Analysis
-
max time kernel
133s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 19:44
Static task
static1
Behavioral task
behavioral1
Sample
f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe
Resource
win10v2004-20221111-en
General
-
Target
f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe
-
Size
1.5MB
-
MD5
90ca009f81efa96a4fdb9c92308d1160
-
SHA1
4d4173207b2f7512b1be4464cabb0df1e32d23a2
-
SHA256
f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8
-
SHA512
04405a292ed33dd8320441e7feaa362f954d258d55ae5295c84457d33ccf1179b51a93855eafc381a53b2a53381676d98ca071be09abf88b212a94b7090e2bc5
-
SSDEEP
24576:Rtb20pkaCqT5TBWgNQ7aaJsFgAMrirDfQxNel83lB63P6A:iVg5tQ7aae+CfQxNEclc5
Malware Config
Extracted
darkcomet
H@ck3d
kelbhie.duckdns.org:5555
DC_MUTEX-AH9W4H5
-
gencode
uGad9yqUjp6P
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 280 svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Error Reporting = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe" f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Error Reporting = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000005c50-55.dat autoit_exe behavioral1/files/0x000a000000005c50-56.dat autoit_exe behavioral1/files/0x000a000000005c50-57.dat autoit_exe behavioral1/files/0x000a000000005c50-58.dat autoit_exe behavioral1/files/0x000a000000005c50-60.dat autoit_exe behavioral1/files/0x000a000000005c50-62.dat autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2028 set thread context of 1656 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 28 PID 280 set thread context of 1888 280 svchost.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 280 svchost.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 280 svchost.exe 280 svchost.exe 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 280 svchost.exe 280 svchost.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 280 svchost.exe 280 svchost.exe 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 280 svchost.exe 280 svchost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2028 wrote to memory of 280 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 27 PID 2028 wrote to memory of 280 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 27 PID 2028 wrote to memory of 280 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 27 PID 2028 wrote to memory of 280 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 27 PID 2028 wrote to memory of 1656 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 28 PID 2028 wrote to memory of 1656 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 28 PID 2028 wrote to memory of 1656 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 28 PID 2028 wrote to memory of 1656 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 28 PID 2028 wrote to memory of 1656 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 28 PID 280 wrote to memory of 1888 280 svchost.exe 29 PID 280 wrote to memory of 1888 280 svchost.exe 29 PID 280 wrote to memory of 1888 280 svchost.exe 29 PID 280 wrote to memory of 1888 280 svchost.exe 29 PID 280 wrote to memory of 1888 280 svchost.exe 29 PID 2028 wrote to memory of 1656 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 28 PID 280 wrote to memory of 1888 280 svchost.exe 29 PID 2028 wrote to memory of 1656 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 28 PID 280 wrote to memory of 1888 280 svchost.exe 29 PID 2028 wrote to memory of 1656 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 28 PID 280 wrote to memory of 1888 280 svchost.exe 29 PID 2028 wrote to memory of 1656 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 28 PID 2028 wrote to memory of 1656 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 28 PID 280 wrote to memory of 1888 280 svchost.exe 29 PID 280 wrote to memory of 1888 280 svchost.exe 29 PID 2028 wrote to memory of 1656 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 28 PID 280 wrote to memory of 1888 280 svchost.exe 29 PID 2028 wrote to memory of 1656 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 28 PID 2028 wrote to memory of 1656 2028 f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe 28 PID 280 wrote to memory of 1888 280 svchost.exe 29 PID 280 wrote to memory of 1888 280 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe"C:\Users\Admin\AppData\Local\Temp\f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\WerFault.exe"C:\Windows\SysWOW64\WerFault.exe"3⤵PID:1888
-
-
-
C:\Windows\SysWOW64\WerFault.exe"C:\Windows\SysWOW64\WerFault.exe"2⤵PID:1656
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
532B
MD59da0116c309282a10d876fbd03af01e8
SHA13d76110d50896b871547793e86ce8ac670fbfc54
SHA2568973d8e9230ce750758cbf6eb71e061cbd83d8e424c37927d47e04aa3a57b953
SHA51238814e5f0f2968162168dbbd1bab76e4b6ba901a6073aa71e094247af6ea65c0f56851567e57edb51245f786bd2b2946ea1039b58e7ac6b0b8c5697cfd12c5f0
-
Filesize
658KB
MD58dbff3d1532c9b82a91a980f68fb24ff
SHA168165e3976598a50c11b92371748ad94ecf40e80
SHA256e51ad14669791fafe158c0fdafc00be4d6db066419ad5a68f539372d46383893
SHA512d50e0e566535afde4e90f2d461969c8d0801bf69fc1a6b6d2c119c36eeeb068db1f367e0b6f69136828bc8ddd97cf5e6178f25aae4439be434569850808198dd
-
Filesize
1.5MB
MD590ca009f81efa96a4fdb9c92308d1160
SHA14d4173207b2f7512b1be4464cabb0df1e32d23a2
SHA256f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8
SHA51204405a292ed33dd8320441e7feaa362f954d258d55ae5295c84457d33ccf1179b51a93855eafc381a53b2a53381676d98ca071be09abf88b212a94b7090e2bc5
-
Filesize
1.5MB
MD590ca009f81efa96a4fdb9c92308d1160
SHA14d4173207b2f7512b1be4464cabb0df1e32d23a2
SHA256f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8
SHA51204405a292ed33dd8320441e7feaa362f954d258d55ae5295c84457d33ccf1179b51a93855eafc381a53b2a53381676d98ca071be09abf88b212a94b7090e2bc5
-
Filesize
1.5MB
MD590ca009f81efa96a4fdb9c92308d1160
SHA14d4173207b2f7512b1be4464cabb0df1e32d23a2
SHA256f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8
SHA51204405a292ed33dd8320441e7feaa362f954d258d55ae5295c84457d33ccf1179b51a93855eafc381a53b2a53381676d98ca071be09abf88b212a94b7090e2bc5
-
Filesize
1.5MB
MD590ca009f81efa96a4fdb9c92308d1160
SHA14d4173207b2f7512b1be4464cabb0df1e32d23a2
SHA256f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8
SHA51204405a292ed33dd8320441e7feaa362f954d258d55ae5295c84457d33ccf1179b51a93855eafc381a53b2a53381676d98ca071be09abf88b212a94b7090e2bc5
-
Filesize
1.5MB
MD590ca009f81efa96a4fdb9c92308d1160
SHA14d4173207b2f7512b1be4464cabb0df1e32d23a2
SHA256f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8
SHA51204405a292ed33dd8320441e7feaa362f954d258d55ae5295c84457d33ccf1179b51a93855eafc381a53b2a53381676d98ca071be09abf88b212a94b7090e2bc5
-
Filesize
1.5MB
MD590ca009f81efa96a4fdb9c92308d1160
SHA14d4173207b2f7512b1be4464cabb0df1e32d23a2
SHA256f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8
SHA51204405a292ed33dd8320441e7feaa362f954d258d55ae5295c84457d33ccf1179b51a93855eafc381a53b2a53381676d98ca071be09abf88b212a94b7090e2bc5