Analysis
-
max time kernel
151s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:33
Static task
static1
Behavioral task
behavioral1
Sample
6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe
Resource
win10v2004-20220812-en
General
-
Target
6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe
-
Size
472KB
-
MD5
428cb0db369019384072df4432724dde
-
SHA1
5ca8272d0c3946dc665f6f597b016701a2869c04
-
SHA256
6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26
-
SHA512
af66566cb2ad51a3d57b528a35481daf20d0ccaad672b01a20fa1ee8ffdd4b722101b0e2f340cf8d4801d3b2b309909b249f84c7a090c1fe2d81e38339809c4f
-
SSDEEP
12288:EY3F7cDylczfadxLU6OoNUuyQzX16cKHD8A55:EM7cDyliSPbN1ym16cEDv55
Malware Config
Extracted
darkcomet
vikky
vikky44.no-ip.biz:1604
DC_MUTEX-D968R22
-
gencode
nPNl4dCBT8Dq
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Users\\Admin\\AppData\\Roaming\\bovrEIZq\\oc81okL.exe,explorer.exe" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exedescription pid process target process PID 1992 set thread context of 4168 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe cvtres.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exepid process 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
Processes:
6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.execvtres.exedescription pid process Token: SeDebugPrivilege 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe Token: SeIncreaseQuotaPrivilege 4168 cvtres.exe Token: SeSecurityPrivilege 4168 cvtres.exe Token: SeTakeOwnershipPrivilege 4168 cvtres.exe Token: SeLoadDriverPrivilege 4168 cvtres.exe Token: SeSystemProfilePrivilege 4168 cvtres.exe Token: SeSystemtimePrivilege 4168 cvtres.exe Token: SeProfSingleProcessPrivilege 4168 cvtres.exe Token: SeIncBasePriorityPrivilege 4168 cvtres.exe Token: SeCreatePagefilePrivilege 4168 cvtres.exe Token: SeBackupPrivilege 4168 cvtres.exe Token: SeRestorePrivilege 4168 cvtres.exe Token: SeShutdownPrivilege 4168 cvtres.exe Token: SeDebugPrivilege 4168 cvtres.exe Token: SeSystemEnvironmentPrivilege 4168 cvtres.exe Token: SeChangeNotifyPrivilege 4168 cvtres.exe Token: SeRemoteShutdownPrivilege 4168 cvtres.exe Token: SeUndockPrivilege 4168 cvtres.exe Token: SeManageVolumePrivilege 4168 cvtres.exe Token: SeImpersonatePrivilege 4168 cvtres.exe Token: SeCreateGlobalPrivilege 4168 cvtres.exe Token: 33 4168 cvtres.exe Token: 34 4168 cvtres.exe Token: 35 4168 cvtres.exe Token: 36 4168 cvtres.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cvtres.exepid process 4168 cvtres.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.execmd.exedescription pid process target process PID 1992 wrote to memory of 4268 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe cmd.exe PID 1992 wrote to memory of 4268 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe cmd.exe PID 1992 wrote to memory of 4268 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe cmd.exe PID 4268 wrote to memory of 5056 4268 cmd.exe reg.exe PID 4268 wrote to memory of 5056 4268 cmd.exe reg.exe PID 4268 wrote to memory of 5056 4268 cmd.exe reg.exe PID 1992 wrote to memory of 4168 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe cvtres.exe PID 1992 wrote to memory of 4168 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe cvtres.exe PID 1992 wrote to memory of 4168 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe cvtres.exe PID 1992 wrote to memory of 4168 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe cvtres.exe PID 1992 wrote to memory of 4168 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe cvtres.exe PID 1992 wrote to memory of 4168 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe cvtres.exe PID 1992 wrote to memory of 4168 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe cvtres.exe PID 1992 wrote to memory of 4168 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe cvtres.exe PID 1992 wrote to memory of 4168 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe cvtres.exe PID 1992 wrote to memory of 4168 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe cvtres.exe PID 1992 wrote to memory of 4168 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe cvtres.exe PID 1992 wrote to memory of 4168 1992 6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe cvtres.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe"C:\Users\Admin\AppData\Local\Temp\6f997cbcb6524add6f2b0354b710a367d7f7a60402aaeab53e960834ee044f26.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\bovrEIZq\oc81okL.exe,explorer.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\bovrEIZq\oc81okL.exe,explorer.exe"3⤵
- Modifies WinLogon for persistence
PID:5056 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4168