Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 04:20
Static task
static1
Behavioral task
behavioral1
Sample
96f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
96f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198.exe
Resource
win10v2004-20220901-en
General
-
Target
96f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198.exe
-
Size
1.3MB
-
MD5
5c81162aa56ef2d826fb9568067b1ba3
-
SHA1
52a1dfb2f44c721b5e788df50b255759c7d3b72e
-
SHA256
96f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198
-
SHA512
7dc2660161712176d9de1fb2b6f0cf92d031ff85f1ebf805652d2389e57c96541e55eae18cb477ebf07fa0545df9825ceabc97b07180c5e3d1bfac491c5e6b2b
-
SSDEEP
24576:GfZc4o2V3KorcRP87KdMYWtahGjjd/isDIPW:Gf+4o2YorU8umYYaUjjd/nDIPW
Malware Config
Extracted
darkcomet
azuka
azuka419.ddns.net:10001
DC_MUTEX-24QP7RP
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
HPdfeX0hFstf
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
Wan.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" Wan.exe -
Executes dropped EXE 5 IoCs
Processes:
Wan.exeWan.exemsdcsc.exeWan.exeWan.exepid process 4268 Wan.exe 3748 Wan.exe 2016 msdcsc.exe 4508 Wan.exe 4072 Wan.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Wan.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Wan.exe -
Drops startup file 1 IoCs
Processes:
96f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nochfolder.vbs 96f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Wan.exeWan.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" Wan.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" Wan.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
96f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198.exeWan.exemsdcsc.exeWan.exepid process 3068 96f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198.exe 4268 Wan.exe 2016 msdcsc.exe 4508 Wan.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Wan.exeWan.exedescription pid process target process PID 4268 set thread context of 3748 4268 Wan.exe Wan.exe PID 4508 set thread context of 4072 4508 Wan.exe Wan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
Wan.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Wan.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
Processes:
96f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198.exeWan.exemsdcsc.exeWan.exepid process 3068 96f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198.exe 4268 Wan.exe 2016 msdcsc.exe 4508 Wan.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
Wan.exeWan.exepid process 4268 Wan.exe 4268 Wan.exe 4508 Wan.exe 4508 Wan.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
Wan.exeWan.exedescription pid process Token: SeIncreaseQuotaPrivilege 3748 Wan.exe Token: SeSecurityPrivilege 3748 Wan.exe Token: SeTakeOwnershipPrivilege 3748 Wan.exe Token: SeLoadDriverPrivilege 3748 Wan.exe Token: SeSystemProfilePrivilege 3748 Wan.exe Token: SeSystemtimePrivilege 3748 Wan.exe Token: SeProfSingleProcessPrivilege 3748 Wan.exe Token: SeIncBasePriorityPrivilege 3748 Wan.exe Token: SeCreatePagefilePrivilege 3748 Wan.exe Token: SeBackupPrivilege 3748 Wan.exe Token: SeRestorePrivilege 3748 Wan.exe Token: SeShutdownPrivilege 3748 Wan.exe Token: SeDebugPrivilege 3748 Wan.exe Token: SeSystemEnvironmentPrivilege 3748 Wan.exe Token: SeChangeNotifyPrivilege 3748 Wan.exe Token: SeRemoteShutdownPrivilege 3748 Wan.exe Token: SeUndockPrivilege 3748 Wan.exe Token: SeManageVolumePrivilege 3748 Wan.exe Token: SeImpersonatePrivilege 3748 Wan.exe Token: SeCreateGlobalPrivilege 3748 Wan.exe Token: 33 3748 Wan.exe Token: 34 3748 Wan.exe Token: 35 3748 Wan.exe Token: 36 3748 Wan.exe Token: SeIncreaseQuotaPrivilege 4072 Wan.exe Token: SeSecurityPrivilege 4072 Wan.exe Token: SeTakeOwnershipPrivilege 4072 Wan.exe Token: SeLoadDriverPrivilege 4072 Wan.exe Token: SeSystemProfilePrivilege 4072 Wan.exe Token: SeSystemtimePrivilege 4072 Wan.exe Token: SeProfSingleProcessPrivilege 4072 Wan.exe Token: SeIncBasePriorityPrivilege 4072 Wan.exe Token: SeCreatePagefilePrivilege 4072 Wan.exe Token: SeBackupPrivilege 4072 Wan.exe Token: SeRestorePrivilege 4072 Wan.exe Token: SeShutdownPrivilege 4072 Wan.exe Token: SeDebugPrivilege 4072 Wan.exe Token: SeSystemEnvironmentPrivilege 4072 Wan.exe Token: SeChangeNotifyPrivilege 4072 Wan.exe Token: SeRemoteShutdownPrivilege 4072 Wan.exe Token: SeUndockPrivilege 4072 Wan.exe Token: SeManageVolumePrivilege 4072 Wan.exe Token: SeImpersonatePrivilege 4072 Wan.exe Token: SeCreateGlobalPrivilege 4072 Wan.exe Token: 33 4072 Wan.exe Token: 34 4072 Wan.exe Token: 35 4072 Wan.exe Token: 36 4072 Wan.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Wan.exepid process 4072 Wan.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
96f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198.exeWan.exeWan.exemsdcsc.exeWan.exedescription pid process target process PID 3068 wrote to memory of 4268 3068 96f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198.exe Wan.exe PID 3068 wrote to memory of 4268 3068 96f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198.exe Wan.exe PID 3068 wrote to memory of 4268 3068 96f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198.exe Wan.exe PID 4268 wrote to memory of 3748 4268 Wan.exe Wan.exe PID 4268 wrote to memory of 3748 4268 Wan.exe Wan.exe PID 4268 wrote to memory of 3748 4268 Wan.exe Wan.exe PID 3748 wrote to memory of 2016 3748 Wan.exe msdcsc.exe PID 3748 wrote to memory of 2016 3748 Wan.exe msdcsc.exe PID 3748 wrote to memory of 2016 3748 Wan.exe msdcsc.exe PID 2016 wrote to memory of 4508 2016 msdcsc.exe Wan.exe PID 2016 wrote to memory of 4508 2016 msdcsc.exe Wan.exe PID 2016 wrote to memory of 4508 2016 msdcsc.exe Wan.exe PID 4508 wrote to memory of 4072 4508 Wan.exe Wan.exe PID 4508 wrote to memory of 4072 4508 Wan.exe Wan.exe PID 4508 wrote to memory of 4072 4508 Wan.exe Wan.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198.exe"C:\Users\Admin\AppData\Local\Temp\96f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198.exe"1⤵
- Drops startup file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Roaming\Nochfolder\Wan.exe"C:\Users\Admin\AppData\Roaming\Nochfolder\Wan.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Roaming\Nochfolder\Wan.exe"C:\Users\Admin\AppData\Roaming\Nochfolder\Wan.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Roaming\Nochfolder\Wan.exe"C:\Users\Admin\AppData\Roaming\Nochfolder\Wan.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Roaming\Nochfolder\Wan.exe"C:\Users\Admin\AppData\Roaming\Nochfolder\Wan.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4072
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD55c81162aa56ef2d826fb9568067b1ba3
SHA152a1dfb2f44c721b5e788df50b255759c7d3b72e
SHA25696f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198
SHA5127dc2660161712176d9de1fb2b6f0cf92d031ff85f1ebf805652d2389e57c96541e55eae18cb477ebf07fa0545df9825ceabc97b07180c5e3d1bfac491c5e6b2b
-
Filesize
1.3MB
MD55c81162aa56ef2d826fb9568067b1ba3
SHA152a1dfb2f44c721b5e788df50b255759c7d3b72e
SHA25696f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198
SHA5127dc2660161712176d9de1fb2b6f0cf92d031ff85f1ebf805652d2389e57c96541e55eae18cb477ebf07fa0545df9825ceabc97b07180c5e3d1bfac491c5e6b2b
-
Filesize
1.3MB
MD55c81162aa56ef2d826fb9568067b1ba3
SHA152a1dfb2f44c721b5e788df50b255759c7d3b72e
SHA25696f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198
SHA5127dc2660161712176d9de1fb2b6f0cf92d031ff85f1ebf805652d2389e57c96541e55eae18cb477ebf07fa0545df9825ceabc97b07180c5e3d1bfac491c5e6b2b
-
Filesize
1.3MB
MD55c81162aa56ef2d826fb9568067b1ba3
SHA152a1dfb2f44c721b5e788df50b255759c7d3b72e
SHA25696f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198
SHA5127dc2660161712176d9de1fb2b6f0cf92d031ff85f1ebf805652d2389e57c96541e55eae18cb477ebf07fa0545df9825ceabc97b07180c5e3d1bfac491c5e6b2b
-
Filesize
1.3MB
MD55c81162aa56ef2d826fb9568067b1ba3
SHA152a1dfb2f44c721b5e788df50b255759c7d3b72e
SHA25696f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198
SHA5127dc2660161712176d9de1fb2b6f0cf92d031ff85f1ebf805652d2389e57c96541e55eae18cb477ebf07fa0545df9825ceabc97b07180c5e3d1bfac491c5e6b2b
-
Filesize
1.3MB
MD55c81162aa56ef2d826fb9568067b1ba3
SHA152a1dfb2f44c721b5e788df50b255759c7d3b72e
SHA25696f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198
SHA5127dc2660161712176d9de1fb2b6f0cf92d031ff85f1ebf805652d2389e57c96541e55eae18cb477ebf07fa0545df9825ceabc97b07180c5e3d1bfac491c5e6b2b
-
Filesize
1.3MB
MD55c81162aa56ef2d826fb9568067b1ba3
SHA152a1dfb2f44c721b5e788df50b255759c7d3b72e
SHA25696f5c3b4b81378a06491ff6ee82ab71af01e85a8bea12bef2d49a1d083262198
SHA5127dc2660161712176d9de1fb2b6f0cf92d031ff85f1ebf805652d2389e57c96541e55eae18cb477ebf07fa0545df9825ceabc97b07180c5e3d1bfac491c5e6b2b