Analysis
-
max time kernel
201s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:19
Static task
static1
Behavioral task
behavioral1
Sample
b41b5ff0e615b7a551ed96226e1e159353567cc8f6a3aa4afe2b0df193b2d716.exe
Resource
win7-20221111-en
General
-
Target
b41b5ff0e615b7a551ed96226e1e159353567cc8f6a3aa4afe2b0df193b2d716.exe
-
Size
1014KB
-
MD5
fc36609a54c8f09988e46d3f14cdbe8e
-
SHA1
59668fde8e4303bef1000bc6a2d179d6001c1bf4
-
SHA256
b41b5ff0e615b7a551ed96226e1e159353567cc8f6a3aa4afe2b0df193b2d716
-
SHA512
34de0feb1a2e0a4fd538d6c8083340998230e748fd8a3d12bf51751eff62af1ef3044e7e663760cb17bad3e548a45d75e8d9f1d6803c7a31246157423dae6d1c
-
SSDEEP
12288:uXhcWNAzVJmM55U4j1DIuddcQsfXXKktxADIAP+RNJCH5fZlP:iBNArmMPU4jqudBcXHtxyIpB4TP
Malware Config
Extracted
darkcomet
csgo
hyptonix.ddns.net:1604
DCMIN_MUTEX-LYN9LYG
-
gencode
guRWof92yMZb
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
required.exerequired.exepid process 3880 required.exe 904 required.exe -
Drops startup file 1 IoCs
Processes:
b41b5ff0e615b7a551ed96226e1e159353567cc8f6a3aa4afe2b0df193b2d716.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Required.vbs b41b5ff0e615b7a551ed96226e1e159353567cc8f6a3aa4afe2b0df193b2d716.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
required.exedescription pid process target process PID 3880 set thread context of 904 3880 required.exe required.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
required.exepid process 3880 required.exe 3880 required.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
required.exedescription pid process Token: SeIncreaseQuotaPrivilege 904 required.exe Token: SeSecurityPrivilege 904 required.exe Token: SeTakeOwnershipPrivilege 904 required.exe Token: SeLoadDriverPrivilege 904 required.exe Token: SeSystemProfilePrivilege 904 required.exe Token: SeSystemtimePrivilege 904 required.exe Token: SeProfSingleProcessPrivilege 904 required.exe Token: SeIncBasePriorityPrivilege 904 required.exe Token: SeCreatePagefilePrivilege 904 required.exe Token: SeBackupPrivilege 904 required.exe Token: SeRestorePrivilege 904 required.exe Token: SeShutdownPrivilege 904 required.exe Token: SeDebugPrivilege 904 required.exe Token: SeSystemEnvironmentPrivilege 904 required.exe Token: SeChangeNotifyPrivilege 904 required.exe Token: SeRemoteShutdownPrivilege 904 required.exe Token: SeUndockPrivilege 904 required.exe Token: SeManageVolumePrivilege 904 required.exe Token: SeImpersonatePrivilege 904 required.exe Token: SeCreateGlobalPrivilege 904 required.exe Token: 33 904 required.exe Token: 34 904 required.exe Token: 35 904 required.exe Token: 36 904 required.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
required.exepid process 904 required.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b41b5ff0e615b7a551ed96226e1e159353567cc8f6a3aa4afe2b0df193b2d716.exerequired.exedescription pid process target process PID 3716 wrote to memory of 3880 3716 b41b5ff0e615b7a551ed96226e1e159353567cc8f6a3aa4afe2b0df193b2d716.exe required.exe PID 3716 wrote to memory of 3880 3716 b41b5ff0e615b7a551ed96226e1e159353567cc8f6a3aa4afe2b0df193b2d716.exe required.exe PID 3716 wrote to memory of 3880 3716 b41b5ff0e615b7a551ed96226e1e159353567cc8f6a3aa4afe2b0df193b2d716.exe required.exe PID 3880 wrote to memory of 904 3880 required.exe required.exe PID 3880 wrote to memory of 904 3880 required.exe required.exe PID 3880 wrote to memory of 904 3880 required.exe required.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b41b5ff0e615b7a551ed96226e1e159353567cc8f6a3aa4afe2b0df193b2d716.exe"C:\Users\Admin\AppData\Local\Temp\b41b5ff0e615b7a551ed96226e1e159353567cc8f6a3aa4afe2b0df193b2d716.exe"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Roaming\dcpower\required.exe"C:\Users\Admin\AppData\Roaming\dcpower\required.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Roaming\dcpower\required.exe"C:\Users\Admin\AppData\Roaming\dcpower\required.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:904
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1014KB
MD5fc36609a54c8f09988e46d3f14cdbe8e
SHA159668fde8e4303bef1000bc6a2d179d6001c1bf4
SHA256b41b5ff0e615b7a551ed96226e1e159353567cc8f6a3aa4afe2b0df193b2d716
SHA51234de0feb1a2e0a4fd538d6c8083340998230e748fd8a3d12bf51751eff62af1ef3044e7e663760cb17bad3e548a45d75e8d9f1d6803c7a31246157423dae6d1c
-
Filesize
1014KB
MD5fc36609a54c8f09988e46d3f14cdbe8e
SHA159668fde8e4303bef1000bc6a2d179d6001c1bf4
SHA256b41b5ff0e615b7a551ed96226e1e159353567cc8f6a3aa4afe2b0df193b2d716
SHA51234de0feb1a2e0a4fd538d6c8083340998230e748fd8a3d12bf51751eff62af1ef3044e7e663760cb17bad3e548a45d75e8d9f1d6803c7a31246157423dae6d1c
-
Filesize
1014KB
MD5fc36609a54c8f09988e46d3f14cdbe8e
SHA159668fde8e4303bef1000bc6a2d179d6001c1bf4
SHA256b41b5ff0e615b7a551ed96226e1e159353567cc8f6a3aa4afe2b0df193b2d716
SHA51234de0feb1a2e0a4fd538d6c8083340998230e748fd8a3d12bf51751eff62af1ef3044e7e663760cb17bad3e548a45d75e8d9f1d6803c7a31246157423dae6d1c