Analysis
-
max time kernel
138s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
10/07/2023, 08:00
Behavioral task
behavioral1
Sample
230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe
Resource
win10v2004-20230703-en
General
-
Target
230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe
-
Size
745KB
-
MD5
c0e4f49d4ea30fe8e04fdba223b44f24
-
SHA1
42d85163e18f35fd435b5f96a0bce10b8336b440
-
SHA256
230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe
-
SHA512
127923ce8310070ef1083b66f92ad5b7faeabb29f2540554fd833e6132d85478f55415344127760f04fe44a7ef8a0acd243d1dec5279510567a4a64777911abc
-
SSDEEP
12288:w8UaT9XY2siA0bMG09xD7I3Gg8ecgVvfBoCDBOQQYbVXpuy1f/gORixB:pUKoN0bUxgGa/pfBHDb+y1HgZ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\darkcomet.exe" 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2056 attrib.exe 2128 attrib.exe -
Executes dropped EXE 1 IoCs
pid Process 560 darkcomet.exe -
Loads dropped DLL 2 IoCs
pid Process 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Run\DarkCometInstall = "C:\\Users\\Admin\\Documents\\MSDCSC\\darkcomet.exe" darkcomet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Run\DarkCometInstall = "C:\\Users\\Admin\\Documents\\MSDCSC\\darkcomet.exe" 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 560 darkcomet.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeSecurityPrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeTakeOwnershipPrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeLoadDriverPrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeSystemProfilePrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeSystemtimePrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeProfSingleProcessPrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeIncBasePriorityPrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeCreatePagefilePrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeBackupPrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeRestorePrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeShutdownPrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeDebugPrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeSystemEnvironmentPrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeChangeNotifyPrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeRemoteShutdownPrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeUndockPrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeManageVolumePrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeImpersonatePrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeCreateGlobalPrivilege 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: 33 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: 34 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: 35 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe Token: SeIncreaseQuotaPrivilege 560 darkcomet.exe Token: SeSecurityPrivilege 560 darkcomet.exe Token: SeTakeOwnershipPrivilege 560 darkcomet.exe Token: SeLoadDriverPrivilege 560 darkcomet.exe Token: SeSystemProfilePrivilege 560 darkcomet.exe Token: SeSystemtimePrivilege 560 darkcomet.exe Token: SeProfSingleProcessPrivilege 560 darkcomet.exe Token: SeIncBasePriorityPrivilege 560 darkcomet.exe Token: SeCreatePagefilePrivilege 560 darkcomet.exe Token: SeBackupPrivilege 560 darkcomet.exe Token: SeRestorePrivilege 560 darkcomet.exe Token: SeShutdownPrivilege 560 darkcomet.exe Token: SeDebugPrivilege 560 darkcomet.exe Token: SeSystemEnvironmentPrivilege 560 darkcomet.exe Token: SeChangeNotifyPrivilege 560 darkcomet.exe Token: SeRemoteShutdownPrivilege 560 darkcomet.exe Token: SeUndockPrivilege 560 darkcomet.exe Token: SeManageVolumePrivilege 560 darkcomet.exe Token: SeImpersonatePrivilege 560 darkcomet.exe Token: SeCreateGlobalPrivilege 560 darkcomet.exe Token: 33 560 darkcomet.exe Token: 34 560 darkcomet.exe Token: 35 560 darkcomet.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 560 darkcomet.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2912 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe 27 PID 2796 wrote to memory of 2912 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe 27 PID 2796 wrote to memory of 2912 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe 27 PID 2796 wrote to memory of 2912 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe 27 PID 2796 wrote to memory of 2900 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe 28 PID 2796 wrote to memory of 2900 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe 28 PID 2796 wrote to memory of 2900 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe 28 PID 2796 wrote to memory of 2900 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe 28 PID 2912 wrote to memory of 2056 2912 cmd.exe 31 PID 2912 wrote to memory of 2056 2912 cmd.exe 31 PID 2912 wrote to memory of 2056 2912 cmd.exe 31 PID 2912 wrote to memory of 2056 2912 cmd.exe 31 PID 2796 wrote to memory of 560 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe 32 PID 2796 wrote to memory of 560 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe 32 PID 2796 wrote to memory of 560 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe 32 PID 2796 wrote to memory of 560 2796 230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe 32 PID 2900 wrote to memory of 2128 2900 cmd.exe 33 PID 2900 wrote to memory of 2128 2900 cmd.exe 33 PID 2900 wrote to memory of 2128 2900 cmd.exe 33 PID 2900 wrote to memory of 2128 2900 cmd.exe 33 PID 560 wrote to memory of 1156 560 darkcomet.exe 35 PID 560 wrote to memory of 1156 560 darkcomet.exe 35 PID 560 wrote to memory of 1156 560 darkcomet.exe 35 PID 560 wrote to memory of 1156 560 darkcomet.exe 35 PID 560 wrote to memory of 1484 560 darkcomet.exe 34 PID 560 wrote to memory of 1484 560 darkcomet.exe 34 PID 560 wrote to memory of 1484 560 darkcomet.exe 34 PID 560 wrote to memory of 1484 560 darkcomet.exe 34 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2056 attrib.exe 2128 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe"C:\Users\Admin\AppData\Local\Temp\230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe.exe" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2056
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2128
-
-
-
C:\Users\Admin\Documents\MSDCSC\darkcomet.exe"C:\Users\Admin\Documents\MSDCSC\darkcomet.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵PID:1484
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:1156
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
745KB
MD5c0e4f49d4ea30fe8e04fdba223b44f24
SHA142d85163e18f35fd435b5f96a0bce10b8336b440
SHA256230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe
SHA512127923ce8310070ef1083b66f92ad5b7faeabb29f2540554fd833e6132d85478f55415344127760f04fe44a7ef8a0acd243d1dec5279510567a4a64777911abc
-
Filesize
745KB
MD5c0e4f49d4ea30fe8e04fdba223b44f24
SHA142d85163e18f35fd435b5f96a0bce10b8336b440
SHA256230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe
SHA512127923ce8310070ef1083b66f92ad5b7faeabb29f2540554fd833e6132d85478f55415344127760f04fe44a7ef8a0acd243d1dec5279510567a4a64777911abc
-
Filesize
745KB
MD5c0e4f49d4ea30fe8e04fdba223b44f24
SHA142d85163e18f35fd435b5f96a0bce10b8336b440
SHA256230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe
SHA512127923ce8310070ef1083b66f92ad5b7faeabb29f2540554fd833e6132d85478f55415344127760f04fe44a7ef8a0acd243d1dec5279510567a4a64777911abc
-
Filesize
745KB
MD5c0e4f49d4ea30fe8e04fdba223b44f24
SHA142d85163e18f35fd435b5f96a0bce10b8336b440
SHA256230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe
SHA512127923ce8310070ef1083b66f92ad5b7faeabb29f2540554fd833e6132d85478f55415344127760f04fe44a7ef8a0acd243d1dec5279510567a4a64777911abc
-
Filesize
745KB
MD5c0e4f49d4ea30fe8e04fdba223b44f24
SHA142d85163e18f35fd435b5f96a0bce10b8336b440
SHA256230351e5b4ee08a6583797d942967b059aec63c32eb26427f45d4ff64701b3fe
SHA512127923ce8310070ef1083b66f92ad5b7faeabb29f2540554fd833e6132d85478f55415344127760f04fe44a7ef8a0acd243d1dec5279510567a4a64777911abc