Analysis
-
max time kernel
218s -
max time network
229s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 03:56
Behavioral task
behavioral1
Sample
6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe
Resource
win7-20221111-en
General
-
Target
6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe
-
Size
791KB
-
MD5
32472c66a6a689be7e6903f1f360cec6
-
SHA1
29dfb3a5e493ae6cdf90bcf856ac9c497c4889ea
-
SHA256
6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349
-
SHA512
aad8455001ed3d53d6e05fec658cdb179798e5427143442fb41a5a7f1fd6ff402270773934478a5211bd2fe19292b96f7d91db723361a6d081602756305ebe9a
-
SSDEEP
12288:A9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hurfMb/:kZ1xuVVjfFoynPaVBUR8f+kN10EBwgb/
Malware Config
Extracted
darkcomet
Guest22
leunam.ddns.net:1604
DC_MUTEX-CYTRPNC
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
NlD3lKCPlj6p
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe -
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
msdcsc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
msdcsc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 4956 msdcsc.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeSecurityPrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeTakeOwnershipPrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeLoadDriverPrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeSystemProfilePrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeSystemtimePrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeProfSingleProcessPrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeIncBasePriorityPrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeCreatePagefilePrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeBackupPrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeRestorePrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeShutdownPrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeDebugPrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeSystemEnvironmentPrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeChangeNotifyPrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeRemoteShutdownPrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeUndockPrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeManageVolumePrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeImpersonatePrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeCreateGlobalPrivilege 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: 33 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: 34 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: 35 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: 36 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe Token: SeIncreaseQuotaPrivilege 4956 msdcsc.exe Token: SeSecurityPrivilege 4956 msdcsc.exe Token: SeTakeOwnershipPrivilege 4956 msdcsc.exe Token: SeLoadDriverPrivilege 4956 msdcsc.exe Token: SeSystemProfilePrivilege 4956 msdcsc.exe Token: SeSystemtimePrivilege 4956 msdcsc.exe Token: SeProfSingleProcessPrivilege 4956 msdcsc.exe Token: SeIncBasePriorityPrivilege 4956 msdcsc.exe Token: SeCreatePagefilePrivilege 4956 msdcsc.exe Token: SeBackupPrivilege 4956 msdcsc.exe Token: SeRestorePrivilege 4956 msdcsc.exe Token: SeShutdownPrivilege 4956 msdcsc.exe Token: SeDebugPrivilege 4956 msdcsc.exe Token: SeSystemEnvironmentPrivilege 4956 msdcsc.exe Token: SeChangeNotifyPrivilege 4956 msdcsc.exe Token: SeRemoteShutdownPrivilege 4956 msdcsc.exe Token: SeUndockPrivilege 4956 msdcsc.exe Token: SeManageVolumePrivilege 4956 msdcsc.exe Token: SeImpersonatePrivilege 4956 msdcsc.exe Token: SeCreateGlobalPrivilege 4956 msdcsc.exe Token: 33 4956 msdcsc.exe Token: 34 4956 msdcsc.exe Token: 35 4956 msdcsc.exe Token: 36 4956 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msdcsc.exepid process 4956 msdcsc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exemsdcsc.exedescription pid process target process PID 752 wrote to memory of 4956 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe msdcsc.exe PID 752 wrote to memory of 4956 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe msdcsc.exe PID 752 wrote to memory of 4956 752 6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe msdcsc.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe PID 4956 wrote to memory of 4748 4956 msdcsc.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe"C:\Users\Admin\AppData\Local\Temp\6fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"2⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵PID:4748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
791KB
MD532472c66a6a689be7e6903f1f360cec6
SHA129dfb3a5e493ae6cdf90bcf856ac9c497c4889ea
SHA2566fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349
SHA512aad8455001ed3d53d6e05fec658cdb179798e5427143442fb41a5a7f1fd6ff402270773934478a5211bd2fe19292b96f7d91db723361a6d081602756305ebe9a
-
Filesize
791KB
MD532472c66a6a689be7e6903f1f360cec6
SHA129dfb3a5e493ae6cdf90bcf856ac9c497c4889ea
SHA2566fe18b376f52890d3a0800621c00e043996dbd2027899f84173b13b0b9394349
SHA512aad8455001ed3d53d6e05fec658cdb179798e5427143442fb41a5a7f1fd6ff402270773934478a5211bd2fe19292b96f7d91db723361a6d081602756305ebe9a