Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
976299004249831506c9addef3cb6ae2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
976299004249831506c9addef3cb6ae2.exe
Resource
win10v2004-20231215-en
General
-
Target
976299004249831506c9addef3cb6ae2.exe
-
Size
1.1MB
-
MD5
976299004249831506c9addef3cb6ae2
-
SHA1
28d0750d67a88c8bde6ce763ac8c77fffeceebfd
-
SHA256
42fe2ee15d9d75d1dc3c456c3240dda7f875c6f2a4f7acbd607655d488032b1c
-
SHA512
d5ac16e10e5481f21a7a2b2d9bf94ca0d3a963c17209ed6164ccfd539f655f39dd4b33f1c1093921173f1670e197903a5db94728f02b0787af4d3ce7d573bd27
-
SSDEEP
12288:VlyOEIzifoEqqx2XcLnsYRg87cvCPAq3djaCRvUXC9KykRvWIb0aeeXXR+oGElk+:cAXOsH6raCSXC9ZQb0beRbGFz+8hs
Malware Config
Extracted
darkcomet
Trojan_Sirio
anonymouse38.no-ip.org:1604
DC_MUTEX-52WK40U
-
InstallPath
java.exe
-
gencode
u6VyVxB0Y4rH
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
java
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\java.exe" dert6.exe -
Executes dropped EXE 2 IoCs
pid Process 3016 dert6.exe 2696 java.exe -
Loads dropped DLL 4 IoCs
pid Process 2156 976299004249831506c9addef3cb6ae2.exe 2156 976299004249831506c9addef3cb6ae2.exe 3016 dert6.exe 3016 dert6.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\java = "C:\\Users\\Admin\\AppData\\Roaming\\java.exe" dert6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\java = "C:\\Users\\Admin\\AppData\\Roaming\\java.exe" java.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3016 dert6.exe Token: SeSecurityPrivilege 3016 dert6.exe Token: SeTakeOwnershipPrivilege 3016 dert6.exe Token: SeLoadDriverPrivilege 3016 dert6.exe Token: SeSystemProfilePrivilege 3016 dert6.exe Token: SeSystemtimePrivilege 3016 dert6.exe Token: SeProfSingleProcessPrivilege 3016 dert6.exe Token: SeIncBasePriorityPrivilege 3016 dert6.exe Token: SeCreatePagefilePrivilege 3016 dert6.exe Token: SeBackupPrivilege 3016 dert6.exe Token: SeRestorePrivilege 3016 dert6.exe Token: SeShutdownPrivilege 3016 dert6.exe Token: SeDebugPrivilege 3016 dert6.exe Token: SeSystemEnvironmentPrivilege 3016 dert6.exe Token: SeChangeNotifyPrivilege 3016 dert6.exe Token: SeRemoteShutdownPrivilege 3016 dert6.exe Token: SeUndockPrivilege 3016 dert6.exe Token: SeManageVolumePrivilege 3016 dert6.exe Token: SeImpersonatePrivilege 3016 dert6.exe Token: SeCreateGlobalPrivilege 3016 dert6.exe Token: 33 3016 dert6.exe Token: 34 3016 dert6.exe Token: 35 3016 dert6.exe Token: SeIncreaseQuotaPrivilege 2696 java.exe Token: SeSecurityPrivilege 2696 java.exe Token: SeTakeOwnershipPrivilege 2696 java.exe Token: SeLoadDriverPrivilege 2696 java.exe Token: SeSystemProfilePrivilege 2696 java.exe Token: SeSystemtimePrivilege 2696 java.exe Token: SeProfSingleProcessPrivilege 2696 java.exe Token: SeIncBasePriorityPrivilege 2696 java.exe Token: SeCreatePagefilePrivilege 2696 java.exe Token: SeBackupPrivilege 2696 java.exe Token: SeRestorePrivilege 2696 java.exe Token: SeShutdownPrivilege 2696 java.exe Token: SeDebugPrivilege 2696 java.exe Token: SeSystemEnvironmentPrivilege 2696 java.exe Token: SeChangeNotifyPrivilege 2696 java.exe Token: SeRemoteShutdownPrivilege 2696 java.exe Token: SeUndockPrivilege 2696 java.exe Token: SeManageVolumePrivilege 2696 java.exe Token: SeImpersonatePrivilege 2696 java.exe Token: SeCreateGlobalPrivilege 2696 java.exe Token: 33 2696 java.exe Token: 34 2696 java.exe Token: 35 2696 java.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2696 java.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2156 wrote to memory of 3016 2156 976299004249831506c9addef3cb6ae2.exe 28 PID 2156 wrote to memory of 3016 2156 976299004249831506c9addef3cb6ae2.exe 28 PID 2156 wrote to memory of 3016 2156 976299004249831506c9addef3cb6ae2.exe 28 PID 2156 wrote to memory of 3016 2156 976299004249831506c9addef3cb6ae2.exe 28 PID 3016 wrote to memory of 2696 3016 dert6.exe 29 PID 3016 wrote to memory of 2696 3016 dert6.exe 29 PID 3016 wrote to memory of 2696 3016 dert6.exe 29 PID 3016 wrote to memory of 2696 3016 dert6.exe 29 PID 3016 wrote to memory of 2696 3016 dert6.exe 29 PID 3016 wrote to memory of 2696 3016 dert6.exe 29 PID 3016 wrote to memory of 2696 3016 dert6.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\976299004249831506c9addef3cb6ae2.exe"C:\Users\Admin\AppData\Local\Temp\976299004249831506c9addef3cb6ae2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\dert6.exe"C:\Users\Admin\AppData\Local\Temp\dert6.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Roaming\java.exe"C:\Users\Admin\AppData\Roaming\java.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748KB
MD53ec49edd0acdd8b1438aabeb5dda3352
SHA16bd7d2249f6097cff67fff8afe6ed17d2951ee9e
SHA256d2df0c789def5ee202345df57dfe5be6c651f5a6144c92906ae9a7214dbc4970
SHA512b86b87a93f19a33d61955393b5742de32d2b12a9514eb3487bef9b4aa754ee75d4886cb781ef35443ef7c9fff0c66f5e00d7cc9df66e8d4b14576176fca3dba1