbade888196d87261d

  • SSDEEP

    24576:PHwF8vrx52t07FQaWZ1xuVVjfFoynPaVBUR8f+kN10EBCvzR:PQF8vrYaKamQDgok30/bR

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

big_hacker.no-ip.biz:76

Mutex

DC_MUTEX-6MQJ6G6

Attributes
  • InstallPath

    SYS32\sys32.exe

  • gencode

    V9HSzMovyRBL

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Extracted

Family

cybergate

Version

v3.4.2.2

Botnet

remote

C2

miecrosoft.servehttp.com:81

bighacker.no-ip.biz:99

Mutex

BD8K6YUOG4TT2Q

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    nividia

  • install_file

    nividia

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Executes dropped EXE 5 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2080
      • C:\Users\Admin\AppData\Local\Temp\918ab61f99a66af67e75300e4fb5b58fe6547bab2d5468cc57dc7a2146b40c59.exe
        "C:\Users\Admin\AppData\Local\Temp\918ab61f99a66af67e75300e4fb5b58fe6547bab2d5468cc57dc7a2146b40c59.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:2076
        • C:\Users\Admin\AppData\Local\Temp\vbscrypter.exe
          "C:\Users\Admin\AppData\Local\Temp\vbscrypter.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:4220
        • C:\Users\Admin\AppData\Local\Temp\WindowsAppl.exe
          "C:\Users\Admin\AppData\Local\Temp\WindowsAppl.exe"
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:3756
          • C:\Users\Admin\AppData\Local\Temp\fierfox.exe
            "C:\Users\Admin\AppData\Local\Temp\fierfox.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Executes dropped EXE
            • Checks computer location settings
            • Adds Run key to start application
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4884
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\fierfox.exe" +s +h
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4656
              • C:\Windows\SysWOW64\attrib.exe
                attrib "C:\Users\Admin\AppData\Local\Temp\fierfox.exe" +s +h
                6⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:1420
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2136
              • C:\Windows\SysWOW64\attrib.exe
                attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
                6⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:3444
            • C:\Windows\SysWOW64\notepad.exe
              notepad
              5⤵
                PID:360
              • C:\Windows\SysWOW64\SYS32\sys32.exe
                "C:\Windows\system32\SYS32\sys32.exe"
                5⤵
                • Modifies firewall policy service
                • Modifies security service
                • Windows security bypass
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Windows security modification
                • Adds Run key to start application
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:4268
                • C:\Windows\SysWOW64\notepad.exe
                  notepad
                  6⤵
                    PID:3336
              • C:\Users\Admin\AppData\Local\Temp\chrome.exe
                "C:\Users\Admin\AppData\Local\Temp\chrome.exe"
                4⤵
                • Executes dropped EXE
                • Drops file in Windows directory
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of WriteProcessMemory
                PID:1280
                • C:\Windows\SysWOW64\explorer.exe
                  explorer.exe
                  5⤵
                    PID:2092
                  • C:\Windows\SysWOW64\explorer.exe
                    explorer.exe
                    5⤵
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4336
          • C:\Windows\system32\OpenWith.exe
            C:\Windows\system32\OpenWith.exe -Embedding
            1⤵
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:3000

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Admin2.txt

            Filesize

            385KB

            MD5

            03d55ecd6eb57a1de0d261ab7ee41460

            SHA1

            eeb888ef8ef6800415cbb302256c99610e56300d

            SHA256

            5aa449ee4c92b0312d3bd089972221eac72494a3e3573f70b979ef8cae1709fc

            SHA512

            0d8bae16676154d53064154bc9d8328f87c8681cd68fe9944bb240675ad32a079b8d061860a22f497a4c0536e5a7baaec68de299e013397d7da6e49ae945a52c

          • C:\Users\Admin\AppData\Local\Temp\WindowsAppl.exe

            Filesize

            1.2MB

            MD5

            ec2436cd141afa1fb1a976b12d98a17c

            SHA1

            eeda63b952abf0ff06199d56f6ca36c240672eaf

            SHA256

            d4253b5d58810e94776eb97a578fd08f93e3460bd46e0f2989cc547a7a2fa438

            SHA512

            8b500deb12ed76ca69725de19dccb822a2456ab18f5e6b5b50ea2f0a0a32ec5429b3345845a81bdb7b88e2e6c66cf8826c8d521139173900eb4234228fda0991

          • C:\Users\Admin\AppData\Local\Temp\WindowsAppl.exe

            Filesize

            1.2MB

            MD5

            ec2436cd141afa1fb1a976b12d98a17c

            SHA1

            eeda63b952abf0ff06199d56f6ca36c240672eaf

            SHA256

            d4253b5d58810e94776eb97a578fd08f93e3460bd46e0f2989cc547a7a2fa438

            SHA512

            8b500deb12ed76ca69725de19dccb822a2456ab18f5e6b5b50ea2f0a0a32ec5429b3345845a81bdb7b88e2e6c66cf8826c8d521139173900eb4234228fda0991

          • C:\Users\Admin\AppData\Local\Temp\chrome.exe

            Filesize

            428KB

            MD5

            eebc420cdfa5e8a6b663d7032adbe569

            SHA1

            64e9b38db2eaed74df3f7d975e550594df7b1da6

            SHA256

            bb7dc63ad0715b29d4bf954cc5109481fbe8a70215d6b823c45a93db715eafa1

            SHA512

            07ecd024c7f30a986bff8ae873cb56034df4c387494acce991db7455e184440aa721e388331a4577a8b6a91e17fa4a8d95467b26bee9af6fc1a27e30b16edcce

          • C:\Users\Admin\AppData\Local\Temp\chrome.exe

            Filesize

            428KB

            MD5

            eebc420cdfa5e8a6b663d7032adbe569

            SHA1

            64e9b38db2eaed74df3f7d975e550594df7b1da6

            SHA256

            bb7dc63ad0715b29d4bf954cc5109481fbe8a70215d6b823c45a93db715eafa1

            SHA512

            07ecd024c7f30a986bff8ae873cb56034df4c387494acce991db7455e184440aa721e388331a4577a8b6a91e17fa4a8d95467b26bee9af6fc1a27e30b16edcce

          • C:\Users\Admin\AppData\Local\Temp\fierfox.exe

            Filesize

            756KB

            MD5

            11a4ea02e9db2d59618022a89e7d4863

            SHA1

            b9bdc077d33f7b445c6b5c94913be96943fd0471

            SHA256

            f139f9a6b690c47787a94aea90464ddb14a97c92a99a4e280aa9236e3356a438

            SHA512

            98e9ef6a6b311784c3cd8f45b2b05920821324fa6df99f959627f6a03a8648b69ad7e5cc99619008ab51aa54e0f62a8fec4410657abce2d5ee9ca58e0a62a948

          • C:\Users\Admin\AppData\Local\Temp\fierfox.exe

            Filesize

            756KB

            MD5

            11a4ea02e9db2d59618022a89e7d4863

            SHA1

            b9bdc077d33f7b445c6b5c94913be96943fd0471

            SHA256

            f139f9a6b690c47787a94aea90464ddb14a97c92a99a4e280aa9236e3356a438

            SHA512

            98e9ef6a6b311784c3cd8f45b2b05920821324fa6df99f959627f6a03a8648b69ad7e5cc99619008ab51aa54e0f62a8fec4410657abce2d5ee9ca58e0a62a948

          • C:\Users\Admin\AppData\Local\Temp\vbscrypter.exe

            Filesize

            76KB

            MD5

            0618322a26c6c68013ea3f725c0f7a9e

            SHA1

            fbe56f43c0038b5471a41a082342326bd7858e8b

            SHA256

            2ae474ec4240e9b148ba065a9fa8c35183091753607d14de357c11f445c3f7cb

            SHA512

            117040e3c16d2ea60b75c843480c79e5821f3933a63ae2de518b5d6e302c6f71d0420167c7be902dab8e24b3e9d541d53ff6d5728f6af93066f005ab09ebdc5b

          • C:\Users\Admin\AppData\Local\Temp\vbscrypter.exe

            Filesize

            76KB

            MD5

            0618322a26c6c68013ea3f725c0f7a9e

            SHA1

            fbe56f43c0038b5471a41a082342326bd7858e8b

            SHA256

            2ae474ec4240e9b148ba065a9fa8c35183091753607d14de357c11f445c3f7cb

            SHA512

            117040e3c16d2ea60b75c843480c79e5821f3933a63ae2de518b5d6e302c6f71d0420167c7be902dab8e24b3e9d541d53ff6d5728f6af93066f005ab09ebdc5b

          • C:\Windows\SysWOW64\SYS32\sys32.exe

            Filesize

            756KB

            MD5

            11a4ea02e9db2d59618022a89e7d4863

            SHA1

            b9bdc077d33f7b445c6b5c94913be96943fd0471

            SHA256

            f139f9a6b690c47787a94aea90464ddb14a97c92a99a4e280aa9236e3356a438

            SHA512

            98e9ef6a6b311784c3cd8f45b2b05920821324fa6df99f959627f6a03a8648b69ad7e5cc99619008ab51aa54e0f62a8fec4410657abce2d5ee9ca58e0a62a948

          • C:\Windows\SysWOW64\SYS32\sys32.exe

            Filesize

            756KB

            MD5

            11a4ea02e9db2d59618022a89e7d4863

            SHA1

            b9bdc077d33f7b445c6b5c94913be96943fd0471

            SHA256

            f139f9a6b690c47787a94aea90464ddb14a97c92a99a4e280aa9236e3356a438

            SHA512

            98e9ef6a6b311784c3cd8f45b2b05920821324fa6df99f959627f6a03a8648b69ad7e5cc99619008ab51aa54e0f62a8fec4410657abce2d5ee9ca58e0a62a948

          • C:\Windows\nividia\nividia

            Filesize

            428KB

            MD5

            eebc420cdfa5e8a6b663d7032adbe569

            SHA1

            64e9b38db2eaed74df3f7d975e550594df7b1da6

            SHA256

            bb7dc63ad0715b29d4bf954cc5109481fbe8a70215d6b823c45a93db715eafa1

            SHA512

            07ecd024c7f30a986bff8ae873cb56034df4c387494acce991db7455e184440aa721e388331a4577a8b6a91e17fa4a8d95467b26bee9af6fc1a27e30b16edcce

          • memory/360-155-0x0000000000000000-mapping.dmp

          • memory/1280-168-0x0000000010480000-0x00000000104F0000-memory.dmp

            Filesize

            448KB

          • memory/1280-150-0x0000000000000000-mapping.dmp

          • memory/1280-177-0x00000000104F0000-0x0000000010560000-memory.dmp

            Filesize

            448KB

          • memory/1280-162-0x0000000010410000-0x0000000010480000-memory.dmp

            Filesize

            448KB

          • memory/1420-156-0x0000000000000000-mapping.dmp

          • memory/2076-134-0x0000000005E00000-0x00000000063A4000-memory.dmp

            Filesize

            5.6MB

          • memory/2076-136-0x0000000005730000-0x000000000573A000-memory.dmp

            Filesize

            40KB

          • memory/2076-133-0x00000000057B0000-0x000000000584C000-memory.dmp

            Filesize

            624KB

          • memory/2076-137-0x00000000059E0000-0x0000000005A36000-memory.dmp

            Filesize

            344KB

          • memory/2076-132-0x0000000000D80000-0x0000000000ED2000-memory.dmp

            Filesize

            1.3MB

          • memory/2076-135-0x0000000005850000-0x00000000058E2000-memory.dmp

            Filesize

            584KB

          • memory/2092-174-0x0000000010480000-0x00000000104F0000-memory.dmp

            Filesize

            448KB

          • memory/2092-167-0x0000000000000000-mapping.dmp

          • memory/2092-171-0x0000000010480000-0x00000000104F0000-memory.dmp

            Filesize

            448KB

          • memory/2136-154-0x0000000000000000-mapping.dmp

          • memory/3336-165-0x0000000000000000-mapping.dmp

          • memory/3444-157-0x0000000000000000-mapping.dmp

          • memory/3756-142-0x0000000000000000-mapping.dmp

          • memory/3756-146-0x0000000000580000-0x00000000006B6000-memory.dmp

            Filesize

            1.2MB

          • memory/4220-138-0x0000000000000000-mapping.dmp

          • memory/4268-158-0x0000000000000000-mapping.dmp

          • memory/4336-176-0x0000000000000000-mapping.dmp

          • memory/4336-180-0x00000000104F0000-0x0000000010560000-memory.dmp

            Filesize

            448KB

          • memory/4336-181-0x00000000104F0000-0x0000000010560000-memory.dmp

            Filesize

            448KB

          • memory/4336-182-0x00000000104F0000-0x0000000010560000-memory.dmp

            Filesize

            448KB

          • memory/4656-153-0x0000000000000000-mapping.dmp

          • memory/4884-147-0x0000000000000000-mapping.dmp