Analysis
-
max time kernel
51s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 02:22
Static task
static1
Behavioral task
behavioral1
Sample
3fa712fa1f5fd57eeceaadfe61e4caa9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3fa712fa1f5fd57eeceaadfe61e4caa9.exe
Resource
win10v2004-20231215-en
General
-
Target
3fa712fa1f5fd57eeceaadfe61e4caa9.exe
-
Size
691KB
-
MD5
3fa712fa1f5fd57eeceaadfe61e4caa9
-
SHA1
2c34c4c3ee37493af7e130023c69dbc6829b0cff
-
SHA256
4055f66b00029901a2c4d135c126185bbabf7393e06e24b4fbc183cfce4406ec
-
SHA512
b8ef4a5f96ca3f99e2acb15f7e0d70b3d0e1a9f02875a6c15df760ef934a4589a04db7e409f359d594d579df4bf57cca75d5b66f61fbfb99704e42f98063eb9d
-
SSDEEP
12288:wxeC6+2dW+m5XwneFYCMFY7vEwYadHT/VGyE4Q661qlVoULVsBu:kQ8we/AYiadHMa61qlVsU
Malware Config
Extracted
darkcomet
Slaves
ratrololol.no-ip.biz:1604
DC_MUTEX-4TN56C8
-
gencode
eoH57CKDnAQ1
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmpnetk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wmpnet32.exe" vbc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2652 set thread context of 2884 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 24 PID 2652 set thread context of 3020 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 21 -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\svchost.exe:ZONE.identifier cmd.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3020 vbc.exe Token: SeSecurityPrivilege 3020 vbc.exe Token: SeTakeOwnershipPrivilege 3020 vbc.exe Token: SeLoadDriverPrivilege 3020 vbc.exe Token: SeSystemProfilePrivilege 3020 vbc.exe Token: SeSystemtimePrivilege 3020 vbc.exe Token: SeProfSingleProcessPrivilege 3020 vbc.exe Token: SeIncBasePriorityPrivilege 3020 vbc.exe Token: SeCreatePagefilePrivilege 3020 vbc.exe Token: SeBackupPrivilege 3020 vbc.exe Token: SeRestorePrivilege 3020 vbc.exe Token: SeShutdownPrivilege 3020 vbc.exe Token: SeDebugPrivilege 3020 vbc.exe Token: SeSystemEnvironmentPrivilege 3020 vbc.exe Token: SeChangeNotifyPrivilege 3020 vbc.exe Token: SeRemoteShutdownPrivilege 3020 vbc.exe Token: SeUndockPrivilege 3020 vbc.exe Token: SeManageVolumePrivilege 3020 vbc.exe Token: SeImpersonatePrivilege 3020 vbc.exe Token: SeCreateGlobalPrivilege 3020 vbc.exe Token: 33 3020 vbc.exe Token: 34 3020 vbc.exe Token: 35 3020 vbc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2884 vbc.exe 3020 vbc.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2884 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 24 PID 2652 wrote to memory of 2884 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 24 PID 2652 wrote to memory of 2884 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 24 PID 2652 wrote to memory of 2884 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 24 PID 2652 wrote to memory of 2884 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 24 PID 2652 wrote to memory of 2884 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 24 PID 2652 wrote to memory of 2884 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 24 PID 2652 wrote to memory of 2884 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 24 PID 2652 wrote to memory of 2884 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 24 PID 2652 wrote to memory of 2160 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 23 PID 2652 wrote to memory of 2160 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 23 PID 2652 wrote to memory of 2160 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 23 PID 2652 wrote to memory of 2160 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 23 PID 2652 wrote to memory of 3020 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 21 PID 2652 wrote to memory of 3020 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 21 PID 2652 wrote to memory of 3020 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 21 PID 2652 wrote to memory of 3020 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 21 PID 2652 wrote to memory of 3020 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 21 PID 2652 wrote to memory of 3020 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 21 PID 2652 wrote to memory of 3020 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 21 PID 2652 wrote to memory of 3020 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 21 PID 2652 wrote to memory of 3020 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 21 PID 2652 wrote to memory of 3020 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 21 PID 2652 wrote to memory of 3020 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 21 PID 2652 wrote to memory of 3020 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 21 PID 2652 wrote to memory of 3020 2652 3fa712fa1f5fd57eeceaadfe61e4caa9.exe 21 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22 PID 3020 wrote to memory of 2676 3020 vbc.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fa712fa1f5fd57eeceaadfe61e4caa9.exe"C:\Users\Admin\AppData\Local\Temp\3fa712fa1f5fd57eeceaadfe61e4caa9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"2⤵
- NTFS ADS
PID:2160
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70B
MD5c26ae3314265abcaeb8e4329912a9925
SHA194abaa02240eec2798ef7bbffc417f90e523595b
SHA256370c4bd674dee18edde2cd8e28441353c58d73a71e848c02ee739eb3a709a5ef
SHA51217116763b0a31419f958af521463eee07fbc0b6dd7eb55c14021f42cff5bf329029d0872fb7de92b1d3ea19ede5df03d66fbc729d96a406552c1ab744da90ce8