Analysis
-
max time kernel
204s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 23:00
Static task
static1
Behavioral task
behavioral1
Sample
c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe
Resource
win7-20221111-en
General
-
Target
c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe
-
Size
271KB
-
MD5
eb0ab5c020d77b0facffe58e4aac1b7b
-
SHA1
2e1802b031d8ab32f6644cd364188bebdd79b002
-
SHA256
c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc
-
SHA512
4ffa02ac5489b0eb8ae63f9e4f6410051a0a685bacde15d7b4571a9bb2276e80d0b9a1c4a6213d4313b05930a056c4a6153bf60caf39121698040e5d8f119492
-
SSDEEP
6144:mgT+seOpJzj1RiZC+Z38N1ppv+ab5qDZLaxbqxBY9WSP:qrAz6ZC+N8fGaCpaxbqxBuP
Malware Config
Extracted
darkcomet
Guest16
.duckdns.org:1604
DC_MUTEX-V5NVLP0
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
xFLum93EqW7N
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe -
Executes dropped EXE 3 IoCs
Processes:
msdcsc.exemsdcsc.exemsdcsc.exepid process 4920 msdcsc.exe 3892 msdcsc.exe 1296 msdcsc.exe -
Processes:
resource yara_rule behavioral2/memory/4832-136-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4832-137-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4832-138-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4832-139-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4832-140-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4832-152-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1296-155-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exemsdcsc.exedescription pid process target process PID 2132 set thread context of 4832 2132 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe PID 4920 set thread context of 1296 4920 msdcsc.exe msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exemsdcsc.exepid process 2132 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe 2132 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe 4920 msdcsc.exe 4920 msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
Processes:
c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exec1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exemsdcsc.exemsdcsc.exedescription pid process Token: SeDebugPrivilege 2132 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeIncreaseQuotaPrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeSecurityPrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeTakeOwnershipPrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeLoadDriverPrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeSystemProfilePrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeSystemtimePrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeProfSingleProcessPrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeIncBasePriorityPrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeCreatePagefilePrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeBackupPrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeRestorePrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeShutdownPrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeDebugPrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeSystemEnvironmentPrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeChangeNotifyPrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeRemoteShutdownPrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeUndockPrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeManageVolumePrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeImpersonatePrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeCreateGlobalPrivilege 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: 33 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: 34 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: 35 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: 36 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe Token: SeDebugPrivilege 4920 msdcsc.exe Token: SeIncreaseQuotaPrivilege 1296 msdcsc.exe Token: SeSecurityPrivilege 1296 msdcsc.exe Token: SeTakeOwnershipPrivilege 1296 msdcsc.exe Token: SeLoadDriverPrivilege 1296 msdcsc.exe Token: SeSystemProfilePrivilege 1296 msdcsc.exe Token: SeSystemtimePrivilege 1296 msdcsc.exe Token: SeProfSingleProcessPrivilege 1296 msdcsc.exe Token: SeIncBasePriorityPrivilege 1296 msdcsc.exe Token: SeCreatePagefilePrivilege 1296 msdcsc.exe Token: SeBackupPrivilege 1296 msdcsc.exe Token: SeRestorePrivilege 1296 msdcsc.exe Token: SeShutdownPrivilege 1296 msdcsc.exe Token: SeDebugPrivilege 1296 msdcsc.exe Token: SeSystemEnvironmentPrivilege 1296 msdcsc.exe Token: SeChangeNotifyPrivilege 1296 msdcsc.exe Token: SeRemoteShutdownPrivilege 1296 msdcsc.exe Token: SeUndockPrivilege 1296 msdcsc.exe Token: SeManageVolumePrivilege 1296 msdcsc.exe Token: SeImpersonatePrivilege 1296 msdcsc.exe Token: SeCreateGlobalPrivilege 1296 msdcsc.exe Token: 33 1296 msdcsc.exe Token: 34 1296 msdcsc.exe Token: 35 1296 msdcsc.exe Token: 36 1296 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msdcsc.exepid process 1296 msdcsc.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exec1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exemsdcsc.exedescription pid process target process PID 2132 wrote to memory of 5116 2132 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe PID 2132 wrote to memory of 5116 2132 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe PID 2132 wrote to memory of 5116 2132 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe PID 2132 wrote to memory of 4832 2132 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe PID 2132 wrote to memory of 4832 2132 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe PID 2132 wrote to memory of 4832 2132 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe PID 2132 wrote to memory of 4832 2132 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe PID 2132 wrote to memory of 4832 2132 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe PID 2132 wrote to memory of 4832 2132 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe PID 2132 wrote to memory of 4832 2132 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe PID 4832 wrote to memory of 4920 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe msdcsc.exe PID 4832 wrote to memory of 4920 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe msdcsc.exe PID 4832 wrote to memory of 4920 4832 c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe msdcsc.exe PID 4920 wrote to memory of 3892 4920 msdcsc.exe msdcsc.exe PID 4920 wrote to memory of 3892 4920 msdcsc.exe msdcsc.exe PID 4920 wrote to memory of 3892 4920 msdcsc.exe msdcsc.exe PID 4920 wrote to memory of 1296 4920 msdcsc.exe msdcsc.exe PID 4920 wrote to memory of 1296 4920 msdcsc.exe msdcsc.exe PID 4920 wrote to memory of 1296 4920 msdcsc.exe msdcsc.exe PID 4920 wrote to memory of 1296 4920 msdcsc.exe msdcsc.exe PID 4920 wrote to memory of 1296 4920 msdcsc.exe msdcsc.exe PID 4920 wrote to memory of 1296 4920 msdcsc.exe msdcsc.exe PID 4920 wrote to memory of 1296 4920 msdcsc.exe msdcsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe"C:\Users\Admin\AppData\Local\Temp\c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe"C:\Users\Admin\AppData\Local\Temp\c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe"2⤵PID:5116
-
-
C:\Users\Admin\AppData\Local\Temp\c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe"C:\Users\Admin\AppData\Local\Temp\c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
PID:3892
-
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1296
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD5eb0ab5c020d77b0facffe58e4aac1b7b
SHA12e1802b031d8ab32f6644cd364188bebdd79b002
SHA256c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc
SHA5124ffa02ac5489b0eb8ae63f9e4f6410051a0a685bacde15d7b4571a9bb2276e80d0b9a1c4a6213d4313b05930a056c4a6153bf60caf39121698040e5d8f119492
-
Filesize
271KB
MD5eb0ab5c020d77b0facffe58e4aac1b7b
SHA12e1802b031d8ab32f6644cd364188bebdd79b002
SHA256c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc
SHA5124ffa02ac5489b0eb8ae63f9e4f6410051a0a685bacde15d7b4571a9bb2276e80d0b9a1c4a6213d4313b05930a056c4a6153bf60caf39121698040e5d8f119492
-
Filesize
271KB
MD5eb0ab5c020d77b0facffe58e4aac1b7b
SHA12e1802b031d8ab32f6644cd364188bebdd79b002
SHA256c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc
SHA5124ffa02ac5489b0eb8ae63f9e4f6410051a0a685bacde15d7b4571a9bb2276e80d0b9a1c4a6213d4313b05930a056c4a6153bf60caf39121698040e5d8f119492
-
Filesize
271KB
MD5eb0ab5c020d77b0facffe58e4aac1b7b
SHA12e1802b031d8ab32f6644cd364188bebdd79b002
SHA256c1698f1cccd0cf39d9ef3aba436b1beaf17b6b8e4d712d1e99fa063fe3850bdc
SHA5124ffa02ac5489b0eb8ae63f9e4f6410051a0a685bacde15d7b4571a9bb2276e80d0b9a1c4a6213d4313b05930a056c4a6153bf60caf39121698040e5d8f119492