Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-02-2024 23:06
Static task
static1
Behavioral task
behavioral1
Sample
a093797edf6c04f4639d7001a7996861.exe
Resource
win7-20240221-en
General
-
Target
a093797edf6c04f4639d7001a7996861.exe
-
Size
1.2MB
-
MD5
a093797edf6c04f4639d7001a7996861
-
SHA1
18e26ab3d87ff521756f3fcb2a9a577bea05f9ff
-
SHA256
70fb7f4353898eb02416d7950e2a2895eab599c670faa7f84e2fa997d0a8da85
-
SHA512
e1c607e493ea35123be937ea619aa179dc7c8467b0c2c06577279c5a1858ff5f4ee3907078264bfb861540732aaa2157b2b00803634fe1cc33930be9c6ac384f
-
SSDEEP
24576:P4lavt0LkLL9IMixoEgeabcsI7en5aJQhJE13qIwq9MmCS:Kkwkn9IMHeabpg+hJtaPCS
Malware Config
Extracted
darkcomet
Guest16
10.10.0.100:1604
DC_MUTEX-F54S21D
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
z8kGcvNGHx7p
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
4554.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 4554.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
msdcsc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msdcsc.exe -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 2436 attrib.exe 2416 attrib.exe -
Executes dropped EXE 2 IoCs
Processes:
4554.exemsdcsc.exepid process 2692 4554.exe 2556 msdcsc.exe -
Loads dropped DLL 7 IoCs
Processes:
a093797edf6c04f4639d7001a7996861.exe4554.exepid process 3048 a093797edf6c04f4639d7001a7996861.exe 3048 a093797edf6c04f4639d7001a7996861.exe 3048 a093797edf6c04f4639d7001a7996861.exe 3048 a093797edf6c04f4639d7001a7996861.exe 3048 a093797edf6c04f4639d7001a7996861.exe 2692 4554.exe 2692 4554.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
4554.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 4554.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msdcsc.exepid process 2556 msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
4554.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 2692 4554.exe Token: SeSecurityPrivilege 2692 4554.exe Token: SeTakeOwnershipPrivilege 2692 4554.exe Token: SeLoadDriverPrivilege 2692 4554.exe Token: SeSystemProfilePrivilege 2692 4554.exe Token: SeSystemtimePrivilege 2692 4554.exe Token: SeProfSingleProcessPrivilege 2692 4554.exe Token: SeIncBasePriorityPrivilege 2692 4554.exe Token: SeCreatePagefilePrivilege 2692 4554.exe Token: SeBackupPrivilege 2692 4554.exe Token: SeRestorePrivilege 2692 4554.exe Token: SeShutdownPrivilege 2692 4554.exe Token: SeDebugPrivilege 2692 4554.exe Token: SeSystemEnvironmentPrivilege 2692 4554.exe Token: SeChangeNotifyPrivilege 2692 4554.exe Token: SeRemoteShutdownPrivilege 2692 4554.exe Token: SeUndockPrivilege 2692 4554.exe Token: SeManageVolumePrivilege 2692 4554.exe Token: SeImpersonatePrivilege 2692 4554.exe Token: SeCreateGlobalPrivilege 2692 4554.exe Token: 33 2692 4554.exe Token: 34 2692 4554.exe Token: 35 2692 4554.exe Token: SeIncreaseQuotaPrivilege 2556 msdcsc.exe Token: SeSecurityPrivilege 2556 msdcsc.exe Token: SeTakeOwnershipPrivilege 2556 msdcsc.exe Token: SeLoadDriverPrivilege 2556 msdcsc.exe Token: SeSystemProfilePrivilege 2556 msdcsc.exe Token: SeSystemtimePrivilege 2556 msdcsc.exe Token: SeProfSingleProcessPrivilege 2556 msdcsc.exe Token: SeIncBasePriorityPrivilege 2556 msdcsc.exe Token: SeCreatePagefilePrivilege 2556 msdcsc.exe Token: SeBackupPrivilege 2556 msdcsc.exe Token: SeRestorePrivilege 2556 msdcsc.exe Token: SeShutdownPrivilege 2556 msdcsc.exe Token: SeDebugPrivilege 2556 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2556 msdcsc.exe Token: SeChangeNotifyPrivilege 2556 msdcsc.exe Token: SeRemoteShutdownPrivilege 2556 msdcsc.exe Token: SeUndockPrivilege 2556 msdcsc.exe Token: SeManageVolumePrivilege 2556 msdcsc.exe Token: SeImpersonatePrivilege 2556 msdcsc.exe Token: SeCreateGlobalPrivilege 2556 msdcsc.exe Token: 33 2556 msdcsc.exe Token: 34 2556 msdcsc.exe Token: 35 2556 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msdcsc.exepid process 2556 msdcsc.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
a093797edf6c04f4639d7001a7996861.exe4554.execmd.execmd.exemsdcsc.exedescription pid process target process PID 3048 wrote to memory of 2692 3048 a093797edf6c04f4639d7001a7996861.exe 4554.exe PID 3048 wrote to memory of 2692 3048 a093797edf6c04f4639d7001a7996861.exe 4554.exe PID 3048 wrote to memory of 2692 3048 a093797edf6c04f4639d7001a7996861.exe 4554.exe PID 3048 wrote to memory of 2692 3048 a093797edf6c04f4639d7001a7996861.exe 4554.exe PID 2692 wrote to memory of 2720 2692 4554.exe cmd.exe PID 2692 wrote to memory of 2720 2692 4554.exe cmd.exe PID 2692 wrote to memory of 2720 2692 4554.exe cmd.exe PID 2692 wrote to memory of 2720 2692 4554.exe cmd.exe PID 2692 wrote to memory of 2520 2692 4554.exe cmd.exe PID 2692 wrote to memory of 2520 2692 4554.exe cmd.exe PID 2692 wrote to memory of 2520 2692 4554.exe cmd.exe PID 2692 wrote to memory of 2520 2692 4554.exe cmd.exe PID 2692 wrote to memory of 2556 2692 4554.exe msdcsc.exe PID 2692 wrote to memory of 2556 2692 4554.exe msdcsc.exe PID 2692 wrote to memory of 2556 2692 4554.exe msdcsc.exe PID 2692 wrote to memory of 2556 2692 4554.exe msdcsc.exe PID 2720 wrote to memory of 2416 2720 cmd.exe attrib.exe PID 2720 wrote to memory of 2416 2720 cmd.exe attrib.exe PID 2720 wrote to memory of 2416 2720 cmd.exe attrib.exe PID 2720 wrote to memory of 2416 2720 cmd.exe attrib.exe PID 2520 wrote to memory of 2436 2520 cmd.exe attrib.exe PID 2520 wrote to memory of 2436 2520 cmd.exe attrib.exe PID 2520 wrote to memory of 2436 2520 cmd.exe attrib.exe PID 2520 wrote to memory of 2436 2520 cmd.exe attrib.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe PID 2556 wrote to memory of 2492 2556 msdcsc.exe notepad.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 2436 attrib.exe 2416 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a093797edf6c04f4639d7001a7996861.exe"C:\Users\Admin\AppData\Local\Temp\a093797edf6c04f4639d7001a7996861.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4554\4554.exe"C:\Users\Admin\AppData\Local\Temp\4554\4554.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\4554" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\4554" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"3⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\4554\4554.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad1⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\4554\4554.exe" +s +h1⤵
- Sets file to hidden
- Views/modifies file attributes
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4554\4554.exeFilesize
27KB
MD5e34001ad4bb8a7fd9d24ab580f3cac0f
SHA1f965b5b3f6c8125e5aeeb0d58669b1d07ebb2df6
SHA256c27068bd5168e967f7d928321e661cca6c2d6040d275921a65fb572dd76ce535
SHA51289217f8b643628164719815eafd4008fccebaa5ce57a4774e1f2831378380aeb3bb14cc6c51e1fcad571717f69fd36079d51b08f94f4a93a53f5206b44abf89a
-
C:\Users\Admin\AppData\Local\Temp\4554\4554.exeFilesize
10KB
MD53218fa0c4258f3d363b940485d3dd5a2
SHA1bdacc3e717305d15a3dbb4d38e2d5dec514c44c9
SHA25612fd3d9c5946dcc74cc32791aa825e128f0bfc2438750c2aa10471d54b23119f
SHA5122c829dcc6dd4e18179c642073fc1621f5720088f125760b2473809e6c7eeb1a5a28466c0a29666bd8cce7fe31c1bd4910a1dfc0a64fc70b4a4dd168e909966cd
-
C:\Users\Admin\AppData\Local\Temp\4554\4554.exeFilesize
17KB
MD5f0592e5217b489aec82ab87170502aa7
SHA1df25f3206339c4f4f312cd824966e5166587fb43
SHA256f8b1ac2f83eb915d764b94ac3b91fdd1e2debf77b41acdc5e66929df07cd48df
SHA512ee368dc9847fbe7adc7ad369ce2f38bbd5b5145b5b4675ea482817a10e8fd336acba0d4307c3b90d6fda2ab59f375dca451ffebc35e3f1980ea4a314ebb50e66
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exeFilesize
52KB
MD5e23907308f7c2ebcfdd5b68475d065fa
SHA1e5b0dc36c19b5cceea7d35729a02f432f46f1bb0
SHA256639dd5a7bbb50e9c6da5afbc62dd6a4b2c9aafa1304cd28298af021012477cfc
SHA512949f56e6378f46eb652ed772f339974d72ec03090ed236b0eb8e8d270522118934efdbc6cd8ea4c54b9e491355dd17f3b753564140e6ada1f1374179d1ad4439
-
\Users\Admin\AppData\Local\Temp\4554\4554.exeFilesize
55KB
MD5c297eabd9b601e8bf53038016660958f
SHA1024ea784d78f717a8e409d9fc700f27770abf0f9
SHA25618b03bea93c80cfa9fb838eb190f9c4e8c62fe637febe75162750ba54ffc5e0f
SHA512134f6bb704a61f90137d36c768d0f6f37f22de9270bee814434cbf8775725d0bf4c3e6a8623e5608b3de9f28a6270f3dec8d7a31deaea07d350a1c7c4535c2c9
-
\Users\Admin\AppData\Local\Temp\4554\4554.exeFilesize
53KB
MD5a2a0894778cd2124f7a9cf17c21e22a9
SHA137c3b77c6bdc19651393d7216b10ae41d91a2771
SHA256811b2c91bb37f3f02f7a7347130793451ce59bc0fa0e729c2d40306c812beecb
SHA512bbf0a9abc8e29b50c92a57f408da170aa667b11b01e08aeb0097ae371114e601d3a949759dbdb82c9029f16770ad6baea9ee39bb51c2afbee104e5e0e187c011
-
\Users\Admin\AppData\Local\Temp\4554\4554.exeFilesize
62KB
MD5c5a6a1ede088fc6d3ccaa4a911cda909
SHA13e32d9814b7868bdcc952e0d6cc8a71c05955b80
SHA256ce7c5a363830e6c86d4bcbe2a1088b7f861d9470a596dcadd4d958927be32a72
SHA512a89e8560aef96e6c9cfda05e5c58ac9a0e77c1011f0c0af520cafa77c3c62926b5091fc5c87fea8fe344f9818b65c114c66a74564412fedf2dfeeb4e308ef357
-
\Users\Admin\AppData\Local\Temp\4554\4554.exeFilesize
62KB
MD50aa7a5ee242a922c463b72f1c2e0bbb9
SHA11f2a801839dd18f803dd95702edd92e06eaf2420
SHA2569cab2303b56e416282afd684436304f5749c31c83f9f8374964b96a982a5cf81
SHA512d47e54272639f4d9e89dc649eca9e3e2ac087f4fc5493d2594311a4de66ececd12fe689159619fbcc16210bf2cb38d4923c3c92d1bc1eebb9e072383572d46cb
-
\Users\Admin\AppData\Local\Temp\4554\4554.exeFilesize
19KB
MD5530ba652c75b15789e2532d13096e8de
SHA105d51940bcf525d9ea3aa522c7f41f5d75c1e15e
SHA2567ae571baaef6259a0b0c8defb72189f1b810cf9cc745c59ea264e79c75ad3522
SHA512d9eeec797acdde1371a27e27efbb2ed1c10b37ef8d31a0d8622ea5c9b2d1b5c9f172c458eef75432c7c8aeb2bcae1e05caae58280c7c2f27e029d6d2583c61da
-
\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exeFilesize
207KB
MD5f6e3f6eb13f88f831be42835fc3ab630
SHA13be5a3cd126a5f897799866dee3bfb04f4ec61e3
SHA2568fe2924590e480ae8e2b95c5baf7ac530b114d8316452a90698d56295362a855
SHA512e2ad096a4116c038e1e9a561270a19d82b0d58cb910ac4390109765b827b448e32efacbeb429696b87b46740e7e0caff5826b7b834a824e324673648f53e0fd9
-
\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exeFilesize
130KB
MD58ce25c8cd95d504e3374b7a82bdea874
SHA14ab29ba61fbc2dc59cd9322e6e8b6ccdc5f7b020
SHA256169ebf0e216992970155652b1fe8f41dee346a6574e968d385cfeeeed7229994
SHA512144cdf401f53e9125440a3c01468a6f67cd08df4c0df24f0086be8fb1bc3252c0bfe7f290081c5846d00c7a5e968050a0a74f457d831276c95a298d4a7bd7bc1
-
memory/2492-44-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/2492-69-0x0000000000430000-0x0000000000431000-memory.dmpFilesize
4KB
-
memory/2556-70-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2556-72-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2556-42-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2556-82-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2556-80-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2556-78-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2556-76-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2556-43-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/2556-74-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2692-27-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2692-28-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/2692-39-0x00000000021F0000-0x00000000022A7000-memory.dmpFilesize
732KB
-
memory/2692-41-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/3048-16-0x0000000004B00000-0x0000000004BB7000-memory.dmpFilesize
732KB
-
memory/3048-17-0x0000000004B00000-0x0000000004BB7000-memory.dmpFilesize
732KB