Analysis
-
max time kernel
222s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 18:54
Behavioral task
behavioral1
Sample
85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe
Resource
win7-20221111-en
General
-
Target
85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe
-
Size
261KB
-
MD5
4530a82649bd16a3a7baa70faa1caa50
-
SHA1
f9ce0ceaa7bccf18ef23570e0d550d9b43e9e166
-
SHA256
85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc
-
SHA512
3721f299f303b8c040a43a020a09fb55ef412b59d597e1bc6b8a3e5bc886afc44859832693c45e6eef5ff0f5d83760f81bb78bb59c5b3c7d656f277b5b63fb30
-
SSDEEP
6144:Hco4dnaXTsWxDcQHlemO9fRI6oh/h8oGWINlmR9wryQ:8PnaDskYaAmU66yh5GHD09AyQ
Malware Config
Extracted
darkcomet
hack
bikaalov.noip.me:1604
DC_MUTEX-7G2PFJD
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
tKukSM5w3M83
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe -
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
resource yara_rule behavioral1/files/0x000800000001412f-69.dat aspack_v212_v242 behavioral1/files/0x000800000001412f-70.dat aspack_v212_v242 behavioral1/files/0x000800000001412f-72.dat aspack_v212_v242 behavioral1/files/0x000800000001412f-75.dat aspack_v212_v242 behavioral1/files/0x000800000001412f-82.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 1768 msdcsc.exe 1684 msdcsc.exe -
resource yara_rule behavioral1/memory/904-57-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/904-59-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/904-60-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/904-62-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/904-65-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/904-66-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/904-67-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/904-68-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1684-88-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/904-90-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1684-91-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1684-92-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1684-93-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 944 set thread context of 904 944 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe 28 PID 1768 set thread context of 1684 1768 msdcsc.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeSecurityPrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeTakeOwnershipPrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeLoadDriverPrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeSystemProfilePrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeSystemtimePrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeProfSingleProcessPrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeIncBasePriorityPrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeCreatePagefilePrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeBackupPrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeRestorePrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeShutdownPrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeDebugPrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeSystemEnvironmentPrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeChangeNotifyPrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeRemoteShutdownPrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeUndockPrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeManageVolumePrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeImpersonatePrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeCreateGlobalPrivilege 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: 33 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: 34 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: 35 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe Token: SeIncreaseQuotaPrivilege 1684 msdcsc.exe Token: SeSecurityPrivilege 1684 msdcsc.exe Token: SeTakeOwnershipPrivilege 1684 msdcsc.exe Token: SeLoadDriverPrivilege 1684 msdcsc.exe Token: SeSystemProfilePrivilege 1684 msdcsc.exe Token: SeSystemtimePrivilege 1684 msdcsc.exe Token: SeProfSingleProcessPrivilege 1684 msdcsc.exe Token: SeIncBasePriorityPrivilege 1684 msdcsc.exe Token: SeCreatePagefilePrivilege 1684 msdcsc.exe Token: SeBackupPrivilege 1684 msdcsc.exe Token: SeRestorePrivilege 1684 msdcsc.exe Token: SeShutdownPrivilege 1684 msdcsc.exe Token: SeDebugPrivilege 1684 msdcsc.exe Token: SeSystemEnvironmentPrivilege 1684 msdcsc.exe Token: SeChangeNotifyPrivilege 1684 msdcsc.exe Token: SeRemoteShutdownPrivilege 1684 msdcsc.exe Token: SeUndockPrivilege 1684 msdcsc.exe Token: SeManageVolumePrivilege 1684 msdcsc.exe Token: SeImpersonatePrivilege 1684 msdcsc.exe Token: SeCreateGlobalPrivilege 1684 msdcsc.exe Token: 33 1684 msdcsc.exe Token: 34 1684 msdcsc.exe Token: 35 1684 msdcsc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 944 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe 1768 msdcsc.exe 1684 msdcsc.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 944 wrote to memory of 904 944 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe 28 PID 944 wrote to memory of 904 944 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe 28 PID 944 wrote to memory of 904 944 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe 28 PID 944 wrote to memory of 904 944 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe 28 PID 944 wrote to memory of 904 944 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe 28 PID 944 wrote to memory of 904 944 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe 28 PID 944 wrote to memory of 904 944 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe 28 PID 944 wrote to memory of 904 944 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe 28 PID 904 wrote to memory of 1768 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe 29 PID 904 wrote to memory of 1768 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe 29 PID 904 wrote to memory of 1768 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe 29 PID 904 wrote to memory of 1768 904 85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe 29 PID 1768 wrote to memory of 1684 1768 msdcsc.exe 30 PID 1768 wrote to memory of 1684 1768 msdcsc.exe 30 PID 1768 wrote to memory of 1684 1768 msdcsc.exe 30 PID 1768 wrote to memory of 1684 1768 msdcsc.exe 30 PID 1768 wrote to memory of 1684 1768 msdcsc.exe 30 PID 1768 wrote to memory of 1684 1768 msdcsc.exe 30 PID 1768 wrote to memory of 1684 1768 msdcsc.exe 30 PID 1768 wrote to memory of 1684 1768 msdcsc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe"C:\Users\Admin\AppData\Local\Temp\85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\85fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc.exe
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
- Modifies firewall policy service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1684
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261KB
MD54530a82649bd16a3a7baa70faa1caa50
SHA1f9ce0ceaa7bccf18ef23570e0d550d9b43e9e166
SHA25685fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc
SHA5123721f299f303b8c040a43a020a09fb55ef412b59d597e1bc6b8a3e5bc886afc44859832693c45e6eef5ff0f5d83760f81bb78bb59c5b3c7d656f277b5b63fb30
-
Filesize
261KB
MD54530a82649bd16a3a7baa70faa1caa50
SHA1f9ce0ceaa7bccf18ef23570e0d550d9b43e9e166
SHA25685fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc
SHA5123721f299f303b8c040a43a020a09fb55ef412b59d597e1bc6b8a3e5bc886afc44859832693c45e6eef5ff0f5d83760f81bb78bb59c5b3c7d656f277b5b63fb30
-
Filesize
261KB
MD54530a82649bd16a3a7baa70faa1caa50
SHA1f9ce0ceaa7bccf18ef23570e0d550d9b43e9e166
SHA25685fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc
SHA5123721f299f303b8c040a43a020a09fb55ef412b59d597e1bc6b8a3e5bc886afc44859832693c45e6eef5ff0f5d83760f81bb78bb59c5b3c7d656f277b5b63fb30
-
Filesize
261KB
MD54530a82649bd16a3a7baa70faa1caa50
SHA1f9ce0ceaa7bccf18ef23570e0d550d9b43e9e166
SHA25685fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc
SHA5123721f299f303b8c040a43a020a09fb55ef412b59d597e1bc6b8a3e5bc886afc44859832693c45e6eef5ff0f5d83760f81bb78bb59c5b3c7d656f277b5b63fb30
-
Filesize
261KB
MD54530a82649bd16a3a7baa70faa1caa50
SHA1f9ce0ceaa7bccf18ef23570e0d550d9b43e9e166
SHA25685fdde2e17ec0b56ce564a98c6220745c6950f44932abe5dce5cba66605db2bc
SHA5123721f299f303b8c040a43a020a09fb55ef412b59d597e1bc6b8a3e5bc886afc44859832693c45e6eef5ff0f5d83760f81bb78bb59c5b3c7d656f277b5b63fb30