Analysis
-
max time kernel
151s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe
Resource
win10v2004-20220901-en
General
-
Target
cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe
-
Size
769KB
-
MD5
ffc476cc5de1540f3e0d41d4b87b66c9
-
SHA1
fd8891cd1474bad8defe4f99386cb505b7f8b577
-
SHA256
cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d
-
SHA512
0953fefc861cca9aa818079962990653815d93be50de058e50e1d5d668f2d3616679473aad677649401464882637b985d712ae5a8d3155f5993ed9cc93bc7f26
-
SSDEEP
24576:LTvW/wxXSknYDkoR4HTaF1nP9tXGVnmpW:LTvW/wxTnYoTS1P6gpW
Malware Config
Extracted
darkcomet
XP
fahimjan.no-ip.biz:1008
DC_MUTEX-DSCVTSP
-
gencode
g901jEZ864Tb
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1928 wab32.exe 1400 DirectDB.exe -
Loads dropped DLL 2 IoCs
pid Process 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\wab32.exe" wab32.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2028 set thread context of 2036 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 28 PID 1400 set thread context of 1548 1400 DirectDB.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe 1400 DirectDB.exe 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 1928 wab32.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe Token: SeIncreaseQuotaPrivilege 2036 AppLaunch.exe Token: SeSecurityPrivilege 2036 AppLaunch.exe Token: SeTakeOwnershipPrivilege 2036 AppLaunch.exe Token: SeLoadDriverPrivilege 2036 AppLaunch.exe Token: SeSystemProfilePrivilege 2036 AppLaunch.exe Token: SeSystemtimePrivilege 2036 AppLaunch.exe Token: SeProfSingleProcessPrivilege 2036 AppLaunch.exe Token: SeIncBasePriorityPrivilege 2036 AppLaunch.exe Token: SeCreatePagefilePrivilege 2036 AppLaunch.exe Token: SeBackupPrivilege 2036 AppLaunch.exe Token: SeRestorePrivilege 2036 AppLaunch.exe Token: SeShutdownPrivilege 2036 AppLaunch.exe Token: SeDebugPrivilege 2036 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 2036 AppLaunch.exe Token: SeChangeNotifyPrivilege 2036 AppLaunch.exe Token: SeRemoteShutdownPrivilege 2036 AppLaunch.exe Token: SeUndockPrivilege 2036 AppLaunch.exe Token: SeManageVolumePrivilege 2036 AppLaunch.exe Token: SeImpersonatePrivilege 2036 AppLaunch.exe Token: SeCreateGlobalPrivilege 2036 AppLaunch.exe Token: 33 2036 AppLaunch.exe Token: 34 2036 AppLaunch.exe Token: 35 2036 AppLaunch.exe Token: SeDebugPrivilege 1928 wab32.exe Token: SeDebugPrivilege 1400 DirectDB.exe Token: SeIncreaseQuotaPrivilege 1548 AppLaunch.exe Token: SeSecurityPrivilege 1548 AppLaunch.exe Token: SeTakeOwnershipPrivilege 1548 AppLaunch.exe Token: SeLoadDriverPrivilege 1548 AppLaunch.exe Token: SeSystemProfilePrivilege 1548 AppLaunch.exe Token: SeSystemtimePrivilege 1548 AppLaunch.exe Token: SeProfSingleProcessPrivilege 1548 AppLaunch.exe Token: SeIncBasePriorityPrivilege 1548 AppLaunch.exe Token: SeCreatePagefilePrivilege 1548 AppLaunch.exe Token: SeBackupPrivilege 1548 AppLaunch.exe Token: SeRestorePrivilege 1548 AppLaunch.exe Token: SeShutdownPrivilege 1548 AppLaunch.exe Token: SeDebugPrivilege 1548 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 1548 AppLaunch.exe Token: SeChangeNotifyPrivilege 1548 AppLaunch.exe Token: SeRemoteShutdownPrivilege 1548 AppLaunch.exe Token: SeUndockPrivilege 1548 AppLaunch.exe Token: SeManageVolumePrivilege 1548 AppLaunch.exe Token: SeImpersonatePrivilege 1548 AppLaunch.exe Token: SeCreateGlobalPrivilege 1548 AppLaunch.exe Token: 33 1548 AppLaunch.exe Token: 34 1548 AppLaunch.exe Token: 35 1548 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2036 AppLaunch.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2036 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 28 PID 2028 wrote to memory of 2036 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 28 PID 2028 wrote to memory of 2036 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 28 PID 2028 wrote to memory of 2036 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 28 PID 2028 wrote to memory of 2036 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 28 PID 2028 wrote to memory of 2036 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 28 PID 2028 wrote to memory of 2036 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 28 PID 2028 wrote to memory of 2036 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 28 PID 2028 wrote to memory of 2036 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 28 PID 2028 wrote to memory of 2036 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 28 PID 2028 wrote to memory of 2036 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 28 PID 2028 wrote to memory of 2036 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 28 PID 2028 wrote to memory of 2036 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 28 PID 2028 wrote to memory of 2036 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 28 PID 2028 wrote to memory of 2036 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 28 PID 2028 wrote to memory of 2036 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 28 PID 2028 wrote to memory of 1928 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 29 PID 2028 wrote to memory of 1928 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 29 PID 2028 wrote to memory of 1928 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 29 PID 2028 wrote to memory of 1928 2028 cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe 29 PID 1928 wrote to memory of 1400 1928 wab32.exe 30 PID 1928 wrote to memory of 1400 1928 wab32.exe 30 PID 1928 wrote to memory of 1400 1928 wab32.exe 30 PID 1928 wrote to memory of 1400 1928 wab32.exe 30 PID 1400 wrote to memory of 1548 1400 DirectDB.exe 31 PID 1400 wrote to memory of 1548 1400 DirectDB.exe 31 PID 1400 wrote to memory of 1548 1400 DirectDB.exe 31 PID 1400 wrote to memory of 1548 1400 DirectDB.exe 31 PID 1400 wrote to memory of 1548 1400 DirectDB.exe 31 PID 1400 wrote to memory of 1548 1400 DirectDB.exe 31 PID 1400 wrote to memory of 1548 1400 DirectDB.exe 31 PID 1400 wrote to memory of 1548 1400 DirectDB.exe 31 PID 1400 wrote to memory of 1548 1400 DirectDB.exe 31 PID 1400 wrote to memory of 1548 1400 DirectDB.exe 31 PID 1400 wrote to memory of 1548 1400 DirectDB.exe 31 PID 1400 wrote to memory of 1548 1400 DirectDB.exe 31 PID 1400 wrote to memory of 1548 1400 DirectDB.exe 31 PID 1400 wrote to memory of 1548 1400 DirectDB.exe 31 PID 1400 wrote to memory of 1548 1400 DirectDB.exe 31 PID 1400 wrote to memory of 1548 1400 DirectDB.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe"C:\Users\Admin\AppData\Local\Temp\cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2036
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\wab32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\wab32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\DirectDB.exe"C:\Users\Admin\AppData\Local\Temp\DirectDB.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
769KB
MD5ffc476cc5de1540f3e0d41d4b87b66c9
SHA1fd8891cd1474bad8defe4f99386cb505b7f8b577
SHA256cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d
SHA5120953fefc861cca9aa818079962990653815d93be50de058e50e1d5d668f2d3616679473aad677649401464882637b985d712ae5a8d3155f5993ed9cc93bc7f26
-
Filesize
769KB
MD5ffc476cc5de1540f3e0d41d4b87b66c9
SHA1fd8891cd1474bad8defe4f99386cb505b7f8b577
SHA256cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d
SHA5120953fefc861cca9aa818079962990653815d93be50de058e50e1d5d668f2d3616679473aad677649401464882637b985d712ae5a8d3155f5993ed9cc93bc7f26
-
Filesize
19KB
MD550b774e30409d714dddd23e638629cf8
SHA1a6ae1975c08e993cf6ee0c340bc7027aed4cd751
SHA25634517399a1b2ca0d2ecfa1cc866c1531ddab22fa7b3d414be88c4b6ee96dc457
SHA512126b672a550c37376fcf9e99e43df16df92e34f89d583760ed12f268a0c7599298edd425d01f7ab421639ebaad50d4123005f187289130f018acb7a4de2f41d8
-
Filesize
19KB
MD550b774e30409d714dddd23e638629cf8
SHA1a6ae1975c08e993cf6ee0c340bc7027aed4cd751
SHA25634517399a1b2ca0d2ecfa1cc866c1531ddab22fa7b3d414be88c4b6ee96dc457
SHA512126b672a550c37376fcf9e99e43df16df92e34f89d583760ed12f268a0c7599298edd425d01f7ab421639ebaad50d4123005f187289130f018acb7a4de2f41d8
-
Filesize
769KB
MD5ffc476cc5de1540f3e0d41d4b87b66c9
SHA1fd8891cd1474bad8defe4f99386cb505b7f8b577
SHA256cc0598c56a2723f4fb2d2d37fa29508fa7b14b28fa50e0eeac67b4102c9fd50d
SHA5120953fefc861cca9aa818079962990653815d93be50de058e50e1d5d668f2d3616679473aad677649401464882637b985d712ae5a8d3155f5993ed9cc93bc7f26
-
Filesize
19KB
MD550b774e30409d714dddd23e638629cf8
SHA1a6ae1975c08e993cf6ee0c340bc7027aed4cd751
SHA25634517399a1b2ca0d2ecfa1cc866c1531ddab22fa7b3d414be88c4b6ee96dc457
SHA512126b672a550c37376fcf9e99e43df16df92e34f89d583760ed12f268a0c7599298edd425d01f7ab421639ebaad50d4123005f187289130f018acb7a4de2f41d8