Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 23:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
75d7f4e89d40c202c6a28dfe30d6cc93.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
75d7f4e89d40c202c6a28dfe30d6cc93.exe
-
Size
1.2MB
-
MD5
75d7f4e89d40c202c6a28dfe30d6cc93
-
SHA1
fe394c2f0abea15f8b6c19fc4e0ac4ebe8c63c6b
-
SHA256
b2dc44fd64beab5b53beb3fbd60e7ddd803337774dac60fcba0d71deb0a138e7
-
SHA512
568dfe60bd6a8443185906fd7e22924ca23d9a2fd4ced2b34c450dfbcd7ca8989017127ba813ff5633c47450c200b2119fa7a4554f9385745cc22a51835e8231
-
SSDEEP
24576:e9wrQhw7iGRv/roB8hd7mWS/16fSYKxQ:0WiALoSnS4tsQ
Malware Config
Extracted
Family
darkcomet
Botnet
x
C2
cppgamer.no-ip.biz:1024
cppgamer.no-ip.biz:1243
Mutex
DC_MUTEX-EN4NFY6
Attributes
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
0wdCxW5TpJNK
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
75d7f4e89d40c202c6a28dfe30d6cc93.exedescription pid process target process PID 2380 set thread context of 2240 2380 75d7f4e89d40c202c6a28dfe30d6cc93.exe explorer.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2448 2240 WerFault.exe explorer.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
75d7f4e89d40c202c6a28dfe30d6cc93.exeexplorer.exedescription pid process target process PID 2380 wrote to memory of 2240 2380 75d7f4e89d40c202c6a28dfe30d6cc93.exe explorer.exe PID 2380 wrote to memory of 2240 2380 75d7f4e89d40c202c6a28dfe30d6cc93.exe explorer.exe PID 2380 wrote to memory of 2240 2380 75d7f4e89d40c202c6a28dfe30d6cc93.exe explorer.exe PID 2380 wrote to memory of 2240 2380 75d7f4e89d40c202c6a28dfe30d6cc93.exe explorer.exe PID 2380 wrote to memory of 2240 2380 75d7f4e89d40c202c6a28dfe30d6cc93.exe explorer.exe PID 2380 wrote to memory of 2240 2380 75d7f4e89d40c202c6a28dfe30d6cc93.exe explorer.exe PID 2380 wrote to memory of 2240 2380 75d7f4e89d40c202c6a28dfe30d6cc93.exe explorer.exe PID 2380 wrote to memory of 2240 2380 75d7f4e89d40c202c6a28dfe30d6cc93.exe explorer.exe PID 2380 wrote to memory of 2240 2380 75d7f4e89d40c202c6a28dfe30d6cc93.exe explorer.exe PID 2380 wrote to memory of 2240 2380 75d7f4e89d40c202c6a28dfe30d6cc93.exe explorer.exe PID 2380 wrote to memory of 2240 2380 75d7f4e89d40c202c6a28dfe30d6cc93.exe explorer.exe PID 2380 wrote to memory of 2240 2380 75d7f4e89d40c202c6a28dfe30d6cc93.exe explorer.exe PID 2380 wrote to memory of 2240 2380 75d7f4e89d40c202c6a28dfe30d6cc93.exe explorer.exe PID 2380 wrote to memory of 2240 2380 75d7f4e89d40c202c6a28dfe30d6cc93.exe explorer.exe PID 2380 wrote to memory of 2240 2380 75d7f4e89d40c202c6a28dfe30d6cc93.exe explorer.exe PID 2240 wrote to memory of 2448 2240 explorer.exe WerFault.exe PID 2240 wrote to memory of 2448 2240 explorer.exe WerFault.exe PID 2240 wrote to memory of 2448 2240 explorer.exe WerFault.exe PID 2240 wrote to memory of 2448 2240 explorer.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\75d7f4e89d40c202c6a28dfe30d6cc93.exe"C:\Users\Admin\AppData\Local\Temp\75d7f4e89d40c202c6a28dfe30d6cc93.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\system32\explorer.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 2323⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2240-5-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/2240-7-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/2380-0-0x0000000074A20000-0x0000000074FCB000-memory.dmpFilesize
5.7MB
-
memory/2380-1-0x0000000074A20000-0x0000000074FCB000-memory.dmpFilesize
5.7MB
-
memory/2380-2-0x0000000000090000-0x00000000000D0000-memory.dmpFilesize
256KB
-
memory/2380-6-0x0000000074A20000-0x0000000074FCB000-memory.dmpFilesize
5.7MB