Analysis
-
max time kernel
155s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 11:43
Behavioral task
behavioral1
Sample
56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe
Resource
win7-20220812-en
General
-
Target
56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe
-
Size
283KB
-
MD5
8c859f679398094cd891a97081ab13e2
-
SHA1
528e86428f7a0b885af3de45a38693bb515155de
-
SHA256
56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9
-
SHA512
4dd2b9d59d56bccc0a73897a7c1107d2c77970c2431a00de6f18f6ce9b6bebe5b14676ac1e0c594f94c21f7415694c646bf3a0bc695209242dacd0b5a1d522f9
-
SSDEEP
6144:6cNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0P12:6cWkbgTYWnYnt/IDYhP12
Malware Config
Extracted
darkcomet
HACKED
dc-rat.hopto.org:1604
DC_MUTEX-Z0GSXWB
-
InstallPath
WindowsDefender\Update.exe
-
gencode
RfExL0kmflxA
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
WindowsDefender
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\WindowsDefender\\Update.exe" 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe -
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" Update.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile Update.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" Update.exe -
Executes dropped EXE 1 IoCs
pid Process 4212 Update.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 5076 attrib.exe 4268 attrib.exe -
resource yara_rule behavioral2/memory/2176-132-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral2/memory/2176-137-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral2/files/0x0007000000022e04-139.dat upx behavioral2/files/0x0007000000022e04-140.dat upx behavioral2/memory/4212-141-0x0000000000400000-0x00000000004C7000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsDefender\\Update.exe" 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeSecurityPrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeTakeOwnershipPrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeLoadDriverPrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeSystemProfilePrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeSystemtimePrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeProfSingleProcessPrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeIncBasePriorityPrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeCreatePagefilePrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeBackupPrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeRestorePrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeShutdownPrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeDebugPrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeSystemEnvironmentPrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeChangeNotifyPrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeRemoteShutdownPrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeUndockPrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeManageVolumePrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeImpersonatePrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeCreateGlobalPrivilege 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: 33 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: 34 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: 35 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: 36 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe Token: SeIncreaseQuotaPrivilege 4212 Update.exe Token: SeSecurityPrivilege 4212 Update.exe Token: SeTakeOwnershipPrivilege 4212 Update.exe Token: SeLoadDriverPrivilege 4212 Update.exe Token: SeSystemProfilePrivilege 4212 Update.exe Token: SeSystemtimePrivilege 4212 Update.exe Token: SeProfSingleProcessPrivilege 4212 Update.exe Token: SeIncBasePriorityPrivilege 4212 Update.exe Token: SeCreatePagefilePrivilege 4212 Update.exe Token: SeBackupPrivilege 4212 Update.exe Token: SeRestorePrivilege 4212 Update.exe Token: SeShutdownPrivilege 4212 Update.exe Token: SeDebugPrivilege 4212 Update.exe Token: SeSystemEnvironmentPrivilege 4212 Update.exe Token: SeChangeNotifyPrivilege 4212 Update.exe Token: SeRemoteShutdownPrivilege 4212 Update.exe Token: SeUndockPrivilege 4212 Update.exe Token: SeManageVolumePrivilege 4212 Update.exe Token: SeImpersonatePrivilege 4212 Update.exe Token: SeCreateGlobalPrivilege 4212 Update.exe Token: 33 4212 Update.exe Token: 34 4212 Update.exe Token: 35 4212 Update.exe Token: 36 4212 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4212 Update.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2176 wrote to memory of 3540 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe 80 PID 2176 wrote to memory of 3540 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe 80 PID 2176 wrote to memory of 3540 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe 80 PID 2176 wrote to memory of 1652 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe 82 PID 2176 wrote to memory of 1652 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe 82 PID 2176 wrote to memory of 1652 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe 82 PID 3540 wrote to memory of 5076 3540 cmd.exe 84 PID 3540 wrote to memory of 5076 3540 cmd.exe 84 PID 3540 wrote to memory of 5076 3540 cmd.exe 84 PID 1652 wrote to memory of 4268 1652 cmd.exe 85 PID 1652 wrote to memory of 4268 1652 cmd.exe 85 PID 1652 wrote to memory of 4268 1652 cmd.exe 85 PID 2176 wrote to memory of 4212 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe 86 PID 2176 wrote to memory of 4212 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe 86 PID 2176 wrote to memory of 4212 2176 56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe 86 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 PID 4212 wrote to memory of 4132 4212 Update.exe 88 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 5076 attrib.exe 4268 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe"C:\Users\Admin\AppData\Local\Temp\56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\56262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9.exe" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:5076
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4268
-
-
-
C:\Users\Admin\AppData\Roaming\WindowsDefender\Update.exe"C:\Users\Admin\AppData\Roaming\WindowsDefender\Update.exe"2⤵
- Modifies firewall policy service
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵PID:4132
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD58c859f679398094cd891a97081ab13e2
SHA1528e86428f7a0b885af3de45a38693bb515155de
SHA25656262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9
SHA5124dd2b9d59d56bccc0a73897a7c1107d2c77970c2431a00de6f18f6ce9b6bebe5b14676ac1e0c594f94c21f7415694c646bf3a0bc695209242dacd0b5a1d522f9
-
Filesize
283KB
MD58c859f679398094cd891a97081ab13e2
SHA1528e86428f7a0b885af3de45a38693bb515155de
SHA25656262d9f84c49c9689abe6f697e16453af70f6c58447d7997afd100703abafb9
SHA5124dd2b9d59d56bccc0a73897a7c1107d2c77970c2431a00de6f18f6ce9b6bebe5b14676ac1e0c594f94c21f7415694c646bf3a0bc695209242dacd0b5a1d522f9