Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 12:41
Behavioral task
behavioral1
Sample
079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe
Resource
win7-20240221-en
General
-
Target
079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe
-
Size
756KB
-
MD5
7f63869a181a8ebb360a89b58c739648
-
SHA1
83e0504e36530cf417aee9cf6cfac90d0f21a451
-
SHA256
079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030
-
SHA512
5c1c5aaa55c3ea87138aaca88d771abb4d80d319abce0235f9ad5d6ad63c74d082c933366c7ea927fac80ef8d0874a71e9a67bb316355a8b31fd4cd060e67b86
-
SSDEEP
12288:+9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hgqMd0QZhJ:KZ1xuVVjfFoynPaVBUR8f+kN10EBqD0e
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-Z5HMAL1
-
gencode
L2p2T15qZDML
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid Process 4048 attrib.exe 1532 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exepid Process 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exedescription pid Process Token: SeIncreaseQuotaPrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeSecurityPrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeTakeOwnershipPrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeLoadDriverPrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeSystemProfilePrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeSystemtimePrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeProfSingleProcessPrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeIncBasePriorityPrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeCreatePagefilePrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeBackupPrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeRestorePrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeShutdownPrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeDebugPrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeSystemEnvironmentPrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeChangeNotifyPrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeRemoteShutdownPrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeUndockPrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeManageVolumePrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeImpersonatePrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: SeCreateGlobalPrivilege 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: 33 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: 34 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: 35 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe Token: 36 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exepid Process 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.execmd.execmd.exedescription pid Process procid_target PID 4816 wrote to memory of 2580 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 85 PID 4816 wrote to memory of 2580 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 85 PID 4816 wrote to memory of 2580 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 85 PID 4816 wrote to memory of 4424 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 87 PID 4816 wrote to memory of 4424 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 87 PID 4816 wrote to memory of 4424 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 87 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 4816 wrote to memory of 2996 4816 079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe 88 PID 2580 wrote to memory of 4048 2580 cmd.exe 90 PID 2580 wrote to memory of 4048 2580 cmd.exe 90 PID 2580 wrote to memory of 4048 2580 cmd.exe 90 PID 4424 wrote to memory of 1532 4424 cmd.exe 91 PID 4424 wrote to memory of 1532 4424 cmd.exe 91 PID 4424 wrote to memory of 1532 4424 cmd.exe 91 -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid Process 4048 attrib.exe 1532 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe"C:\Users\Admin\AppData\Local\Temp\079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe"1⤵
- Checks computer location settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\079d1841d6f0fde132f810937d247226410bbc239141493df978da344060f030.exe" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4048
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1532
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad2⤵PID:2996
-