Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 16:11
Static task
static1
Behavioral task
behavioral1
Sample
53f9da2780b6f5a90cfa960a7ba80eef.exe
Resource
win7-20231215-en
General
-
Target
53f9da2780b6f5a90cfa960a7ba80eef.exe
-
Size
1.3MB
-
MD5
53f9da2780b6f5a90cfa960a7ba80eef
-
SHA1
797377e262f78ebcbb50203a286fdcbc76b45e81
-
SHA256
4764430a1dcd759ca63408103232d28a82c2e1ae3c1cc29a536fecdee9171fb3
-
SHA512
bced0651108eecdad60f6b9291e065877f9b7b43ae5edbf659d6028c192de918f11e8d6019cc5e287f9036f33825c52f5b34fce58d4d76f02c834aa16dfdaa41
-
SSDEEP
24576:Vt3Neacap5W/4UHRY2FhJvQywVLjaGVOUN6nyhkHgKU6Y:VtUaAwls+9j4HgK
Malware Config
Extracted
darkcomet
slave
ratting.no-ip.org:1605
DC_MUTEX-Q21PSYS
-
gencode
3xN2KEijP0Bj
-
install
false
-
offline_keylogger
true
-
password
darkcomet
-
persistence
false
Signatures
-
Disables RegEdit via registry modification 1 IoCs
Processes:
53f9da2780b6f5a90cfa960a7ba80eef.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 53f9da2780b6f5a90cfa960a7ba80eef.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 1544 attrib.exe 384 attrib.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
53f9da2780b6f5a90cfa960a7ba80eef.exeCrypted.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 53f9da2780b6f5a90cfa960a7ba80eef.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation Crypted.exe -
Executes dropped EXE 1 IoCs
Processes:
Crypted.exepid process 428 Crypted.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
53f9da2780b6f5a90cfa960a7ba80eef.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\53f9da2780b6f5a90cfa960a7ba80eef.exe" 53f9da2780b6f5a90cfa960a7ba80eef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
53f9da2780b6f5a90cfa960a7ba80eef.exetaskmgr.exepid process 4740 53f9da2780b6f5a90cfa960a7ba80eef.exe 4740 53f9da2780b6f5a90cfa960a7ba80eef.exe 4740 53f9da2780b6f5a90cfa960a7ba80eef.exe 4740 53f9da2780b6f5a90cfa960a7ba80eef.exe 4740 53f9da2780b6f5a90cfa960a7ba80eef.exe 4740 53f9da2780b6f5a90cfa960a7ba80eef.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
Crypted.exetaskmgr.exepid process 428 Crypted.exe 4348 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
Crypted.exe53f9da2780b6f5a90cfa960a7ba80eef.exetaskmgr.exedescription pid process Token: SeIncreaseQuotaPrivilege 428 Crypted.exe Token: SeSecurityPrivilege 428 Crypted.exe Token: SeTakeOwnershipPrivilege 428 Crypted.exe Token: SeLoadDriverPrivilege 428 Crypted.exe Token: SeSystemProfilePrivilege 428 Crypted.exe Token: SeSystemtimePrivilege 428 Crypted.exe Token: SeProfSingleProcessPrivilege 428 Crypted.exe Token: SeIncBasePriorityPrivilege 428 Crypted.exe Token: SeCreatePagefilePrivilege 428 Crypted.exe Token: SeBackupPrivilege 428 Crypted.exe Token: SeRestorePrivilege 428 Crypted.exe Token: SeShutdownPrivilege 428 Crypted.exe Token: SeDebugPrivilege 428 Crypted.exe Token: SeSystemEnvironmentPrivilege 428 Crypted.exe Token: SeChangeNotifyPrivilege 428 Crypted.exe Token: SeRemoteShutdownPrivilege 428 Crypted.exe Token: SeUndockPrivilege 428 Crypted.exe Token: SeManageVolumePrivilege 428 Crypted.exe Token: SeImpersonatePrivilege 428 Crypted.exe Token: SeCreateGlobalPrivilege 428 Crypted.exe Token: 33 428 Crypted.exe Token: 34 428 Crypted.exe Token: 35 428 Crypted.exe Token: 36 428 Crypted.exe Token: SeDebugPrivilege 4740 53f9da2780b6f5a90cfa960a7ba80eef.exe Token: SeDebugPrivilege 4348 taskmgr.exe Token: SeSystemProfilePrivilege 4348 taskmgr.exe Token: SeCreateGlobalPrivilege 4348 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe 4348 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Crypted.exepid process 428 Crypted.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
53f9da2780b6f5a90cfa960a7ba80eef.exeCrypted.execmd.execmd.exedescription pid process target process PID 4740 wrote to memory of 428 4740 53f9da2780b6f5a90cfa960a7ba80eef.exe Crypted.exe PID 4740 wrote to memory of 428 4740 53f9da2780b6f5a90cfa960a7ba80eef.exe Crypted.exe PID 4740 wrote to memory of 428 4740 53f9da2780b6f5a90cfa960a7ba80eef.exe Crypted.exe PID 428 wrote to memory of 2680 428 Crypted.exe cmd.exe PID 428 wrote to memory of 2680 428 Crypted.exe cmd.exe PID 428 wrote to memory of 2680 428 Crypted.exe cmd.exe PID 428 wrote to memory of 3756 428 Crypted.exe cmd.exe PID 428 wrote to memory of 3756 428 Crypted.exe cmd.exe PID 428 wrote to memory of 3756 428 Crypted.exe cmd.exe PID 3756 wrote to memory of 384 3756 cmd.exe attrib.exe PID 3756 wrote to memory of 384 3756 cmd.exe attrib.exe PID 3756 wrote to memory of 384 3756 cmd.exe attrib.exe PID 2680 wrote to memory of 1544 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 1544 2680 cmd.exe attrib.exe PID 2680 wrote to memory of 1544 2680 cmd.exe attrib.exe PID 4740 wrote to memory of 4348 4740 53f9da2780b6f5a90cfa960a7ba80eef.exe taskmgr.exe PID 4740 wrote to memory of 4348 4740 53f9da2780b6f5a90cfa960a7ba80eef.exe taskmgr.exe PID 4740 wrote to memory of 4348 4740 53f9da2780b6f5a90cfa960a7ba80eef.exe taskmgr.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 384 attrib.exe 1544 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53f9da2780b6f5a90cfa960a7ba80eef.exe"C:\Users\Admin\AppData\Local\Temp\53f9da2780b6f5a90cfa960a7ba80eef.exe"1⤵
- Disables RegEdit via registry modification
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Crypted.exe"C:\Users\Admin\AppData\Local\Temp\Crypted.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\Crypted.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\Crypted.exe" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\taskmgr.exetaskmgr.exe2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Crypted.exeFilesize
593KB
MD56b5b6b611176f9d64e2be4883a3ffb52
SHA1466c9bd00c2bdcf067bfcb5e6cb6b6c6e2216190
SHA256787e62d33a04d9ec39d15579159ab954766acc2ad4e6a0e94f65e6a36199ae6e
SHA512fd6f8f08488ed4f97c5a7f0861b8fed63bb1d5db75a7b101d1895e6f76bed48ed57c8056e131c47c2ab1d5ec3d6f2a44153f14667269f636e3103efe5e2d7b50
-
C:\Users\Admin\AppData\Local\Temp\Crypted.exeFilesize
407KB
MD55c9f0a44c40089d69d12793e41d54209
SHA1da57b7e9832f6593042f860b45eba5a490792438
SHA2561a0664dbac35cc234c02a3775989b37e35ee4a00f3adfa7c92d5b9bd8a2100f7
SHA5120103d7e2a2b6c5ec3c9d053b34703c813099cce3194228db1cec00fa79679baa54e815b51a101562a27c39a474ae2541ac23e812d240bb471050a57a18bf76f7
-
C:\Users\Admin\AppData\Local\Temp\Crypted.exeFilesize
498KB
MD5c2c01edcea8336c93f751d8c55612ee9
SHA1f59ceba2e3b518122a3902d4572a87da107be958
SHA256597a7185082c9b08d1aacc9c76ccfc9bb6dcd119a85cc453b99c2d08d18a3ef2
SHA512c0275ad92c3d826c9c7ecc44ee6233c246407b7ea2440b01184fec4d61bb6f5b2f7c61283feb72a23551daa1795b7ee127977ef9e1d4f7eeed2d0b2b9ad792c3
-
memory/428-45-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/428-18-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/428-47-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/428-14-0x00000000007E0000-0x00000000007E1000-memory.dmpFilesize
4KB
-
memory/428-15-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/428-34-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/428-44-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/428-46-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/428-43-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/428-42-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/428-40-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/428-39-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/428-38-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/428-37-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/428-35-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/4348-31-0x0000000008500000-0x0000000008501000-memory.dmpFilesize
4KB
-
memory/4348-22-0x0000000008500000-0x0000000008501000-memory.dmpFilesize
4KB
-
memory/4348-29-0x0000000008500000-0x0000000008501000-memory.dmpFilesize
4KB
-
memory/4348-28-0x0000000008500000-0x0000000008501000-memory.dmpFilesize
4KB
-
memory/4348-27-0x0000000008500000-0x0000000008501000-memory.dmpFilesize
4KB
-
memory/4348-30-0x0000000008500000-0x0000000008501000-memory.dmpFilesize
4KB
-
memory/4348-32-0x0000000008500000-0x0000000008501000-memory.dmpFilesize
4KB
-
memory/4348-23-0x0000000008500000-0x0000000008501000-memory.dmpFilesize
4KB
-
memory/4348-33-0x0000000008500000-0x0000000008501000-memory.dmpFilesize
4KB
-
memory/4348-21-0x0000000008500000-0x0000000008501000-memory.dmpFilesize
4KB
-
memory/4740-2-0x0000000000E40000-0x0000000000E50000-memory.dmpFilesize
64KB
-
memory/4740-36-0x0000000000E40000-0x0000000000E50000-memory.dmpFilesize
64KB
-
memory/4740-20-0x0000000000E40000-0x0000000000E50000-memory.dmpFilesize
64KB
-
memory/4740-19-0x0000000000E40000-0x0000000000E50000-memory.dmpFilesize
64KB
-
memory/4740-17-0x00000000748A0000-0x0000000074E51000-memory.dmpFilesize
5.7MB
-
memory/4740-16-0x00000000748A0000-0x0000000074E51000-memory.dmpFilesize
5.7MB
-
memory/4740-0-0x00000000748A0000-0x0000000074E51000-memory.dmpFilesize
5.7MB
-
memory/4740-1-0x00000000748A0000-0x0000000074E51000-memory.dmpFilesize
5.7MB