Analysis
-
max time kernel
189s -
max time network
237s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 09:21
Static task
static1
Behavioral task
behavioral1
Sample
59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe
Resource
win10v2004-20221111-en
General
-
Target
59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe
-
Size
785KB
-
MD5
4695d2497f5b72d147ad34dc7b54140d
-
SHA1
b46f3852b6a164d7de2f2e2a7a536470c4f344ae
-
SHA256
59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30
-
SHA512
9daf6e0726d232f3173a9b0ed3f28fccb3310e1e69c132ba5a611db420b15250fe622951ec773819442bbe8a6e17d422f3a9256ce4148d60b1966ae37e3280bd
-
SSDEEP
12288:te/4ed1gLqODJXXn3n0kZJk+vZi3G0khHCpp1tlAhpxz:4/nsqOJXnkk/k2wW064dlY
Malware Config
Extracted
darkcomet
Spy
127.0.0.1:1604
nibiru3.duckdns.org:1604
nibiru33.duckdns.org:1604
DC_MUTEX-QE733CL
-
InstallPath
MSDCSC\Audio Realtek Driver.exe
-
gencode
R3iDnMXzRFHM
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
Audio Realtek Driver
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\Audio Realtek Driver.exe" 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe -
Executes dropped EXE 2 IoCs
pid Process 1004 Audio Realtek Driver.exe 540 Audio Realtek Driver.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Audio Realtek Driver = "C:\\Users\\Admin\\Documents\\MSDCSC\\Audio Realtek Driver.exe" 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Audio Realtek Driver = "C:\\Users\\Admin\\Documents\\MSDCSC\\Audio Realtek Driver.exe" Audio Realtek Driver.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 216 set thread context of 3672 216 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 83 PID 1004 set thread context of 540 1004 Audio Realtek Driver.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeDebugPrivilege 216 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeIncreaseQuotaPrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeSecurityPrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeTakeOwnershipPrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeLoadDriverPrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeSystemProfilePrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeSystemtimePrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeProfSingleProcessPrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeIncBasePriorityPrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeCreatePagefilePrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeBackupPrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeRestorePrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeShutdownPrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeDebugPrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeSystemEnvironmentPrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeChangeNotifyPrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeRemoteShutdownPrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeUndockPrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeManageVolumePrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeImpersonatePrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeCreateGlobalPrivilege 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: 33 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: 34 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: 35 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: 36 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe Token: SeDebugPrivilege 1004 Audio Realtek Driver.exe Token: SeIncreaseQuotaPrivilege 540 Audio Realtek Driver.exe Token: SeSecurityPrivilege 540 Audio Realtek Driver.exe Token: SeTakeOwnershipPrivilege 540 Audio Realtek Driver.exe Token: SeLoadDriverPrivilege 540 Audio Realtek Driver.exe Token: SeSystemProfilePrivilege 540 Audio Realtek Driver.exe Token: SeSystemtimePrivilege 540 Audio Realtek Driver.exe Token: SeProfSingleProcessPrivilege 540 Audio Realtek Driver.exe Token: SeIncBasePriorityPrivilege 540 Audio Realtek Driver.exe Token: SeCreatePagefilePrivilege 540 Audio Realtek Driver.exe Token: SeBackupPrivilege 540 Audio Realtek Driver.exe Token: SeRestorePrivilege 540 Audio Realtek Driver.exe Token: SeShutdownPrivilege 540 Audio Realtek Driver.exe Token: SeDebugPrivilege 540 Audio Realtek Driver.exe Token: SeSystemEnvironmentPrivilege 540 Audio Realtek Driver.exe Token: SeChangeNotifyPrivilege 540 Audio Realtek Driver.exe Token: SeRemoteShutdownPrivilege 540 Audio Realtek Driver.exe Token: SeUndockPrivilege 540 Audio Realtek Driver.exe Token: SeManageVolumePrivilege 540 Audio Realtek Driver.exe Token: SeImpersonatePrivilege 540 Audio Realtek Driver.exe Token: SeCreateGlobalPrivilege 540 Audio Realtek Driver.exe Token: 33 540 Audio Realtek Driver.exe Token: 34 540 Audio Realtek Driver.exe Token: 35 540 Audio Realtek Driver.exe Token: 36 540 Audio Realtek Driver.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 540 Audio Realtek Driver.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 216 wrote to memory of 3672 216 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 83 PID 216 wrote to memory of 3672 216 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 83 PID 216 wrote to memory of 3672 216 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 83 PID 216 wrote to memory of 3672 216 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 83 PID 216 wrote to memory of 3672 216 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 83 PID 216 wrote to memory of 3672 216 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 83 PID 216 wrote to memory of 3672 216 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 83 PID 216 wrote to memory of 3672 216 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 83 PID 216 wrote to memory of 3672 216 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 83 PID 216 wrote to memory of 3672 216 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 83 PID 216 wrote to memory of 3672 216 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 83 PID 216 wrote to memory of 3672 216 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 83 PID 3672 wrote to memory of 5008 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 84 PID 3672 wrote to memory of 5008 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 84 PID 3672 wrote to memory of 5008 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 84 PID 3672 wrote to memory of 5008 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 84 PID 3672 wrote to memory of 5008 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 84 PID 3672 wrote to memory of 5008 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 84 PID 3672 wrote to memory of 5008 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 84 PID 3672 wrote to memory of 5008 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 84 PID 3672 wrote to memory of 5008 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 84 PID 3672 wrote to memory of 5008 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 84 PID 3672 wrote to memory of 5008 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 84 PID 3672 wrote to memory of 5008 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 84 PID 3672 wrote to memory of 5008 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 84 PID 3672 wrote to memory of 5008 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 84 PID 3672 wrote to memory of 5008 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 84 PID 3672 wrote to memory of 5008 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 84 PID 3672 wrote to memory of 5008 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 84 PID 3672 wrote to memory of 1004 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 86 PID 3672 wrote to memory of 1004 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 86 PID 3672 wrote to memory of 1004 3672 59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe 86 PID 1004 wrote to memory of 540 1004 Audio Realtek Driver.exe 87 PID 1004 wrote to memory of 540 1004 Audio Realtek Driver.exe 87 PID 1004 wrote to memory of 540 1004 Audio Realtek Driver.exe 87 PID 1004 wrote to memory of 540 1004 Audio Realtek Driver.exe 87 PID 1004 wrote to memory of 540 1004 Audio Realtek Driver.exe 87 PID 1004 wrote to memory of 540 1004 Audio Realtek Driver.exe 87 PID 1004 wrote to memory of 540 1004 Audio Realtek Driver.exe 87 PID 1004 wrote to memory of 540 1004 Audio Realtek Driver.exe 87 PID 1004 wrote to memory of 540 1004 Audio Realtek Driver.exe 87 PID 1004 wrote to memory of 540 1004 Audio Realtek Driver.exe 87 PID 1004 wrote to memory of 540 1004 Audio Realtek Driver.exe 87 PID 1004 wrote to memory of 540 1004 Audio Realtek Driver.exe 87 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88 PID 540 wrote to memory of 4224 540 Audio Realtek Driver.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe"C:\Users\Admin\AppData\Local\Temp\59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe"C:\Users\Admin\AppData\Local\Temp\59ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵PID:5008
-
-
C:\Users\Admin\Documents\MSDCSC\Audio Realtek Driver.exe"C:\Users\Admin\Documents\MSDCSC\Audio Realtek Driver.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\Documents\MSDCSC\Audio Realtek Driver.exe"C:\Users\Admin\Documents\MSDCSC\Audio Realtek Driver.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\notepad.exenotepad5⤵PID:4224
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
785KB
MD54695d2497f5b72d147ad34dc7b54140d
SHA1b46f3852b6a164d7de2f2e2a7a536470c4f344ae
SHA25659ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30
SHA5129daf6e0726d232f3173a9b0ed3f28fccb3310e1e69c132ba5a611db420b15250fe622951ec773819442bbe8a6e17d422f3a9256ce4148d60b1966ae37e3280bd
-
Filesize
785KB
MD54695d2497f5b72d147ad34dc7b54140d
SHA1b46f3852b6a164d7de2f2e2a7a536470c4f344ae
SHA25659ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30
SHA5129daf6e0726d232f3173a9b0ed3f28fccb3310e1e69c132ba5a611db420b15250fe622951ec773819442bbe8a6e17d422f3a9256ce4148d60b1966ae37e3280bd
-
Filesize
785KB
MD54695d2497f5b72d147ad34dc7b54140d
SHA1b46f3852b6a164d7de2f2e2a7a536470c4f344ae
SHA25659ca328456e4b599732fc4e01a03979a1275c509ccb976758946366e84cb5b30
SHA5129daf6e0726d232f3173a9b0ed3f28fccb3310e1e69c132ba5a611db420b15250fe622951ec773819442bbe8a6e17d422f3a9256ce4148d60b1966ae37e3280bd