Analysis
-
max time kernel
178s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 18:34
Static task
static1
Behavioral task
behavioral1
Sample
06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe
Resource
win7-20221111-en
General
-
Target
06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe
-
Size
967KB
-
MD5
245d2cec5bb0f3cb375028c72ef684f0
-
SHA1
e4030d976f994697dd482fdae62258b55b0c3eed
-
SHA256
06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66
-
SHA512
59658b4db272d15b4680f6546168f72ea34c7125e45fa91b0694443cb020f1fe2fb92e88e01ca545cc2ccb1420aa208fee4019436a3c9c0947a04a8465e04a59
-
SSDEEP
24576:gRmJkcoQricOIQxiZY1iavReA7pZk0/arYy:VJZoQrbTFZY1iavRtpTcYy
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:321
DC_MUTEX-R0X7EMW
-
gencode
8wq0x7iUlHMN
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1504-64-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1504-66-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1504-67-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1504-70-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1504-72-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1504-73-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1504-74-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1504-75-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
Processes:
06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exedescription pid process target process PID 2040 set thread context of 948 2040 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe PID 948 set thread context of 1504 948 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exedescription pid process Token: SeIncreaseQuotaPrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeSecurityPrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeTakeOwnershipPrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeLoadDriverPrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeSystemProfilePrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeSystemtimePrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeProfSingleProcessPrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeIncBasePriorityPrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeCreatePagefilePrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeBackupPrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeRestorePrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeShutdownPrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeDebugPrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeSystemEnvironmentPrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeChangeNotifyPrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeRemoteShutdownPrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeUndockPrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeManageVolumePrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeImpersonatePrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: SeCreateGlobalPrivilege 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: 33 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: 34 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe Token: 35 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exepid process 948 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe 1504 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exedescription pid process target process PID 2040 wrote to memory of 948 2040 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe PID 2040 wrote to memory of 948 2040 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe PID 2040 wrote to memory of 948 2040 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe PID 2040 wrote to memory of 948 2040 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe PID 2040 wrote to memory of 948 2040 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe PID 2040 wrote to memory of 948 2040 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe PID 948 wrote to memory of 1504 948 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe PID 948 wrote to memory of 1504 948 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe PID 948 wrote to memory of 1504 948 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe PID 948 wrote to memory of 1504 948 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe PID 948 wrote to memory of 1504 948 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe PID 948 wrote to memory of 1504 948 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe PID 948 wrote to memory of 1504 948 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe PID 948 wrote to memory of 1504 948 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe 06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe"C:\Users\Admin\AppData\Local\Temp\06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe"C:\Users\Admin\AppData\Local\Temp\06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\06525df1ba0a8ef25cedd5e010b062eea40a40c3c9862f51afdbc3b2b23f5a66.exe
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/948-69-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/948-55-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/948-57-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/948-58-0x0000000000401094-mapping.dmp
-
memory/948-62-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/1504-67-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1504-64-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1504-66-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1504-68-0x00000000004B5650-mapping.dmp
-
memory/1504-70-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1504-63-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1504-72-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1504-73-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1504-74-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1504-75-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2040-54-0x0000000075591000-0x0000000075593000-memory.dmpFilesize
8KB