Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 14:31
Static task
static1
Behavioral task
behavioral1
Sample
fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe
Resource
win10v2004-20220812-en
General
-
Target
fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe
-
Size
803KB
-
MD5
3a0639a82455512cc6b3e62de87f4731
-
SHA1
7f326297f899e97954953c779244bbbade00d6f4
-
SHA256
fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb
-
SHA512
47ec748a97461a263b4c677c620296616cac84fa51a0b0212102d4c7350bf9d339fdf7934fa46689fe52a6f0d731157536b6bb85ff3841c03c5b3b8798007779
-
SSDEEP
12288:d8pU57DxU2ku9aM96k+naM3BjuUfS0qAPEIMWDXhE9qGerhRatWu6:a25Jhkm9rnMgUK0qBIVVGeD9
Malware Config
Extracted
darkcomet
Zombie
jacksbotlist.zapto.org:1604
DC_MUTEX-GB0F9SN
-
gencode
oDRF7HD6Rs4F
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\hosts = "C:\\Users\\Admin\\AppData\\Roaming\\hosts\\hosts.exe" fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exedescription pid process target process PID 1584 set thread context of 956 1584 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exedescription pid process Token: SeIncreaseQuotaPrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeSecurityPrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeTakeOwnershipPrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeLoadDriverPrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeSystemProfilePrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeSystemtimePrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeProfSingleProcessPrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeIncBasePriorityPrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeCreatePagefilePrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeBackupPrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeRestorePrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeShutdownPrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeDebugPrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeSystemEnvironmentPrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeChangeNotifyPrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeRemoteShutdownPrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeUndockPrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeManageVolumePrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeImpersonatePrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: SeCreateGlobalPrivilege 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: 33 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: 34 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe Token: 35 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exepid process 956 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exedescription pid process target process PID 1584 wrote to memory of 956 1584 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe PID 1584 wrote to memory of 956 1584 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe PID 1584 wrote to memory of 956 1584 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe PID 1584 wrote to memory of 956 1584 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe PID 1584 wrote to memory of 956 1584 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe PID 1584 wrote to memory of 956 1584 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe PID 1584 wrote to memory of 956 1584 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe PID 1584 wrote to memory of 956 1584 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe PID 1584 wrote to memory of 956 1584 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe PID 1584 wrote to memory of 956 1584 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe PID 1584 wrote to memory of 956 1584 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe PID 1584 wrote to memory of 956 1584 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe PID 1584 wrote to memory of 956 1584 fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe"C:\Users\Admin\AppData\Local\Temp\fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe"C:\Users\Admin\AppData\Local\Temp\fd42ca44c810ec12475aa748620dd57a0aa8565ffb27bfc01201032b0561eceb.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/956-66-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/956-56-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/956-68-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/956-70-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/956-57-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/956-61-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/956-63-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/956-65-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/956-78-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/956-76-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/956-59-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/956-71-0x000000000048F888-mapping.dmp
-
memory/956-72-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/956-74-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1584-75-0x00000000007D6000-0x00000000007E7000-memory.dmpFilesize
68KB
-
memory/1584-55-0x0000000074740000-0x0000000074CEB000-memory.dmpFilesize
5.7MB
-
memory/1584-77-0x0000000074740000-0x0000000074CEB000-memory.dmpFilesize
5.7MB
-
memory/1584-54-0x0000000075241000-0x0000000075243000-memory.dmpFilesize
8KB