Analysis
-
max time kernel
142s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-03-2023 21:32
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
General
-
Target
tmp.exe
-
Size
831KB
-
MD5
170cc2d01a0099857621c8109950b0be
-
SHA1
48bae0b0edb0599f4a27b3a47c94cefa01334193
-
SHA256
29095ef51d00239aa057d49ff225d51ec328062876cced826014ad6323d0f4b8
-
SHA512
0b5a0ac0e19a4680ad0dd98d9a9aa27225d34fc98a4c972316a8f43ad068bc8692d5d6b1f1d6be2dff34807a4c3853088fbdb2504798c5e6e4d6d883dffda2dd
-
SSDEEP
24576:ZZ1xuVVjfFoynPaVBUR8f+kN10EB5J+C4xSKl:DQDgok30S54D
Malware Config
Extracted
darkcomet
±ö¿Í16
107.151.201.137:1604
107.151.201.137:2331
DC_MUTEX-5JH1AAN
-
gencode
59l922lsejvY
-
install
false
-
offline_keylogger
true
-
password
43994399
-
persistence
false
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\dgk4220.tmp acprotect \Users\Admin\AppData\Local\Temp\dgk4220.tmp acprotect C:\Users\Admin\AppData\Local\Temp\dgk4220.tmp acprotect -
Loads dropped DLL 2 IoCs
Processes:
tmp.exenotepad.exepid process 1556 tmp.exe 1500 notepad.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
tmp.exedescription pid process Token: SeIncreaseQuotaPrivilege 1556 tmp.exe Token: SeSecurityPrivilege 1556 tmp.exe Token: SeTakeOwnershipPrivilege 1556 tmp.exe Token: SeLoadDriverPrivilege 1556 tmp.exe Token: SeSystemProfilePrivilege 1556 tmp.exe Token: SeSystemtimePrivilege 1556 tmp.exe Token: SeProfSingleProcessPrivilege 1556 tmp.exe Token: SeIncBasePriorityPrivilege 1556 tmp.exe Token: SeCreatePagefilePrivilege 1556 tmp.exe Token: SeBackupPrivilege 1556 tmp.exe Token: SeRestorePrivilege 1556 tmp.exe Token: SeShutdownPrivilege 1556 tmp.exe Token: SeDebugPrivilege 1556 tmp.exe Token: SeSystemEnvironmentPrivilege 1556 tmp.exe Token: SeChangeNotifyPrivilege 1556 tmp.exe Token: SeRemoteShutdownPrivilege 1556 tmp.exe Token: SeUndockPrivilege 1556 tmp.exe Token: SeManageVolumePrivilege 1556 tmp.exe Token: SeImpersonatePrivilege 1556 tmp.exe Token: SeCreateGlobalPrivilege 1556 tmp.exe Token: 33 1556 tmp.exe Token: 34 1556 tmp.exe Token: 35 1556 tmp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
tmp.exepid process 1556 tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
tmp.exedescription pid process target process PID 1556 wrote to memory of 1500 1556 tmp.exe notepad.exe PID 1556 wrote to memory of 1500 1556 tmp.exe notepad.exe PID 1556 wrote to memory of 1500 1556 tmp.exe notepad.exe PID 1556 wrote to memory of 1500 1556 tmp.exe notepad.exe PID 1556 wrote to memory of 1500 1556 tmp.exe notepad.exe PID 1556 wrote to memory of 1500 1556 tmp.exe notepad.exe PID 1556 wrote to memory of 1500 1556 tmp.exe notepad.exe PID 1556 wrote to memory of 1500 1556 tmp.exe notepad.exe PID 1556 wrote to memory of 1500 1556 tmp.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dgk4220.tmpFilesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
\Users\Admin\AppData\Local\Temp\dgk4220.tmpFilesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
\Users\Admin\AppData\Local\Temp\dgk4220.tmpFilesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
memory/1500-57-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/1500-68-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/1556-65-0x0000000000400000-0x00000000004B3000-memory.dmpFilesize
716KB
-
memory/1556-66-0x0000000001D30000-0x0000000001DA3000-memory.dmpFilesize
460KB
-
memory/1556-67-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/1556-97-0x0000000001D30000-0x0000000001DA3000-memory.dmpFilesize
460KB