Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 11:24
Behavioral task
behavioral1
Sample
343726e33afc7a951c5e9075a178b608.exe
Resource
win7-20231215-en
General
-
Target
343726e33afc7a951c5e9075a178b608.exe
-
Size
725KB
-
MD5
343726e33afc7a951c5e9075a178b608
-
SHA1
df3aefa08e35b55fade041ad740ae76b9cae6408
-
SHA256
9d05eb381c6e21b36c720b02cf48019ada67c029468b05f6aaaeee12a9fffe26
-
SHA512
b25579d32ffb3ce5485d959675b7738805caa13d7180e01fbbbd909306da20efa0a1641b6b7c682b07fa64d7d9d72503571e9435d9214e751bfa612307889879
-
SSDEEP
12288:h9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9EkNC/d:bZ1xuVVjfFoynPaVBUR8f+kN10Ed
Malware Config
Extracted
darkcomet
Sazan
127.0.0.1:1604
185.29.120.189:1604
DC_MUTEX-C85CWU2
-
InstallPath
S1\updater.exe
-
gencode
DlWfWyuahoYK
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
Windows Firewall
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
343726e33afc7a951c5e9075a178b608.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\S1\\updater.exe" 343726e33afc7a951c5e9075a178b608.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
updater.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" updater.exe -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 2692 attrib.exe 3000 attrib.exe -
Deletes itself 1 IoCs
Processes:
notepad.exepid process 2852 notepad.exe -
Executes dropped EXE 1 IoCs
Processes:
updater.exepid process 2736 updater.exe -
Loads dropped DLL 4 IoCs
Processes:
343726e33afc7a951c5e9075a178b608.exeupdater.exepid process 2480 343726e33afc7a951c5e9075a178b608.exe 2736 updater.exe 2736 updater.exe 2736 updater.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
343726e33afc7a951c5e9075a178b608.exeupdater.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Firewall = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\S1\\updater.exe" 343726e33afc7a951c5e9075a178b608.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Firewall = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\S1\\updater.exe" updater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
343726e33afc7a951c5e9075a178b608.exeupdater.exedescription pid process Token: SeIncreaseQuotaPrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeSecurityPrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeTakeOwnershipPrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeLoadDriverPrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeSystemProfilePrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeSystemtimePrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeProfSingleProcessPrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeIncBasePriorityPrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeCreatePagefilePrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeBackupPrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeRestorePrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeShutdownPrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeDebugPrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeSystemEnvironmentPrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeChangeNotifyPrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeRemoteShutdownPrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeUndockPrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeManageVolumePrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeImpersonatePrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeCreateGlobalPrivilege 2480 343726e33afc7a951c5e9075a178b608.exe Token: 33 2480 343726e33afc7a951c5e9075a178b608.exe Token: 34 2480 343726e33afc7a951c5e9075a178b608.exe Token: 35 2480 343726e33afc7a951c5e9075a178b608.exe Token: SeIncreaseQuotaPrivilege 2736 updater.exe Token: SeSecurityPrivilege 2736 updater.exe Token: SeTakeOwnershipPrivilege 2736 updater.exe Token: SeLoadDriverPrivilege 2736 updater.exe Token: SeSystemProfilePrivilege 2736 updater.exe Token: SeSystemtimePrivilege 2736 updater.exe Token: SeProfSingleProcessPrivilege 2736 updater.exe Token: SeIncBasePriorityPrivilege 2736 updater.exe Token: SeCreatePagefilePrivilege 2736 updater.exe Token: SeBackupPrivilege 2736 updater.exe Token: SeRestorePrivilege 2736 updater.exe Token: SeShutdownPrivilege 2736 updater.exe Token: SeDebugPrivilege 2736 updater.exe Token: SeSystemEnvironmentPrivilege 2736 updater.exe Token: SeChangeNotifyPrivilege 2736 updater.exe Token: SeRemoteShutdownPrivilege 2736 updater.exe Token: SeUndockPrivilege 2736 updater.exe Token: SeManageVolumePrivilege 2736 updater.exe Token: SeImpersonatePrivilege 2736 updater.exe Token: SeCreateGlobalPrivilege 2736 updater.exe Token: 33 2736 updater.exe Token: 34 2736 updater.exe Token: 35 2736 updater.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
updater.exepid process 2736 updater.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
343726e33afc7a951c5e9075a178b608.execmd.execmd.exeupdater.exedescription pid process target process PID 2480 wrote to memory of 2416 2480 343726e33afc7a951c5e9075a178b608.exe cmd.exe PID 2480 wrote to memory of 2416 2480 343726e33afc7a951c5e9075a178b608.exe cmd.exe PID 2480 wrote to memory of 2416 2480 343726e33afc7a951c5e9075a178b608.exe cmd.exe PID 2480 wrote to memory of 2416 2480 343726e33afc7a951c5e9075a178b608.exe cmd.exe PID 2480 wrote to memory of 2720 2480 343726e33afc7a951c5e9075a178b608.exe cmd.exe PID 2480 wrote to memory of 2720 2480 343726e33afc7a951c5e9075a178b608.exe cmd.exe PID 2480 wrote to memory of 2720 2480 343726e33afc7a951c5e9075a178b608.exe cmd.exe PID 2480 wrote to memory of 2720 2480 343726e33afc7a951c5e9075a178b608.exe cmd.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2480 wrote to memory of 2852 2480 343726e33afc7a951c5e9075a178b608.exe notepad.exe PID 2720 wrote to memory of 2692 2720 cmd.exe attrib.exe PID 2720 wrote to memory of 2692 2720 cmd.exe attrib.exe PID 2720 wrote to memory of 2692 2720 cmd.exe attrib.exe PID 2720 wrote to memory of 2692 2720 cmd.exe attrib.exe PID 2416 wrote to memory of 3000 2416 cmd.exe attrib.exe PID 2416 wrote to memory of 3000 2416 cmd.exe attrib.exe PID 2416 wrote to memory of 3000 2416 cmd.exe attrib.exe PID 2416 wrote to memory of 3000 2416 cmd.exe attrib.exe PID 2480 wrote to memory of 2736 2480 343726e33afc7a951c5e9075a178b608.exe updater.exe PID 2480 wrote to memory of 2736 2480 343726e33afc7a951c5e9075a178b608.exe updater.exe PID 2480 wrote to memory of 2736 2480 343726e33afc7a951c5e9075a178b608.exe updater.exe PID 2480 wrote to memory of 2736 2480 343726e33afc7a951c5e9075a178b608.exe updater.exe PID 2480 wrote to memory of 2736 2480 343726e33afc7a951c5e9075a178b608.exe updater.exe PID 2480 wrote to memory of 2736 2480 343726e33afc7a951c5e9075a178b608.exe updater.exe PID 2480 wrote to memory of 2736 2480 343726e33afc7a951c5e9075a178b608.exe updater.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe PID 2736 wrote to memory of 2636 2736 updater.exe notepad.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 2692 attrib.exe 3000 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\343726e33afc7a951c5e9075a178b608.exe"C:\Users\Admin\AppData\Local\Temp\343726e33afc7a951c5e9075a178b608.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\343726e33afc7a951c5e9075a178b608.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\343726e33afc7a951c5e9075a178b608.exe" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- Deletes itself
-
C:\ProgramData\Microsoft\Windows\Start Menu\S1\updater.exe"C:\ProgramData\Microsoft\Windows\Start Menu\S1\updater.exe"2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\Start Menu\S1\updater.exeFilesize
228KB
MD5462105f6b59696ec4bb802bb7cf9568e
SHA1a2532fd3b548e168a475fc7c2844cd7d6917a1b9
SHA256eaa55ebaa2fc31e3a2b35a019b33479af3006431e30120ac9da0cd43a370d9ce
SHA5126e37f9915f6e698764b898d93073e2517ca19ece6f397df4ed99c5ac49f944da398baaf26ae365db1127d23d33a43daf58cdbbe0e88e800d2aebeca20de59979
-
C:\ProgramData\Microsoft\Windows\Start Menu\S1\updater.exeFilesize
132KB
MD54ad4b2aaa2cfb2e37f896a23c800e60f
SHA14708a9a568ff7f802ac18973208d2c16a32571b4
SHA2568253d157a495cf4ceed105295fcdfae4098599c95194c098353432628f2c5048
SHA512f8ca2fac0c90a518b37eff66bd61e8d4568e0c2ed296cfd5716f6ce5cdd4c7a308ee54c167dd98ff620f698b42c14f92cb59906296d33f7be95f659e758b03b1
-
C:\ProgramData\Microsoft\Windows\Start Menu\S1\updater.exeFilesize
120KB
MD58d364b322a36fad076c78f629756b1a7
SHA1369902ef4fe50b2bd171efc3f9d088d08703efe9
SHA256050ceab1470ba817db9ec391461b167672eee4726702d9dda0c1b9ff8befb7ab
SHA512a7dc8b15e66a4378f85d2bb579852736e548e099d5bfcdb443906e601e3430a0b00a9fef80f4eee270f41fba3f155a044b559c48bcafeb86397896433738dc2b
-
\ProgramData\Microsoft\Windows\Start Menu\S1\updater.exeFilesize
296KB
MD5b2869d39c0ef3295171674048c3a5eff
SHA1bd6e805738c496bbb429f1c3a88f6a5dccc742bb
SHA256ba463d2bfd534b8ff7f2b5ba652057170015d31b541f31b89a5d1c1b985a9b35
SHA512df2565bc12d3e793d0bafb519d0207ff7f342dc8e7ca67838fde9944a018ef2783d8f9dd744261e53a6689c0e43f396b3c4f42c21042b639f43304025ecebc03
-
\ProgramData\Microsoft\Windows\Start Menu\S1\updater.exeFilesize
37KB
MD527137efc765726f30cea4096c507a009
SHA1fe70978ef0f35176c0fe4c407e4e01f99f347fc7
SHA256b8000ca4b0463e5b52d7edcd89e9aeaa69144658fe4f5ddd47a7ac7488573e40
SHA5128fd0a63d41200463d37759d5dc35d7c3892b710c73e88baf989039df0327969431a60fd80ebaf51f9040c786d286c83e37d025433ed71886099651a56599ad2e
-
\ProgramData\Microsoft\Windows\Start Menu\S1\updater.exeFilesize
18KB
MD5eab499427eb25af827edb09da8600e5b
SHA104205615c23a0643058abf805eab0931688ec93b
SHA256d9112088efaca7f1363d2929ddcac567385ec312199831139f1dab5c67611472
SHA512152724f1b2d11c1168849ba4949462761fa8bd6a652e3c62646ebbd4ad87d9e434a22efc33d2436571fbd6b6674c75ae9cc4d25ff8a3ee48c96d4504b80072af
-
\ProgramData\Microsoft\Windows\Start Menu\S1\updater.exeFilesize
9KB
MD5e6f17367754c7d70821feec94fcdd2a1
SHA17abdf69b586aecfb715b7cb42e38711e9663a7ca
SHA2563f1d6f37af9badc143baced31f009629eebd00ac2fba08537bd0b9ff28b6c368
SHA5126c686970c281e8c9ef31ff03effde4692ccda6f34ce1804375f6532e485e5fbbaec3fbdb22a5250ef6ce30f349a111b13cb62ad68de16792924168d4d46526b3
-
memory/2480-0-0x00000000003C0000-0x00000000003C1000-memory.dmpFilesize
4KB
-
memory/2480-68-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/2636-67-0x0000000000430000-0x0000000000431000-memory.dmpFilesize
4KB
-
memory/2736-70-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/2736-71-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/2736-72-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/2736-74-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/2852-20-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/2852-3-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB