Behavioral task
behavioral1
Sample
c44f49a36e22341d9693dbd74266038593fdf29fd50fdcba9f1ae78035e2c1f3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c44f49a36e22341d9693dbd74266038593fdf29fd50fdcba9f1ae78035e2c1f3.exe
Resource
win10v2004-20240412-en
General
-
Target
4e823f188195ee2ecde1898968ccd53e74e56897c6900023dc47ea1a9e009dad
-
Size
309KB
-
MD5
5d65a86a70e0bbb4b5f6e652f88ffed3
-
SHA1
6b1c41d7ef3ecf04295ccad1601e3ac49d5568a7
-
SHA256
4e823f188195ee2ecde1898968ccd53e74e56897c6900023dc47ea1a9e009dad
-
SHA512
e4b9d20c9f9d06faa6eb042ed44402c47a57f75dc606669c5123e9c87af3533d30c473d6eabd117957cc403c67b6e34fa3d04df88bae03a6160a2241756ba393
-
SSDEEP
6144:7y22nntGqoSXjqQWiiH9FIx5kf/wvmejJAGx5xw8JNc991:7yJntdjZWrdFO5kQnjdK8zU
Malware Config
Signatures
-
Darkcomet family
-
Processes:
resource yara_rule static1/unpack001/c44f49a36e22341d9693dbd74266038593fdf29fd50fdcba9f1ae78035e2c1f3.exe upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/c44f49a36e22341d9693dbd74266038593fdf29fd50fdcba9f1ae78035e2c1f3.exe
Files
-
4e823f188195ee2ecde1898968ccd53e74e56897c6900023dc47ea1a9e009dad.zip
Password: infected
-
c44f49a36e22341d9693dbd74266038593fdf29fd50fdcba9f1ae78035e2c1f3.exe.exe windows:4 windows x86 arch:x86
327b02177598022b32d5e551f40d638a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
AnimateWindow
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
lstrlen
lstrcpy
WriteProcessMemory
WriteFile
WinExec
WaitForSingleObject
VirtualQuery
VirtualFreeEx
VirtualFree
VirtualAllocEx
VirtualAlloc
VerLanguageNameA
UnmapViewOfFile
TerminateProcess
SizeofResource
SetThreadLocale
SetThreadContext
SetLastError
SetFileTime
SetFilePointer
SetFileAttributesA
SetEvent
SetErrorMode
SetEndOfFile
ResumeThread
ResetEvent
ReadProcessMemory
ReadFile
PeekNamedPipe
OpenProcess
MultiByteToWideChar
MulDiv
MoveFileA
MapViewOfFile
LockResource
LocalFileTimeToFileTime
LocalAlloc
LoadResource
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
HeapFree
HeapAlloc
GlobalUnlock
GlobalMemoryStatus
GlobalLock
GlobalFree
GlobalFindAtomA
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomA
GetWindowsDirectoryA
GetVersionExA
GetVersion
GetUserDefaultLangID
GetTickCount
GetThreadLocale
GetThreadContext
GetTempPathA
GetSystemDirectoryA
GetStdHandle
GetProcessHeap
GetProcAddress
GetPrivateProfileStringA
GetPrivateProfileIntA
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetLastError
GetFullPathNameA
GetFileSize
GetFileAttributesA
GetExitCodeProcess
GetEnvironmentVariableA
GetDriveTypeA
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetComputerNameA
GetCPInfo
FreeResource
InterlockedExchange
FreeLibrary
FormatMessageA
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitThread
ExitProcess
EnumResourceNamesA
EnumCalendarInfoA
EnterCriticalSection
DosDateTimeToFileTime
DeleteFileA
DeleteCriticalSection
CreateThread
CreateProcessA
CreatePipe
CreateMutexA
CreateFileMappingA
CreateFileA
CreateEventA
CreateDirectoryA
CopyFileA
CompareStringA
CloseHandle
Beep
Sleep
LoadLibraryA
GetProcAddress
VirtualProtect
VirtualAlloc
VirtualFree
ExitProcess
advapi32
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegFlushKey
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCreateKeyA
RegCloseKey
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueA
LookupPrivilegeNameA
LookupPrivilegeDisplayNameA
LookupAccountSidA
LookupAccountNameA
IsValidSid
GetUserNameA
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
GetSidIdentifierAuthority
AdjustTokenPrivileges
LsaFreeMemory
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
ConvertSidToStringSidA
CredEnumerateA
StartServiceA
QueryServiceStatus
OpenServiceA
OpenSCManagerA
EnumServicesStatusA
DeleteService
CreateServiceA
ControlService
CloseServiceHandle
LsaClose
wsock32
WSACleanup
WSAStartup
WSAGetLastError
gethostname
getservbyname
gethostbyname
gethostbyaddr
socket
shutdown
sendto
send
recv
htons
ioctlsocket
inet_ntoa
inet_addr
htons
connect
shell32
ShellExecuteEx
ShellExecuteA
SHGetFileInfo
SHFileOperation
DragQueryFile
SHGetSpecialFolderLocation
SHGetPathFromIDList
SHGetSpecialFolderPathA
SHGetSpecialFolderPathA
SHEmptyRecycleBinA
ShellExecuteA
oleaut32
GetErrorInfo
GetActiveObject
SysFreeString
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
VariantCopy
combase
CoTaskMemFree
CLSIDFromProgID
ProgIDFromCLSID
StringFromCLSID
CoCreateInstance
CoUninitialize
CoTaskMemFree
StringFromCLSID
ole32
CoInitialize
IsEqualGUID
IsEqualGUID
urlmon
URLDownloadToFileA
URLDownloadToFileA
comctl32
_TrackMouseEvent
ImageList_SetIconSize
ImageList_GetIconSize
ImageList_Write
ImageList_Read
ImageList_DragShowNolock
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
ImageList_EndDrag
ImageList_BeginDrag
ImageList_Remove
ImageList_DrawEx
ImageList_Draw
ImageList_GetBkColor
ImageList_SetBkColor
ImageList_Add
ImageList_GetImageCount
ImageList_Destroy
ImageList_Create
ImageList_Add
wininet
InternetOpenUrlA
InternetOpenA
InternetConnectA
InternetCloseHandle
FtpPutFileA
FtpPutFileA
winmm
waveInUnprepareHeader
waveInStart
waveInReset
waveInPrepareHeader
waveInOpen
waveInClose
waveInAddBuffer
PlaySoundA
mciSendStringA
waveInOpen
rasapi32
RasGetEntryDialParamsA
RasEnumEntriesA
RasEnumEntriesA
netapi32
Netbios
NetApiBufferFree
NetShareGetInfo
NetShareEnum
Netbios
ntdll
NtUnmapViewOfSection
NtQuerySystemInformation
NtUnmapViewOfSection
NtQuerySystemInformation
gdiplus
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipDrawImageRectI
GdipSetInterpolationMode
GdipDeleteGraphics
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipGetImagePixelFormat
GdipGetImageGraphicsContext
GdipSaveImageToStream
GdipDisposeImage
GdiplusShutdown
GdiplusStartup
GdipFree
GdipAlloc
GdipFree
avicap32
capGetDriverDescriptionA
capGetDriverDescriptionA
capGetDriverDescriptionA
shfolder
SHGetFolderPathA
SHGetFolderPathA
ws2_32
WSAIoctl
WSAIoctl
send
msacm32
acmStreamUnprepareHeader
acmStreamPrepareHeader
acmStreamConvert
acmStreamReset
acmStreamSize
acmStreamClose
acmStreamOpen
acmStreamSize
pstorec
PStoreCreateInstance
PStoreCreateInstance
url
InetIsOffline
InetIsOffline
gdi32
SaveDC
Sections
UPX0 Size: 484KB - Virtual size: 484KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 232KB - Virtual size: 232KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE