Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-01-2023 04:29
Static task
static1
Behavioral task
behavioral1
Sample
b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe
Resource
win7-20220812-en
General
-
Target
b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe
-
Size
752KB
-
MD5
7ae82a0eb34716b9157d187dc6fc92b0
-
SHA1
37355e07e919c4f11e8891328ae6a33f5a9e1c98
-
SHA256
b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e
-
SHA512
8f5eac8d5169cf3b292408a9eea4e73c87b37cb10132ec98e3b29db71936f85c3932e4b9b2a9ab7a9750172a64c59351854262b39b3878f9664cd0ebc6e92a9d
-
SSDEEP
12288:o977/I/+E7vLImA7AEiEbii6d3lDXAwmptdyETbb6K3cTRhwk:oFnXiEyJlDXpQyYiKs
Malware Config
Extracted
darkcomet
DC
silentr0ck.no-ip.org:200
DC_MUTEX-GFB9NCY
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
wSXulC9TtV8h
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
rundll32
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 1372 msdcsc.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 1980 attrib.exe 1872 attrib.exe -
Loads dropped DLL 1 IoCs
Processes:
svchost.exepid process 1020 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rundll32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" svchost.exe -
Drops file in System32 directory 1 IoCs
Processes:
attrib.exedescription ioc process File opened for modification C:\Windows\SysWOW64\svchost.exe attrib.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exedescription pid process target process PID 1612 set thread context of 1020 1612 b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe svchost.exe -
Drops file in Windows directory 1 IoCs
Processes:
attrib.exedescription ioc process File opened for modification C:\Windows\SysWOW64 attrib.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exesvchost.exedescription pid process Token: SeDebugPrivilege 1612 b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe Token: SeIncreaseQuotaPrivilege 1020 svchost.exe Token: SeSecurityPrivilege 1020 svchost.exe Token: SeTakeOwnershipPrivilege 1020 svchost.exe Token: SeLoadDriverPrivilege 1020 svchost.exe Token: SeSystemProfilePrivilege 1020 svchost.exe Token: SeSystemtimePrivilege 1020 svchost.exe Token: SeProfSingleProcessPrivilege 1020 svchost.exe Token: SeIncBasePriorityPrivilege 1020 svchost.exe Token: SeCreatePagefilePrivilege 1020 svchost.exe Token: SeBackupPrivilege 1020 svchost.exe Token: SeRestorePrivilege 1020 svchost.exe Token: SeShutdownPrivilege 1020 svchost.exe Token: SeDebugPrivilege 1020 svchost.exe Token: SeSystemEnvironmentPrivilege 1020 svchost.exe Token: SeChangeNotifyPrivilege 1020 svchost.exe Token: SeRemoteShutdownPrivilege 1020 svchost.exe Token: SeUndockPrivilege 1020 svchost.exe Token: SeManageVolumePrivilege 1020 svchost.exe Token: SeImpersonatePrivilege 1020 svchost.exe Token: SeCreateGlobalPrivilege 1020 svchost.exe Token: 33 1020 svchost.exe Token: 34 1020 svchost.exe Token: 35 1020 svchost.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exesvchost.execmd.execmd.exedescription pid process target process PID 1612 wrote to memory of 1020 1612 b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe svchost.exe PID 1612 wrote to memory of 1020 1612 b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe svchost.exe PID 1612 wrote to memory of 1020 1612 b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe svchost.exe PID 1612 wrote to memory of 1020 1612 b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe svchost.exe PID 1612 wrote to memory of 1020 1612 b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe svchost.exe PID 1612 wrote to memory of 1020 1612 b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe svchost.exe PID 1612 wrote to memory of 1020 1612 b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe svchost.exe PID 1612 wrote to memory of 1020 1612 b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe svchost.exe PID 1612 wrote to memory of 1020 1612 b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe svchost.exe PID 1612 wrote to memory of 1020 1612 b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe svchost.exe PID 1612 wrote to memory of 1020 1612 b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe svchost.exe PID 1612 wrote to memory of 1020 1612 b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe svchost.exe PID 1612 wrote to memory of 1020 1612 b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe svchost.exe PID 1020 wrote to memory of 2012 1020 svchost.exe cmd.exe PID 1020 wrote to memory of 2012 1020 svchost.exe cmd.exe PID 1020 wrote to memory of 2012 1020 svchost.exe cmd.exe PID 1020 wrote to memory of 2012 1020 svchost.exe cmd.exe PID 1020 wrote to memory of 1972 1020 svchost.exe cmd.exe PID 1020 wrote to memory of 1972 1020 svchost.exe cmd.exe PID 1020 wrote to memory of 1972 1020 svchost.exe cmd.exe PID 1020 wrote to memory of 1972 1020 svchost.exe cmd.exe PID 2012 wrote to memory of 1872 2012 cmd.exe attrib.exe PID 2012 wrote to memory of 1872 2012 cmd.exe attrib.exe PID 2012 wrote to memory of 1872 2012 cmd.exe attrib.exe PID 2012 wrote to memory of 1872 2012 cmd.exe attrib.exe PID 1972 wrote to memory of 1980 1972 cmd.exe attrib.exe PID 1972 wrote to memory of 1980 1972 cmd.exe attrib.exe PID 1972 wrote to memory of 1980 1972 cmd.exe attrib.exe PID 1972 wrote to memory of 1980 1972 cmd.exe attrib.exe PID 1020 wrote to memory of 1372 1020 svchost.exe msdcsc.exe PID 1020 wrote to memory of 1372 1020 svchost.exe msdcsc.exe PID 1020 wrote to memory of 1372 1020 svchost.exe msdcsc.exe PID 1020 wrote to memory of 1372 1020 svchost.exe msdcsc.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 1872 attrib.exe 1980 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe"C:\Users\Admin\AppData\Local\Temp\b95aab4ab662ec879876add015f81eca69f7ce36c95d3235615498e015cff70e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svchost.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svchost.exe" +s +h4⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64" +s +h4⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exeFilesize
20KB
MD554a47f6b5e09a77e61649109c6a08866
SHA14af001b3c3816b860660cf2de2c0fd3c1dfb4878
SHA256121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2
SHA51288ee0ef5af1b0b38c19ab4c307636352fc403ea74f3bfb17e246f7fd815ac042183086133cd9fe805bd47e15854776871bb7d384e419862c91503eeb82bfb419
-
\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exeFilesize
20KB
MD554a47f6b5e09a77e61649109c6a08866
SHA14af001b3c3816b860660cf2de2c0fd3c1dfb4878
SHA256121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2
SHA51288ee0ef5af1b0b38c19ab4c307636352fc403ea74f3bfb17e246f7fd815ac042183086133cd9fe805bd47e15854776871bb7d384e419862c91503eeb82bfb419
-
memory/1020-71-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1020-69-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1020-60-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1020-62-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1020-64-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1020-65-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1020-67-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1020-70-0x000000000048F888-mapping.dmp
-
memory/1020-82-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1020-58-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1020-55-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1020-74-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1020-56-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1372-80-0x0000000000000000-mapping.dmp
-
memory/1612-73-0x0000000074110000-0x00000000746BB000-memory.dmpFilesize
5.7MB
-
memory/1612-54-0x0000000075091000-0x0000000075093000-memory.dmpFilesize
8KB
-
memory/1872-77-0x0000000000000000-mapping.dmp
-
memory/1972-76-0x0000000000000000-mapping.dmp
-
memory/1980-78-0x0000000000000000-mapping.dmp
-
memory/2012-75-0x0000000000000000-mapping.dmp