Analysis
-
max time kernel
231s -
max time network
218s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe
Resource
win10v2004-20221111-en
General
-
Target
9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe
-
Size
1.3MB
-
MD5
4e2a96f31aee26f5b857856399c13d06
-
SHA1
5184d1f42712dec5380dabd325549210e5437253
-
SHA256
9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b
-
SHA512
187dc02fc0c9c9090f52921f9ad8f478427b4c40c0eaee680f1e4aba04fd3dc677e06651e005b998c2a1f32bef9b052483e6e017185ffa00060160ebc1830dd9
-
SSDEEP
24576:ORmJkcoQricOIQxiZY1iaBA0dAQdtvGw6E8jN4vAgDbI4G8ELRGY0+jz:bJZoQrbTFZY1iaBA4AQAE82ZG50Oz
Malware Config
Extracted
darkcomet
Guest16_min
enviousegend.no-ip.biz:5555
DCMIN_MUTEX-5PYNPYR
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
oTBrCPsCRkpP
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
DarkComet RAT
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\DCSCMIN\\IMDCSC.exe" 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe -
Executes dropped EXE 2 IoCs
pid Process 1476 IMDCSC.exe 532 IMDCSC.exe -
Loads dropped DLL 1 IoCs
pid Process 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\DarkComet RAT = "C:\\Users\\Admin\\Documents\\DCSCMIN\\IMDCSC.exe" 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0009000000012324-63.dat autoit_exe behavioral1/files/0x0009000000012324-65.dat autoit_exe behavioral1/files/0x0009000000012324-67.dat autoit_exe behavioral1/files/0x0009000000012324-73.dat autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 560 set thread context of 1688 560 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe 28 PID 1476 set thread context of 532 1476 IMDCSC.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 560 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe 1476 IMDCSC.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeSecurityPrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeTakeOwnershipPrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeLoadDriverPrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeSystemProfilePrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeSystemtimePrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeProfSingleProcessPrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeIncBasePriorityPrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeCreatePagefilePrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeBackupPrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeRestorePrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeShutdownPrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeDebugPrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeSystemEnvironmentPrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeChangeNotifyPrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeRemoteShutdownPrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeUndockPrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeManageVolumePrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeImpersonatePrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeCreateGlobalPrivilege 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: 33 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: 34 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: 35 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe Token: SeIncreaseQuotaPrivilege 532 IMDCSC.exe Token: SeSecurityPrivilege 532 IMDCSC.exe Token: SeTakeOwnershipPrivilege 532 IMDCSC.exe Token: SeLoadDriverPrivilege 532 IMDCSC.exe Token: SeSystemProfilePrivilege 532 IMDCSC.exe Token: SeSystemtimePrivilege 532 IMDCSC.exe Token: SeProfSingleProcessPrivilege 532 IMDCSC.exe Token: SeIncBasePriorityPrivilege 532 IMDCSC.exe Token: SeCreatePagefilePrivilege 532 IMDCSC.exe Token: SeBackupPrivilege 532 IMDCSC.exe Token: SeRestorePrivilege 532 IMDCSC.exe Token: SeShutdownPrivilege 532 IMDCSC.exe Token: SeDebugPrivilege 532 IMDCSC.exe Token: SeSystemEnvironmentPrivilege 532 IMDCSC.exe Token: SeChangeNotifyPrivilege 532 IMDCSC.exe Token: SeRemoteShutdownPrivilege 532 IMDCSC.exe Token: SeUndockPrivilege 532 IMDCSC.exe Token: SeManageVolumePrivilege 532 IMDCSC.exe Token: SeImpersonatePrivilege 532 IMDCSC.exe Token: SeCreateGlobalPrivilege 532 IMDCSC.exe Token: 33 532 IMDCSC.exe Token: 34 532 IMDCSC.exe Token: 35 532 IMDCSC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 532 IMDCSC.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 560 wrote to memory of 1688 560 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe 28 PID 560 wrote to memory of 1688 560 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe 28 PID 560 wrote to memory of 1688 560 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe 28 PID 560 wrote to memory of 1688 560 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe 28 PID 560 wrote to memory of 1688 560 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe 28 PID 560 wrote to memory of 1688 560 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe 28 PID 1688 wrote to memory of 1476 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe 29 PID 1688 wrote to memory of 1476 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe 29 PID 1688 wrote to memory of 1476 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe 29 PID 1688 wrote to memory of 1476 1688 9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe 29 PID 1476 wrote to memory of 532 1476 IMDCSC.exe 30 PID 1476 wrote to memory of 532 1476 IMDCSC.exe 30 PID 1476 wrote to memory of 532 1476 IMDCSC.exe 30 PID 1476 wrote to memory of 532 1476 IMDCSC.exe 30 PID 1476 wrote to memory of 532 1476 IMDCSC.exe 30 PID 1476 wrote to memory of 532 1476 IMDCSC.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe"C:\Users\Admin\AppData\Local\Temp\9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe"C:\Users\Admin\AppData\Local\Temp\9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:532
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
658KB
MD5b5717a8ed3ef57d5c0bb9ec0fab7ec8b
SHA1839aa036575e34775fe53e295f5c11fb58bfa0c2
SHA2564f00fa652c24d6c882cc264970baa5d7a94d5fa61cf91411d1b0b2d3e4ca1bcf
SHA51284d52fe8f1c4d2c93972985e2f2a73c953a4bda704ce0f78eb751ce8a8e5d94a91311123ba27396a6031f4c0dbf87201581390aaa32c9e3aa66beab4a1f99771
-
Filesize
1.3MB
MD54e2a96f31aee26f5b857856399c13d06
SHA15184d1f42712dec5380dabd325549210e5437253
SHA2569bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b
SHA512187dc02fc0c9c9090f52921f9ad8f478427b4c40c0eaee680f1e4aba04fd3dc677e06651e005b998c2a1f32bef9b052483e6e017185ffa00060160ebc1830dd9
-
Filesize
1.3MB
MD54e2a96f31aee26f5b857856399c13d06
SHA15184d1f42712dec5380dabd325549210e5437253
SHA2569bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b
SHA512187dc02fc0c9c9090f52921f9ad8f478427b4c40c0eaee680f1e4aba04fd3dc677e06651e005b998c2a1f32bef9b052483e6e017185ffa00060160ebc1830dd9
-
Filesize
1.3MB
MD54e2a96f31aee26f5b857856399c13d06
SHA15184d1f42712dec5380dabd325549210e5437253
SHA2569bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b
SHA512187dc02fc0c9c9090f52921f9ad8f478427b4c40c0eaee680f1e4aba04fd3dc677e06651e005b998c2a1f32bef9b052483e6e017185ffa00060160ebc1830dd9
-
Filesize
1.3MB
MD54e2a96f31aee26f5b857856399c13d06
SHA15184d1f42712dec5380dabd325549210e5437253
SHA2569bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b
SHA512187dc02fc0c9c9090f52921f9ad8f478427b4c40c0eaee680f1e4aba04fd3dc677e06651e005b998c2a1f32bef9b052483e6e017185ffa00060160ebc1830dd9