Analysis
-
max time kernel
167s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:42
Static task
static1
Behavioral task
behavioral1
Sample
f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe
Resource
win10v2004-20220812-en
General
-
Target
f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe
-
Size
954KB
-
MD5
1989705ebd2e4250af7f90216e0b1ec3
-
SHA1
07d63a38c3ba1265c18eff3593d208a48c766ff6
-
SHA256
f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166
-
SHA512
f8c983bd3f6b477fdfdd0ffd2e5c1504083caa5cff498fd2c8c507b91bb1f34c1cfa01264a49bda7c51d8b1ced2d6dab5234a6bad989280c3ca18528f4d4e704
-
SSDEEP
12288:n1Gsn5jbJn7vuxMnkawkE7ydj4+7VupWhnLMN+vt9StL5wwTsUkLhDUKH/AJ:ssfLuxgiL7ydx7fIN+vS9IUkLVUKH/A
Malware Config
Extracted
darkcomet
BILLY
withgod.hopper.pw:5666
DC_MUTEX-MTS57PW
-
gencode
FQhcDlPXsfbe
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Aint-botkiller = "C:\\Users\\Admin\\AppData\\Roaming\\HJUutrhd.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exedescription pid process target process PID 1380 set thread context of 5008 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe applaunch.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exepid process 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
Processes:
f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exeapplaunch.exedescription pid process Token: SeDebugPrivilege 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe Token: SeIncreaseQuotaPrivilege 5008 applaunch.exe Token: SeSecurityPrivilege 5008 applaunch.exe Token: SeTakeOwnershipPrivilege 5008 applaunch.exe Token: SeLoadDriverPrivilege 5008 applaunch.exe Token: SeSystemProfilePrivilege 5008 applaunch.exe Token: SeSystemtimePrivilege 5008 applaunch.exe Token: SeProfSingleProcessPrivilege 5008 applaunch.exe Token: SeIncBasePriorityPrivilege 5008 applaunch.exe Token: SeCreatePagefilePrivilege 5008 applaunch.exe Token: SeBackupPrivilege 5008 applaunch.exe Token: SeRestorePrivilege 5008 applaunch.exe Token: SeShutdownPrivilege 5008 applaunch.exe Token: SeDebugPrivilege 5008 applaunch.exe Token: SeSystemEnvironmentPrivilege 5008 applaunch.exe Token: SeChangeNotifyPrivilege 5008 applaunch.exe Token: SeRemoteShutdownPrivilege 5008 applaunch.exe Token: SeUndockPrivilege 5008 applaunch.exe Token: SeManageVolumePrivilege 5008 applaunch.exe Token: SeImpersonatePrivilege 5008 applaunch.exe Token: SeCreateGlobalPrivilege 5008 applaunch.exe Token: 33 5008 applaunch.exe Token: 34 5008 applaunch.exe Token: 35 5008 applaunch.exe Token: 36 5008 applaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
applaunch.exepid process 5008 applaunch.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.execsc.execmd.exedescription pid process target process PID 1380 wrote to memory of 792 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe csc.exe PID 1380 wrote to memory of 792 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe csc.exe PID 1380 wrote to memory of 792 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe csc.exe PID 792 wrote to memory of 4660 792 csc.exe cvtres.exe PID 792 wrote to memory of 4660 792 csc.exe cvtres.exe PID 792 wrote to memory of 4660 792 csc.exe cvtres.exe PID 1380 wrote to memory of 5008 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe applaunch.exe PID 1380 wrote to memory of 5008 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe applaunch.exe PID 1380 wrote to memory of 5008 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe applaunch.exe PID 1380 wrote to memory of 5008 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe applaunch.exe PID 1380 wrote to memory of 5008 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe applaunch.exe PID 1380 wrote to memory of 5008 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe applaunch.exe PID 1380 wrote to memory of 5008 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe applaunch.exe PID 1380 wrote to memory of 5008 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe applaunch.exe PID 1380 wrote to memory of 5008 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe applaunch.exe PID 1380 wrote to memory of 5008 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe applaunch.exe PID 1380 wrote to memory of 5008 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe applaunch.exe PID 1380 wrote to memory of 5008 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe applaunch.exe PID 1380 wrote to memory of 5008 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe applaunch.exe PID 1380 wrote to memory of 5008 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe applaunch.exe PID 1380 wrote to memory of 4828 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe cmd.exe PID 1380 wrote to memory of 4828 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe cmd.exe PID 1380 wrote to memory of 4828 1380 f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe cmd.exe PID 4828 wrote to memory of 2896 4828 cmd.exe reg.exe PID 4828 wrote to memory of 2896 4828 cmd.exe reg.exe PID 4828 wrote to memory of 2896 4828 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe"C:\Users\Admin\AppData\Local\Temp\f53947b5df2c10ef35d22e6fca08f9028fe1ff56a5adac17e6b457af3a347166.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dipazz16.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF33F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF33E.tmp"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Aint-botkiller" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\HJUutrhd.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Aint-botkiller" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\HJUutrhd.exe3⤵
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RESF33F.tmpFilesize
1KB
MD57756c25def240e0f6eca5a85270fa2b4
SHA1a8616339ce5dceeb5da81fdecbee7eb59c8ffc39
SHA256b4ff6f5549180944143ceb7a9215c00f0765c7b4e86d15bd55b2bb3814ccda80
SHA51293539f873ea0989d5b94843b3b84755a00b83d1bca3b630e81f172a8e01283ac5b8cb3c06af101bb3dde29770ab3605434ebf1b82487de9f7cc8d36031092419
-
C:\Users\Admin\AppData\Local\Temp\dipazz16.dllFilesize
1.3MB
MD5e61cc6944d62363b82162c8bec3135e9
SHA16f2edad059b4399a1489317518886cb6363290c4
SHA25605cc38a25c063ae22b21a810758e192c2b71330224cc15b6a866825234555966
SHA51260b7ef31627344570c75446aba55c0e7c58b69cceb359bd28ab61eb5a7f8f1e243eb60cff189392d077a640f01a08db596fb14e464204b0319ea6d54babbbbd0
-
\??\c:\Users\Admin\AppData\Local\Temp\CSCF33E.tmpFilesize
652B
MD517fe15ae6e1385cb3747b2f64a7a1d08
SHA1809271dd07721e3c7f0d08428a0522e0ceb12610
SHA256ad662685a85c99a2b0864c542864be35984f8a051c4857dab299c73b0fd8d3f5
SHA5125e8a8ebbf02557cc40a9024b889b71c40c503087f67248154aa25ea3ccdc38954b269d03e113f133cc964504a356c11b79e9758142aa5e3a5785a3c9cc9c477e
-
\??\c:\Users\Admin\AppData\Local\Temp\dipazz16.cmdlineFilesize
196B
MD5c5a022328fcc6e4e34597a0156c34411
SHA11ef11d7addc3e84fb769ea08dd60ca81dde9d2c7
SHA256480d54d4c3fd66c0c22822ab57bac5bff19a88ed615390d622d905740968889c
SHA51251a42f3858b69de9edd36a62af137e592de11452d52032cb34537973f8487fb85f07dffd90035d0306f85687e7f9cb67311caf22f930cdf767c5119a4ba900be
-
\??\c:\Users\Admin\AppData\Local\Temp\tmpECA7.tmp.txtFilesize
648KB
MD543b6e00e59849a715aa70242fd3a1a27
SHA151b7b6f9df46e55c8bf0be19ad64fd4b9f6daca7
SHA2564d3b6444d5836a77a384adf3d4ea012aab10c1a853dae213564a8860e1f8501a
SHA51265c20f055921c0365787f12d5a48ba8956e604a76b4307535526f98e0b9a9cd297b3e9c6d86224cf88e0b5ff1b2a0e0a75630607b7fe19520c142a2462c6ac04
-
memory/792-133-0x0000000000000000-mapping.dmp
-
memory/1380-156-0x0000000074A00000-0x0000000074FB1000-memory.dmpFilesize
5.7MB
-
memory/1380-132-0x0000000074A00000-0x0000000074FB1000-memory.dmpFilesize
5.7MB
-
memory/2896-154-0x0000000000000000-mapping.dmp
-
memory/4660-136-0x0000000000000000-mapping.dmp
-
memory/4828-151-0x0000000000000000-mapping.dmp
-
memory/5008-142-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/5008-145-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/5008-147-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/5008-148-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/5008-149-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/5008-152-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/5008-143-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/5008-153-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/5008-141-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/5008-155-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/5008-140-0x0000000000000000-mapping.dmp
-
memory/5008-157-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB