Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2023 21:32
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
General
-
Target
tmp.exe
-
Size
831KB
-
MD5
170cc2d01a0099857621c8109950b0be
-
SHA1
48bae0b0edb0599f4a27b3a47c94cefa01334193
-
SHA256
29095ef51d00239aa057d49ff225d51ec328062876cced826014ad6323d0f4b8
-
SHA512
0b5a0ac0e19a4680ad0dd98d9a9aa27225d34fc98a4c972316a8f43ad068bc8692d5d6b1f1d6be2dff34807a4c3853088fbdb2504798c5e6e4d6d883dffda2dd
-
SSDEEP
24576:ZZ1xuVVjfFoynPaVBUR8f+kN10EB5J+C4xSKl:DQDgok30S54D
Malware Config
Extracted
darkcomet
±ö¿Í16
107.151.201.137:1604
107.151.201.137:2331
DC_MUTEX-5JH1AAN
-
gencode
59l922lsejvY
-
install
false
-
offline_keylogger
true
-
password
43994399
-
persistence
false
Signatures
-
ACProtect 1.3x - 1.4x DLL software 5 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\dviD323.tmp acprotect C:\Users\Admin\AppData\Local\Temp\dviD323.tmp acprotect C:\Users\Admin\AppData\Local\Temp\dviD323.tmp acprotect C:\Users\Admin\AppData\Local\Temp\dviD323.tmp acprotect C:\Users\Admin\AppData\Local\Temp\dviD323.tmp acprotect -
Loads dropped DLL 4 IoCs
Processes:
tmp.exenotepad.exepid process 3276 tmp.exe 3276 tmp.exe 3848 notepad.exe 3848 notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
tmp.exedescription pid process Token: SeIncreaseQuotaPrivilege 3276 tmp.exe Token: SeSecurityPrivilege 3276 tmp.exe Token: SeTakeOwnershipPrivilege 3276 tmp.exe Token: SeLoadDriverPrivilege 3276 tmp.exe Token: SeSystemProfilePrivilege 3276 tmp.exe Token: SeSystemtimePrivilege 3276 tmp.exe Token: SeProfSingleProcessPrivilege 3276 tmp.exe Token: SeIncBasePriorityPrivilege 3276 tmp.exe Token: SeCreatePagefilePrivilege 3276 tmp.exe Token: SeBackupPrivilege 3276 tmp.exe Token: SeRestorePrivilege 3276 tmp.exe Token: SeShutdownPrivilege 3276 tmp.exe Token: SeDebugPrivilege 3276 tmp.exe Token: SeSystemEnvironmentPrivilege 3276 tmp.exe Token: SeChangeNotifyPrivilege 3276 tmp.exe Token: SeRemoteShutdownPrivilege 3276 tmp.exe Token: SeUndockPrivilege 3276 tmp.exe Token: SeManageVolumePrivilege 3276 tmp.exe Token: SeImpersonatePrivilege 3276 tmp.exe Token: SeCreateGlobalPrivilege 3276 tmp.exe Token: 33 3276 tmp.exe Token: 34 3276 tmp.exe Token: 35 3276 tmp.exe Token: 36 3276 tmp.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
tmp.exepid process 3276 tmp.exe 3276 tmp.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
tmp.exedescription pid process target process PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe PID 3276 wrote to memory of 3848 3276 tmp.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dviD323.tmpFilesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
C:\Users\Admin\AppData\Local\Temp\dviD323.tmpFilesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
C:\Users\Admin\AppData\Local\Temp\dviD323.tmpFilesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
C:\Users\Admin\AppData\Local\Temp\dviD323.tmpFilesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
C:\Users\Admin\AppData\Local\Temp\dviD323.tmpFilesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
memory/3276-140-0x0000000002210000-0x0000000002283000-memory.dmpFilesize
460KB
-
memory/3276-141-0x0000000002420000-0x0000000002421000-memory.dmpFilesize
4KB
-
memory/3276-133-0x0000000000400000-0x00000000004B3000-memory.dmpFilesize
716KB
-
memory/3276-147-0x0000000000400000-0x00000000004B3000-memory.dmpFilesize
716KB
-
memory/3276-148-0x0000000002210000-0x0000000002283000-memory.dmpFilesize
460KB
-
memory/3848-142-0x0000000000780000-0x0000000000781000-memory.dmpFilesize
4KB
-
memory/3848-146-0x0000000000EE0000-0x0000000000F53000-memory.dmpFilesize
460KB
-
memory/3848-185-0x0000000000EE0000-0x0000000000F53000-memory.dmpFilesize
460KB