Analysis
-
max time kernel
174s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 03:56
Behavioral task
behavioral1
Sample
9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe
Resource
win7-20221111-en
General
-
Target
9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe
-
Size
725KB
-
MD5
6809bd68abcecfb8a7f3954d564933fd
-
SHA1
d8a2d14f5c2dcbeceffe1aec938a125612e62932
-
SHA256
9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287
-
SHA512
11d1bce942cf8ed0cebfde70bc9727d712124fa3f7993328cfe30c8261282215ea10413a2031722c521e29577d44d539001bd7ea6f30c7da3b834bbe76be4718
-
SSDEEP
12288:V9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hwQrMxtHw:fZ1xuVVjfFoynPaVBUR8f+kN10EBFMxS
Malware Config
Extracted
darkcomet
Guest16
dsobonus.myvnc.com:1604
DC_MUTEX-BT41MG9
-
InstallPath
MSDCSC\explorer.exe
-
gencode
eZmzPEQdRN7P
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
explorer
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\explorer.exe" 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe -
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" explorer.exe -
Executes dropped EXE 1 IoCs
Processes:
explorer.exepid process 4084 explorer.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 4788 attrib.exe 2112 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\explorer.exe" 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\explorer.exe" explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 4084 explorer.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exeexplorer.exedescription pid process Token: SeIncreaseQuotaPrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeSecurityPrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeTakeOwnershipPrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeLoadDriverPrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeSystemProfilePrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeSystemtimePrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeProfSingleProcessPrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeIncBasePriorityPrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeCreatePagefilePrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeBackupPrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeRestorePrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeShutdownPrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeDebugPrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeSystemEnvironmentPrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeChangeNotifyPrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeRemoteShutdownPrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeUndockPrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeManageVolumePrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeImpersonatePrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeCreateGlobalPrivilege 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: 33 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: 34 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: 35 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: 36 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe Token: SeIncreaseQuotaPrivilege 4084 explorer.exe Token: SeSecurityPrivilege 4084 explorer.exe Token: SeTakeOwnershipPrivilege 4084 explorer.exe Token: SeLoadDriverPrivilege 4084 explorer.exe Token: SeSystemProfilePrivilege 4084 explorer.exe Token: SeSystemtimePrivilege 4084 explorer.exe Token: SeProfSingleProcessPrivilege 4084 explorer.exe Token: SeIncBasePriorityPrivilege 4084 explorer.exe Token: SeCreatePagefilePrivilege 4084 explorer.exe Token: SeBackupPrivilege 4084 explorer.exe Token: SeRestorePrivilege 4084 explorer.exe Token: SeShutdownPrivilege 4084 explorer.exe Token: SeDebugPrivilege 4084 explorer.exe Token: SeSystemEnvironmentPrivilege 4084 explorer.exe Token: SeChangeNotifyPrivilege 4084 explorer.exe Token: SeRemoteShutdownPrivilege 4084 explorer.exe Token: SeUndockPrivilege 4084 explorer.exe Token: SeManageVolumePrivilege 4084 explorer.exe Token: SeImpersonatePrivilege 4084 explorer.exe Token: SeCreateGlobalPrivilege 4084 explorer.exe Token: 33 4084 explorer.exe Token: 34 4084 explorer.exe Token: 35 4084 explorer.exe Token: 36 4084 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
explorer.exepid process 4084 explorer.exe -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.execmd.execmd.exeexplorer.exedescription pid process target process PID 4064 wrote to memory of 528 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe cmd.exe PID 4064 wrote to memory of 528 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe cmd.exe PID 4064 wrote to memory of 528 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe cmd.exe PID 4064 wrote to memory of 4180 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe cmd.exe PID 4064 wrote to memory of 4180 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe cmd.exe PID 4064 wrote to memory of 4180 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe cmd.exe PID 4064 wrote to memory of 4088 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe notepad.exe PID 4064 wrote to memory of 4088 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe notepad.exe PID 4064 wrote to memory of 4088 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe notepad.exe PID 4064 wrote to memory of 4088 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe notepad.exe PID 4064 wrote to memory of 4088 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe notepad.exe PID 4064 wrote to memory of 4088 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe notepad.exe PID 4064 wrote to memory of 4088 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe notepad.exe PID 4064 wrote to memory of 4088 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe notepad.exe PID 4064 wrote to memory of 4088 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe notepad.exe PID 4064 wrote to memory of 4088 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe notepad.exe PID 4064 wrote to memory of 4088 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe notepad.exe PID 4064 wrote to memory of 4088 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe notepad.exe PID 4064 wrote to memory of 4088 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe notepad.exe PID 4064 wrote to memory of 4088 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe notepad.exe PID 4064 wrote to memory of 4088 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe notepad.exe PID 4064 wrote to memory of 4088 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe notepad.exe PID 4064 wrote to memory of 4088 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe notepad.exe PID 4180 wrote to memory of 4788 4180 cmd.exe attrib.exe PID 4180 wrote to memory of 4788 4180 cmd.exe attrib.exe PID 4180 wrote to memory of 4788 4180 cmd.exe attrib.exe PID 528 wrote to memory of 2112 528 cmd.exe attrib.exe PID 528 wrote to memory of 2112 528 cmd.exe attrib.exe PID 528 wrote to memory of 2112 528 cmd.exe attrib.exe PID 4064 wrote to memory of 4084 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe explorer.exe PID 4064 wrote to memory of 4084 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe explorer.exe PID 4064 wrote to memory of 4084 4064 9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe explorer.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe PID 4084 wrote to memory of 5052 4084 explorer.exe notepad.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 2112 attrib.exe 4788 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe"C:\Users\Admin\AppData\Local\Temp\9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\9140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287.exe" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2112
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4788
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad2⤵PID:4088
-
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\explorer.exe"C:\Users\Admin\AppData\Local\Temp\MSDCSC\explorer.exe"2⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵PID:5052
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
725KB
MD56809bd68abcecfb8a7f3954d564933fd
SHA1d8a2d14f5c2dcbeceffe1aec938a125612e62932
SHA2569140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287
SHA51211d1bce942cf8ed0cebfde70bc9727d712124fa3f7993328cfe30c8261282215ea10413a2031722c521e29577d44d539001bd7ea6f30c7da3b834bbe76be4718
-
Filesize
725KB
MD56809bd68abcecfb8a7f3954d564933fd
SHA1d8a2d14f5c2dcbeceffe1aec938a125612e62932
SHA2569140e447983f9b32db8d93cb72e12dfb885a7c32f1d25fc405b39551934b4287
SHA51211d1bce942cf8ed0cebfde70bc9727d712124fa3f7993328cfe30c8261282215ea10413a2031722c521e29577d44d539001bd7ea6f30c7da3b834bbe76be4718