Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 10:02
Static task
static1
Behavioral task
behavioral1
Sample
7467600344ecd69e3b51b02ff361c880.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7467600344ecd69e3b51b02ff361c880.exe
Resource
win10v2004-20231222-en
General
-
Target
7467600344ecd69e3b51b02ff361c880.exe
-
Size
1.9MB
-
MD5
7467600344ecd69e3b51b02ff361c880
-
SHA1
aca0a966cc25accdb18db700be03ed8aa7d2b4b2
-
SHA256
9d5a84fe325937581908b7795d4953678d709d7317de7da4e9c0736a3e0ff513
-
SHA512
d7d2eb85d715ce4276f4b1fced95727ff9615b5cbc87790de5b63b426cc42b9ffe451b373962a21cd2ccfc4aa78ac3e8870f16f1dc945424642920b1ecab6053
-
SSDEEP
49152:/JZoQrbTFZY1iaY61p3Faa3swyymhOzFv+p8YL6fjzMVrs1Ko0AZWZ:/trbTA1TBWtGLiYiV
Malware Config
Extracted
darkcomet
Guest16
davidcz.no-ip.org:1604
DC_MUTEX-76KHYQT
-
gencode
EiNiCx44oAXb
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\7467600344ecd69e3b51b02ff361c880.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7467600344ecd69e3b51b02ff361c880.exe" 7467600344ecd69e3b51b02ff361c880.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2120 set thread context of 2880 2120 7467600344ecd69e3b51b02ff361c880.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2880 taskmgr.exe Token: SeSecurityPrivilege 2880 taskmgr.exe Token: SeTakeOwnershipPrivilege 2880 taskmgr.exe Token: SeLoadDriverPrivilege 2880 taskmgr.exe Token: SeSystemProfilePrivilege 2880 taskmgr.exe Token: SeSystemtimePrivilege 2880 taskmgr.exe Token: SeProfSingleProcessPrivilege 2880 taskmgr.exe Token: SeIncBasePriorityPrivilege 2880 taskmgr.exe Token: SeCreatePagefilePrivilege 2880 taskmgr.exe Token: SeBackupPrivilege 2880 taskmgr.exe Token: SeRestorePrivilege 2880 taskmgr.exe Token: SeShutdownPrivilege 2880 taskmgr.exe Token: SeDebugPrivilege 2880 taskmgr.exe Token: SeSystemEnvironmentPrivilege 2880 taskmgr.exe Token: SeChangeNotifyPrivilege 2880 taskmgr.exe Token: SeRemoteShutdownPrivilege 2880 taskmgr.exe Token: SeUndockPrivilege 2880 taskmgr.exe Token: SeManageVolumePrivilege 2880 taskmgr.exe Token: SeImpersonatePrivilege 2880 taskmgr.exe Token: SeCreateGlobalPrivilege 2880 taskmgr.exe Token: 33 2880 taskmgr.exe Token: 34 2880 taskmgr.exe Token: 35 2880 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2880 taskmgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2880 2120 7467600344ecd69e3b51b02ff361c880.exe 28 PID 2120 wrote to memory of 2880 2120 7467600344ecd69e3b51b02ff361c880.exe 28 PID 2120 wrote to memory of 2880 2120 7467600344ecd69e3b51b02ff361c880.exe 28 PID 2120 wrote to memory of 2880 2120 7467600344ecd69e3b51b02ff361c880.exe 28 PID 2120 wrote to memory of 2880 2120 7467600344ecd69e3b51b02ff361c880.exe 28 PID 2120 wrote to memory of 2880 2120 7467600344ecd69e3b51b02ff361c880.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7467600344ecd69e3b51b02ff361c880.exe"C:\Users\Admin\AppData\Local\Temp\7467600344ecd69e3b51b02ff361c880.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\taskmgr.exe"C:\Windows\system32\taskmgr.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2880
-