Analysis
-
max time kernel
155s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 10:15
Behavioral task
behavioral1
Sample
b00873e05729f1a9924e57e66594cfda4af9869824ee3a5069aad9de0fc37411.exe
Resource
win7-20221111-en
General
-
Target
b00873e05729f1a9924e57e66594cfda4af9869824ee3a5069aad9de0fc37411.exe
-
Size
411KB
-
MD5
8ad534532990d0621cf1786d380ae9dd
-
SHA1
9c1ccd4ff0874f2912dadebd318bf44886d9f1f4
-
SHA256
b00873e05729f1a9924e57e66594cfda4af9869824ee3a5069aad9de0fc37411
-
SHA512
3a36a93740e2cd8805372522bfe7149802f0891977e2a0dbb2b50362966fa586e4854807bdabcdc9fdd34a40908d607343cfda1a2c27174b8aeaea4ee296c7dc
-
SSDEEP
12288:mlghoSqHNJ/Jj0l5e7kurPQHr5wv1hlajScDlu:sg2HNb0lM7z0Wv6Dlu
Malware Config
Extracted
darkcomet
Main
youknowwhat.zapto.org:8568
DC_MUTEX-RSSVB20
-
gencode
1cfcWSgmK4PV
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Stage2.exeStage1.exepid process 4720 Stage2.exe 3108 Stage1.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 4316 attrib.exe 64 attrib.exe -
Processes:
resource yara_rule behavioral2/memory/4232-132-0x0000000000400000-0x0000000000424000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\Stage2.exe upx C:\Users\Admin\AppData\Local\Temp\Stage2.exe upx behavioral2/memory/4720-136-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral2/memory/4720-137-0x0000000000400000-0x0000000000443000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b00873e05729f1a9924e57e66594cfda4af9869824ee3a5069aad9de0fc37411.exeStage1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation b00873e05729f1a9924e57e66594cfda4af9869824ee3a5069aad9de0fc37411.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation Stage1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Stage1.exepid process 3108 Stage1.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
Stage1.exedescription pid process Token: SeIncreaseQuotaPrivilege 3108 Stage1.exe Token: SeSecurityPrivilege 3108 Stage1.exe Token: SeTakeOwnershipPrivilege 3108 Stage1.exe Token: SeLoadDriverPrivilege 3108 Stage1.exe Token: SeSystemProfilePrivilege 3108 Stage1.exe Token: SeSystemtimePrivilege 3108 Stage1.exe Token: SeProfSingleProcessPrivilege 3108 Stage1.exe Token: SeIncBasePriorityPrivilege 3108 Stage1.exe Token: SeCreatePagefilePrivilege 3108 Stage1.exe Token: SeBackupPrivilege 3108 Stage1.exe Token: SeRestorePrivilege 3108 Stage1.exe Token: SeShutdownPrivilege 3108 Stage1.exe Token: SeDebugPrivilege 3108 Stage1.exe Token: SeSystemEnvironmentPrivilege 3108 Stage1.exe Token: SeChangeNotifyPrivilege 3108 Stage1.exe Token: SeRemoteShutdownPrivilege 3108 Stage1.exe Token: SeUndockPrivilege 3108 Stage1.exe Token: SeManageVolumePrivilege 3108 Stage1.exe Token: SeImpersonatePrivilege 3108 Stage1.exe Token: SeCreateGlobalPrivilege 3108 Stage1.exe Token: 33 3108 Stage1.exe Token: 34 3108 Stage1.exe Token: 35 3108 Stage1.exe Token: 36 3108 Stage1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Stage1.exepid process 3108 Stage1.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
b00873e05729f1a9924e57e66594cfda4af9869824ee3a5069aad9de0fc37411.exeStage1.execmd.execmd.exedescription pid process target process PID 4232 wrote to memory of 4720 4232 b00873e05729f1a9924e57e66594cfda4af9869824ee3a5069aad9de0fc37411.exe Stage2.exe PID 4232 wrote to memory of 4720 4232 b00873e05729f1a9924e57e66594cfda4af9869824ee3a5069aad9de0fc37411.exe Stage2.exe PID 4232 wrote to memory of 4720 4232 b00873e05729f1a9924e57e66594cfda4af9869824ee3a5069aad9de0fc37411.exe Stage2.exe PID 4232 wrote to memory of 3108 4232 b00873e05729f1a9924e57e66594cfda4af9869824ee3a5069aad9de0fc37411.exe Stage1.exe PID 4232 wrote to memory of 3108 4232 b00873e05729f1a9924e57e66594cfda4af9869824ee3a5069aad9de0fc37411.exe Stage1.exe PID 4232 wrote to memory of 3108 4232 b00873e05729f1a9924e57e66594cfda4af9869824ee3a5069aad9de0fc37411.exe Stage1.exe PID 3108 wrote to memory of 3924 3108 Stage1.exe cmd.exe PID 3108 wrote to memory of 3924 3108 Stage1.exe cmd.exe PID 3108 wrote to memory of 3924 3108 Stage1.exe cmd.exe PID 3108 wrote to memory of 3444 3108 Stage1.exe cmd.exe PID 3108 wrote to memory of 3444 3108 Stage1.exe cmd.exe PID 3108 wrote to memory of 3444 3108 Stage1.exe cmd.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3924 wrote to memory of 4316 3924 cmd.exe attrib.exe PID 3924 wrote to memory of 4316 3924 cmd.exe attrib.exe PID 3924 wrote to memory of 4316 3924 cmd.exe attrib.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3108 wrote to memory of 3440 3108 Stage1.exe notepad.exe PID 3444 wrote to memory of 64 3444 cmd.exe attrib.exe PID 3444 wrote to memory of 64 3444 cmd.exe attrib.exe PID 3444 wrote to memory of 64 3444 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 4316 attrib.exe 64 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b00873e05729f1a9924e57e66594cfda4af9869824ee3a5069aad9de0fc37411.exe"C:\Users\Admin\AppData\Local\Temp\b00873e05729f1a9924e57e66594cfda4af9869824ee3a5069aad9de0fc37411.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Stage2.exe"C:\Users\Admin\AppData\Local\Temp\Stage2.exe" x -y -oC:\Users\Admin\AppData\Local\Temp -pxnq8rPMxVI87ciGwWJHxRTy3iauHcIirteOOELv3B5vkS9kJoHBUAahY1dWxj8yA2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Stage1.exe"C:\Users\Admin\AppData\Local\Temp\Stage1.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\Stage1.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\Stage1.exe" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Stage1.exeFilesize
691KB
MD5c4d571eb966b037c2061aa29fb01943f
SHA1f802ea85030ddfde9e642b7b38c9e28bb65c03e8
SHA2563fd7ce3f71f9b39db14f25dffe37cbc64f7959e34ecedf6b2ae5139d46805ab0
SHA51246899fbfe5bdeeb5043c205ca5e10c76e54a4c7976ec012d466a097b334502228485fc2b5343f97eaa40f2ef8f9120fa601b60dc8f6a53b7b8c41a8820ab8ab1
-
C:\Users\Admin\AppData\Local\Temp\Stage1.exeFilesize
691KB
MD5c4d571eb966b037c2061aa29fb01943f
SHA1f802ea85030ddfde9e642b7b38c9e28bb65c03e8
SHA2563fd7ce3f71f9b39db14f25dffe37cbc64f7959e34ecedf6b2ae5139d46805ab0
SHA51246899fbfe5bdeeb5043c205ca5e10c76e54a4c7976ec012d466a097b334502228485fc2b5343f97eaa40f2ef8f9120fa601b60dc8f6a53b7b8c41a8820ab8ab1
-
C:\Users\Admin\AppData\Local\Temp\Stage2.exeFilesize
364KB
MD5955ec61291fa76ee822e2153f7fe6d51
SHA192502e7d90dffcfb116415c4972fcb348f4df3e3
SHA25608dcd36115164e9d44cd2d28dd4e2ac89783f1246cdcde6ebc5f3a4e16752c96
SHA512754c8e20539826ad207187e6bff2801faf106eef86fe0864992528d1b45e74e540002e7862202564cdec0733c0793dee839fbab7b5ab764c0dc3a7a9c41ab610
-
C:\Users\Admin\AppData\Local\Temp\Stage2.exeFilesize
364KB
MD5955ec61291fa76ee822e2153f7fe6d51
SHA192502e7d90dffcfb116415c4972fcb348f4df3e3
SHA25608dcd36115164e9d44cd2d28dd4e2ac89783f1246cdcde6ebc5f3a4e16752c96
SHA512754c8e20539826ad207187e6bff2801faf106eef86fe0864992528d1b45e74e540002e7862202564cdec0733c0793dee839fbab7b5ab764c0dc3a7a9c41ab610
-
memory/64-145-0x0000000000000000-mapping.dmp
-
memory/3108-139-0x0000000000000000-mapping.dmp
-
memory/3440-143-0x0000000000000000-mapping.dmp
-
memory/3444-142-0x0000000000000000-mapping.dmp
-
memory/3924-141-0x0000000000000000-mapping.dmp
-
memory/4232-132-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/4316-144-0x0000000000000000-mapping.dmp
-
memory/4720-136-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/4720-137-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/4720-133-0x0000000000000000-mapping.dmp