Analysis
-
max time kernel
0s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
2e0d91d2f53c8972b85474a0af5a4ccd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2e0d91d2f53c8972b85474a0af5a4ccd.exe
Resource
win10v2004-20231222-en
General
-
Target
2e0d91d2f53c8972b85474a0af5a4ccd.exe
-
Size
835KB
-
MD5
2e0d91d2f53c8972b85474a0af5a4ccd
-
SHA1
579424294f6b61994420553324262fa870122c28
-
SHA256
59a0e7d0bfcc51a30a03d8e593efc404c6c80293e8f130f34122a4fb2bcf3103
-
SHA512
d254b1b4a448840ab612c6ab4b370f519a00825988c8d9f61427a17cd847b884563d2209d01fd9d5729f381fcfc8bc51cca8450b5ea631a8b415c86e7910785e
-
SSDEEP
12288:94xkDWn1noBIR2ZWyJn5hKaPysbikwlc4FToFu8SMr23:9UpnfnyMaPysbiDO4ZoFu/v
Malware Config
Extracted
darkcomet
0pf3rS_uPd43T.v2
dasistmeineip.no-ip.org:51337
DCMIN_MUTEX-CCK1K0P
-
InstallPath
WinRAR\WinRAR.exe
-
gencode
D2mEbEcEBi6r
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
WinRAR
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\WinRAR\\WinRAR.exe" WINRAR32.EXE -
Executes dropped EXE 2 IoCs
pid Process 3004 WINRAR32.EXE 3052 WINRAR32.EXE -
Loads dropped DLL 3 IoCs
pid Process 2136 2e0d91d2f53c8972b85474a0af5a4ccd.exe 2136 2e0d91d2f53c8972b85474a0af5a4ccd.exe 3004 WINRAR32.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinRAR = "C:\\Users\\Admin\\AppData\\Roaming\\WinRAR\\WinRAR.exe" WINRAR32.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3004 set thread context of 3052 3004 WINRAR32.EXE 19 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3052 WINRAR32.EXE Token: SeSecurityPrivilege 3052 WINRAR32.EXE Token: SeTakeOwnershipPrivilege 3052 WINRAR32.EXE Token: SeLoadDriverPrivilege 3052 WINRAR32.EXE Token: SeSystemProfilePrivilege 3052 WINRAR32.EXE Token: SeSystemtimePrivilege 3052 WINRAR32.EXE Token: SeProfSingleProcessPrivilege 3052 WINRAR32.EXE Token: SeIncBasePriorityPrivilege 3052 WINRAR32.EXE Token: SeCreatePagefilePrivilege 3052 WINRAR32.EXE Token: SeBackupPrivilege 3052 WINRAR32.EXE Token: SeRestorePrivilege 3052 WINRAR32.EXE Token: SeShutdownPrivilege 3052 WINRAR32.EXE Token: SeDebugPrivilege 3052 WINRAR32.EXE Token: SeSystemEnvironmentPrivilege 3052 WINRAR32.EXE Token: SeChangeNotifyPrivilege 3052 WINRAR32.EXE Token: SeRemoteShutdownPrivilege 3052 WINRAR32.EXE Token: SeUndockPrivilege 3052 WINRAR32.EXE Token: SeManageVolumePrivilege 3052 WINRAR32.EXE Token: SeImpersonatePrivilege 3052 WINRAR32.EXE Token: SeCreateGlobalPrivilege 3052 WINRAR32.EXE Token: 33 3052 WINRAR32.EXE Token: 34 3052 WINRAR32.EXE Token: 35 3052 WINRAR32.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2136 wrote to memory of 3004 2136 2e0d91d2f53c8972b85474a0af5a4ccd.exe 20 PID 2136 wrote to memory of 3004 2136 2e0d91d2f53c8972b85474a0af5a4ccd.exe 20 PID 2136 wrote to memory of 3004 2136 2e0d91d2f53c8972b85474a0af5a4ccd.exe 20 PID 2136 wrote to memory of 3004 2136 2e0d91d2f53c8972b85474a0af5a4ccd.exe 20 PID 3004 wrote to memory of 3052 3004 WINRAR32.EXE 19 PID 3004 wrote to memory of 3052 3004 WINRAR32.EXE 19 PID 3004 wrote to memory of 3052 3004 WINRAR32.EXE 19 PID 3004 wrote to memory of 3052 3004 WINRAR32.EXE 19 PID 3004 wrote to memory of 3052 3004 WINRAR32.EXE 19 PID 3004 wrote to memory of 3052 3004 WINRAR32.EXE 19 PID 3004 wrote to memory of 3052 3004 WINRAR32.EXE 19 PID 3004 wrote to memory of 3052 3004 WINRAR32.EXE 19 PID 3004 wrote to memory of 3052 3004 WINRAR32.EXE 19 PID 3004 wrote to memory of 3052 3004 WINRAR32.EXE 19 PID 3004 wrote to memory of 3052 3004 WINRAR32.EXE 19 PID 3004 wrote to memory of 3052 3004 WINRAR32.EXE 19 PID 3004 wrote to memory of 3052 3004 WINRAR32.EXE 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e0d91d2f53c8972b85474a0af5a4ccd.exe"C:\Users\Admin\AppData\Local\Temp\2e0d91d2f53c8972b85474a0af5a4ccd.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\WINRAR32.EXE"C:\Users\Admin\AppData\Local\Temp\WINRAR32.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3004
-
-
C:\Users\Admin\AppData\Roaming\WinRAR\WinRAR.exe"C:\Users\Admin\AppData\Roaming\WinRAR\WinRAR.exe"1⤵PID:2584
-
C:\Users\Admin\AppData\Roaming\WinRAR\WinRAR.exe"C:\Users\Admin\AppData\Roaming\WinRAR\WinRAR.exe"1⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\WINRAR32.EXE"C:\Users\Admin\AppData\Local\Temp\WINRAR32.EXE"1⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD55fc3b50a25602339a027e520c7e20c10
SHA1b5393bfece8d51796f3a7d7884412a38e2757295
SHA25657ecdcb606c565d3fb732e8cc13d6cb02077ffbb81e95236f5bbff918fc225ff
SHA512bc71a71fac6d3bfafc927bcf1aa6f11d2fc87c9a871b87365b2c2cb47a760caf494bb5ef1b94cf3ce02dd12dd39f335a7d9e6120a11280a01420161f85df4eab