Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 01:52
Static task
static1
Behavioral task
behavioral1
Sample
bd5b7d938e9239a63dd3cd7a983f9f55.exe
Resource
win7-20240215-en
General
-
Target
bd5b7d938e9239a63dd3cd7a983f9f55.exe
-
Size
1.8MB
-
MD5
bd5b7d938e9239a63dd3cd7a983f9f55
-
SHA1
615f62ddd511d4c13b9f2765394ddf5977050398
-
SHA256
1529bd2480155dd41221b9729b08f0a14d718aea591ee7d1b0b9406f5687c606
-
SHA512
3fca63dd2adc40581e774e229ba70ac91e2566d9d53c742dde1b43fd65299e45b6758b0abfc692e9229d8f7ec62e1bd0c5f611504bbc34f61c42babb91a21f22
-
SSDEEP
49152:vkwkn9IMHeaHw0dWXPUYsUt0G0bIA4aIXaPCS:8dnVjMX1tt0EA40PC
Malware Config
Extracted
darkcomet
Guest16
10.10.0.100:1604
DC_MUTEX-CK91ZJ9
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
Fk5GVHWLTpJu
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
4806.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 4806.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
msdcsc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msdcsc.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
Processes:
4806.exemsdcsc.exepid process 2616 4806.exe 2548 msdcsc.exe -
Loads dropped DLL 7 IoCs
Processes:
bd5b7d938e9239a63dd3cd7a983f9f55.exe4806.exepid process 2748 bd5b7d938e9239a63dd3cd7a983f9f55.exe 2748 bd5b7d938e9239a63dd3cd7a983f9f55.exe 2748 bd5b7d938e9239a63dd3cd7a983f9f55.exe 2748 bd5b7d938e9239a63dd3cd7a983f9f55.exe 2748 bd5b7d938e9239a63dd3cd7a983f9f55.exe 2616 4806.exe 2616 4806.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4806.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 4806.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msdcsc.exepid process 2548 msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
4806.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 2616 4806.exe Token: SeSecurityPrivilege 2616 4806.exe Token: SeTakeOwnershipPrivilege 2616 4806.exe Token: SeLoadDriverPrivilege 2616 4806.exe Token: SeSystemProfilePrivilege 2616 4806.exe Token: SeSystemtimePrivilege 2616 4806.exe Token: SeProfSingleProcessPrivilege 2616 4806.exe Token: SeIncBasePriorityPrivilege 2616 4806.exe Token: SeCreatePagefilePrivilege 2616 4806.exe Token: SeBackupPrivilege 2616 4806.exe Token: SeRestorePrivilege 2616 4806.exe Token: SeShutdownPrivilege 2616 4806.exe Token: SeDebugPrivilege 2616 4806.exe Token: SeSystemEnvironmentPrivilege 2616 4806.exe Token: SeChangeNotifyPrivilege 2616 4806.exe Token: SeRemoteShutdownPrivilege 2616 4806.exe Token: SeUndockPrivilege 2616 4806.exe Token: SeManageVolumePrivilege 2616 4806.exe Token: SeImpersonatePrivilege 2616 4806.exe Token: SeCreateGlobalPrivilege 2616 4806.exe Token: 33 2616 4806.exe Token: 34 2616 4806.exe Token: 35 2616 4806.exe Token: SeIncreaseQuotaPrivilege 2548 msdcsc.exe Token: SeSecurityPrivilege 2548 msdcsc.exe Token: SeTakeOwnershipPrivilege 2548 msdcsc.exe Token: SeLoadDriverPrivilege 2548 msdcsc.exe Token: SeSystemProfilePrivilege 2548 msdcsc.exe Token: SeSystemtimePrivilege 2548 msdcsc.exe Token: SeProfSingleProcessPrivilege 2548 msdcsc.exe Token: SeIncBasePriorityPrivilege 2548 msdcsc.exe Token: SeCreatePagefilePrivilege 2548 msdcsc.exe Token: SeBackupPrivilege 2548 msdcsc.exe Token: SeRestorePrivilege 2548 msdcsc.exe Token: SeShutdownPrivilege 2548 msdcsc.exe Token: SeDebugPrivilege 2548 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2548 msdcsc.exe Token: SeChangeNotifyPrivilege 2548 msdcsc.exe Token: SeRemoteShutdownPrivilege 2548 msdcsc.exe Token: SeUndockPrivilege 2548 msdcsc.exe Token: SeManageVolumePrivilege 2548 msdcsc.exe Token: SeImpersonatePrivilege 2548 msdcsc.exe Token: SeCreateGlobalPrivilege 2548 msdcsc.exe Token: 33 2548 msdcsc.exe Token: 34 2548 msdcsc.exe Token: 35 2548 msdcsc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
bd5b7d938e9239a63dd3cd7a983f9f55.exe4806.exemsdcsc.exedescription pid process target process PID 2748 wrote to memory of 2616 2748 bd5b7d938e9239a63dd3cd7a983f9f55.exe 4806.exe PID 2748 wrote to memory of 2616 2748 bd5b7d938e9239a63dd3cd7a983f9f55.exe 4806.exe PID 2748 wrote to memory of 2616 2748 bd5b7d938e9239a63dd3cd7a983f9f55.exe 4806.exe PID 2748 wrote to memory of 2616 2748 bd5b7d938e9239a63dd3cd7a983f9f55.exe 4806.exe PID 2616 wrote to memory of 2548 2616 4806.exe msdcsc.exe PID 2616 wrote to memory of 2548 2616 4806.exe msdcsc.exe PID 2616 wrote to memory of 2548 2616 4806.exe msdcsc.exe PID 2616 wrote to memory of 2548 2616 4806.exe msdcsc.exe PID 2548 wrote to memory of 2444 2548 msdcsc.exe notepad.exe PID 2548 wrote to memory of 2444 2548 msdcsc.exe notepad.exe PID 2548 wrote to memory of 2444 2548 msdcsc.exe notepad.exe PID 2548 wrote to memory of 2444 2548 msdcsc.exe notepad.exe PID 2548 wrote to memory of 2444 2548 msdcsc.exe notepad.exe PID 2548 wrote to memory of 2444 2548 msdcsc.exe notepad.exe PID 2548 wrote to memory of 2444 2548 msdcsc.exe notepad.exe PID 2548 wrote to memory of 2444 2548 msdcsc.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd5b7d938e9239a63dd3cd7a983f9f55.exe"C:\Users\Admin\AppData\Local\Temp\bd5b7d938e9239a63dd3cd7a983f9f55.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4806\4806.exe"C:\Users\Admin\AppData\Local\Temp\4806\4806.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"3⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad4⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4806\4806.exeFilesize
218KB
MD59d78dc0afeac2a7485724f7edb05d87b
SHA1df24756d14f6c198efc58b1e510f02952cc7c19a
SHA25633e2fee545ffea8176835e363bdfb39f70cd34a11f96586ae31465d0d97bb1e6
SHA5121d1f425f98a91a33cc355d50f86144ad5f6df3ed636be3e19de0dd80785f27c002f557bfc32cdc62bfbf015c04ddd5583941bdb952600e7f99b77378a0c27998
-
C:\Users\Admin\AppData\Local\Temp\4806\4806.exeFilesize
112KB
MD579468b6c6a3996f5e545bfacd56a0823
SHA1d5aea762ae480e8adb7263e60fb2adeb56d2d02a
SHA2560efe828704df66f211a7dfd6e391d5a871f42ec8d60a6ce031cdf734fa7b04d3
SHA5123163c8374d6fad7aff3a4faf34d1769cb5721c5d32b66d177994a2f81ffff5e53c11f39b9680e4abcf8f571b833b5c9b3ed5950d9043339bd607e64d0537df9c
-
C:\Users\Admin\AppData\Local\Temp\4806\4806.exeFilesize
78KB
MD56c166be69c63139e26251d99d06413b7
SHA1c838a9110ae0932f2a72331db74cb75630aaffc6
SHA256bce767405fa7984e3c850df63dce6ee34f089b78567aba46e9a1a2b73af89b9e
SHA512158a598576fc56fe8ed28f434fd14d5b579a96725f0965437466c8c13109b7901596a4e6c628934c9f66af1eebef923ce89261188bd350b96d1e4bd9ef084a03
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exeFilesize
305KB
MD5dcf293013a687612fe67dd9d595deaf3
SHA1ed075c7b4a58aaac96b5d5ffb4cf3c483b8bf402
SHA256478704f661897ed054fe7bc2f4962d3f6cf55a930ba392c3301b67b1e34c8b3f
SHA5122f50a665f04bdbacde41bca981c0ee6461e8c044f75cd537cec93b6825f83f7e4acf7498253bb775de3b268b65ab6941767b065cb693daad34a5a1161884a5d4
-
\Users\Admin\AppData\Local\Temp\4806\4806.exeFilesize
758KB
MD5bdbc8dd1a4626488efa5b470eab5dd75
SHA128803f060ece4749d0172b692fd52c35accc8ba5
SHA25604377f6d0053f0efb4bf482d32d2703f92b5168581f4f01376baa0e702cb1e65
SHA512dfc6b92ade558f40ce04ebfafe3c8dd82b115122fd5fd4b5341e7411616a19ec0db4e84d79f1cc60faca96379c90d8834f07fb1675fad2ff7ece28e6eedc36f8
-
\Users\Admin\AppData\Local\Temp\4806\4806.exeFilesize
427KB
MD5e3d15d35aa272fa51bccc2526e44c2a3
SHA1bc2515b27ea7631ea576b18cfa7ddc1ea1db04c2
SHA256780dcd11a69d6eda44d4279316b03d60cc3f8f2f16a82b524b56627b9c2c34be
SHA512008d26e8a97de571ee49be24c042d60a3148c3732af81b4dac5693fc75cb7855f58cd2fca26407fe9b28a9cf77c814333804f2080745310b4e263754ca7d67d6
-
\Users\Admin\AppData\Local\Temp\4806\4806.exeFilesize
241KB
MD5459e38621b7aa33680ccc3dcf4f06f6d
SHA174c6366de734347cc73d3430704831b5907f9611
SHA2568c647b996d4d0db0867d141fd91721f868f62c54057841a955eaa9e69dc96ac1
SHA5129f8892fc6d63ef464dd234caa1c913ac2d3127063ba47af469f9097d9d8f8b5fc4b0ac82a754dca8e139ea48569b2a3cac8e992534a9376580aa79bd457032c1
-
\Users\Admin\AppData\Local\Temp\4806\4806.exeFilesize
177KB
MD54c685ea820b2aad0c66f9af2f97d990c
SHA112c06813ce84d15425fee3fb6a3816997da60ee5
SHA2562b62d97d2a0bf1ffe16619c4273fc074288b2167f2d05921ae6aedff4332843f
SHA51236a405e476cadb07b6513bc0acedfcb1dc42baa99e846098bd98188796e8b9e46cc818e0e5d701eb564457725f30f51ad92412965c4a7d64ed4c4ca6c986f8c2
-
\Users\Admin\AppData\Local\Temp\4806\4806.exeFilesize
165KB
MD5be3321b821984ccdf03faa8f3b17b86a
SHA1b18cba323c91c55d47daccd48d7c03d5349c43e4
SHA256f13520bd02f7654b2ebbd0540ea58bb2d2ed333a3f0020beee8c60e38755eb3a
SHA51231d8fbd4ac9789111f5eae2895d814bb1aa3129d926f6612c49b3736853fbfadd055fec8608ca6df47800a453775bd71c8569155114a9502cde0d46290f6fa14
-
\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exeFilesize
636KB
MD52c853dc5bb329866d69a75e3b1cc2bd9
SHA14f4dacc8af83b1d2ef40019784aa7cb0cbe3c42e
SHA256f33810a810d21fc70768960874a5bc8e3d437d15f5cc55420e0238c7985271b2
SHA51290260a26c2de6900479946c6db0efab6a800c478d0d471dca7faad88fb492f37c019d040b51f35d5d59cf725f7374c5546b07b0c75077b6b192ef5341eef2c24
-
\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exeFilesize
339KB
MD590c5e7701d634fef3728135d2794b2fa
SHA1eb8d720abea0ad883dd70448100adc5590555274
SHA256cc0d1e23a032e112c6f9eeb83ada204777d684ae4b4d71759c7df05f32b7437f
SHA512ae27925f5e035da3758d1a688478668ea9c8e17c90cc877755886d1c7ad13467e0a14b08dce795aa0e410416fb281f8d97b912e4b757f9fa79ced3c12deeda1c
-
memory/2444-39-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/2548-38-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/2548-47-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/2548-49-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/2616-25-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/2616-37-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB