Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 19:14
Static task
static1
Behavioral task
behavioral1
Sample
aefcc4fbfe2edc7cc7992085ee0ef500cd6def9b66e5f668d4dfc03ae06f49c1.exe
Resource
win7-20240221-en
General
-
Target
aefcc4fbfe2edc7cc7992085ee0ef500cd6def9b66e5f668d4dfc03ae06f49c1.exe
-
Size
1.1MB
-
MD5
49fc97af2d9c6cae7e412ae548e7edd8
-
SHA1
f6c969bcab3ae6ab2116708ab002828e7482c5f7
-
SHA256
aefcc4fbfe2edc7cc7992085ee0ef500cd6def9b66e5f668d4dfc03ae06f49c1
-
SHA512
a7f151c9adae93329d14ccff453b13de250f5978cc28e8a1f78ad74469a0d12951c837604d11f24ff9268d1548fc63ae3e69b6eadf2ac9870ad6bad0ea2ee49a
-
SSDEEP
24576:RBkVdlYACfZQ+aS2HnJV54K0q6tHXsk+vZmE:/svCfj/wV5GtHBcx
Malware Config
Extracted
darkcomet
Guest16
5.tcp.eu.ngrok.io:13559
DC_MUTEX-RYGWV09
-
gencode
iM649R849fl9
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
егорыч.exepid Process 2584 егорыч.exe -
Loads dropped DLL 5 IoCs
Processes:
aefcc4fbfe2edc7cc7992085ee0ef500cd6def9b66e5f668d4dfc03ae06f49c1.exepid Process 2944 aefcc4fbfe2edc7cc7992085ee0ef500cd6def9b66e5f668d4dfc03ae06f49c1.exe 2944 aefcc4fbfe2edc7cc7992085ee0ef500cd6def9b66e5f668d4dfc03ae06f49c1.exe 2944 aefcc4fbfe2edc7cc7992085ee0ef500cd6def9b66e5f668d4dfc03ae06f49c1.exe 2944 aefcc4fbfe2edc7cc7992085ee0ef500cd6def9b66e5f668d4dfc03ae06f49c1.exe 2944 aefcc4fbfe2edc7cc7992085ee0ef500cd6def9b66e5f668d4dfc03ae06f49c1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
егорыч.exedescription pid Process Token: SeIncreaseQuotaPrivilege 2584 егорыч.exe Token: SeSecurityPrivilege 2584 егорыч.exe Token: SeTakeOwnershipPrivilege 2584 егорыч.exe Token: SeLoadDriverPrivilege 2584 егорыч.exe Token: SeSystemProfilePrivilege 2584 егорыч.exe Token: SeSystemtimePrivilege 2584 егорыч.exe Token: SeProfSingleProcessPrivilege 2584 егорыч.exe Token: SeIncBasePriorityPrivilege 2584 егорыч.exe Token: SeCreatePagefilePrivilege 2584 егорыч.exe Token: SeBackupPrivilege 2584 егорыч.exe Token: SeRestorePrivilege 2584 егорыч.exe Token: SeShutdownPrivilege 2584 егорыч.exe Token: SeDebugPrivilege 2584 егорыч.exe Token: SeSystemEnvironmentPrivilege 2584 егорыч.exe Token: SeChangeNotifyPrivilege 2584 егорыч.exe Token: SeRemoteShutdownPrivilege 2584 егорыч.exe Token: SeUndockPrivilege 2584 егорыч.exe Token: SeManageVolumePrivilege 2584 егорыч.exe Token: SeImpersonatePrivilege 2584 егорыч.exe Token: SeCreateGlobalPrivilege 2584 егорыч.exe Token: 33 2584 егорыч.exe Token: 34 2584 егорыч.exe Token: 35 2584 егорыч.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid Process 2208 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
егорыч.exepid Process 2584 егорыч.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
aefcc4fbfe2edc7cc7992085ee0ef500cd6def9b66e5f668d4dfc03ae06f49c1.exedescription pid Process procid_target PID 2944 wrote to memory of 2584 2944 aefcc4fbfe2edc7cc7992085ee0ef500cd6def9b66e5f668d4dfc03ae06f49c1.exe 29 PID 2944 wrote to memory of 2584 2944 aefcc4fbfe2edc7cc7992085ee0ef500cd6def9b66e5f668d4dfc03ae06f49c1.exe 29 PID 2944 wrote to memory of 2584 2944 aefcc4fbfe2edc7cc7992085ee0ef500cd6def9b66e5f668d4dfc03ae06f49c1.exe 29 PID 2944 wrote to memory of 2584 2944 aefcc4fbfe2edc7cc7992085ee0ef500cd6def9b66e5f668d4dfc03ae06f49c1.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\aefcc4fbfe2edc7cc7992085ee0ef500cd6def9b66e5f668d4dfc03ae06f49c1.exe"C:\Users\Admin\AppData\Local\Temp\aefcc4fbfe2edc7cc7992085ee0ef500cd6def9b66e5f668d4dfc03ae06f49c1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\егорыч.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\егорыч.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2584
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD5a905f9c62a5ea77a587f268e2cfdd776
SHA1c1d4f8126182882e472486d1d1dbe93762bb0897
SHA2566e9b20dee99fa75cfffd0ebae9a888adf611eca15dc8fe160e0ea0f8a2fc520e
SHA512272592e34b9f6c7163717dc0520577ced3abfcf3b6d0ed54e84821d364a9119f413ee24c079eae991db1fddf4e168be78fceb22bfad2c89d3a1de654dcbeb66f
-
Filesize
658KB
MD5c4f0b78a6fae84edab5e00f55a5e74e9
SHA10b9608a0db03faa4b219c0ccb3f89c094d5a736d
SHA256b2401024feb120662c7b58d8fab4e5879cfa11f3c2ca55528a101ab1a52afcf8
SHA5127bce618f0fd6b03f1b1072f5171ba1fd94d7b373836a5c7faa8eb6b0ba735c91a7c209c59d3e581a01a245bda1645575f3a19e9c7fe0491602a807138084b2c2