Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 23:12
Static task
static1
Behavioral task
behavioral1
Sample
External Triggerbot/Triggerbot.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
External Triggerbot/Triggerbot.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
External Triggerbot/triggerbot.vbs
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
External Triggerbot/triggerbot.vbs
Resource
win10v2004-20240508-en
General
-
Target
External Triggerbot/Triggerbot.exe
-
Size
760KB
-
MD5
0549a29673db554ec1e4a4ccf5c87232
-
SHA1
67a12b51ee143a8a56a23bb7bc48f08d01d1914a
-
SHA256
7cd690d2cc1c22336fbc66aa3e979ff9ce425a17e25cdf9d8cdb427690420d50
-
SHA512
ace730d24f273fbfec9ef0d11f5641e82faeb6553e2402f2c2e1ac87271ff20e0b89b28549787dd581a623d7dfc25d871d13a2b035d585ab51533551523305d5
-
SSDEEP
12288:njI/pw81iSoLo4g8H+5CjU7J89QvHHkJPmCs954oLprAVdI:njI/pw81iL9LeJ89Yk9uZLp5
Malware Config
Extracted
darkcomet
Boniito
boniitonoip24.no-ip.org:1604
DC_MUTEX-FXA1TN4
-
gencode
01MVlzDQeDeB
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 2656 attrib.exe 2800 attrib.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Triggerbot.exedescription pid process target process PID 2228 set thread context of 2364 2228 Triggerbot.exe vbc.exe -
Drops file in Windows directory 2 IoCs
Processes:
attrib.exeattrib.exedescription ioc process File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727 attrib.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vbc.exepid process 2364 vbc.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
vbc.exedescription pid process Token: SeIncreaseQuotaPrivilege 2364 vbc.exe Token: SeSecurityPrivilege 2364 vbc.exe Token: SeTakeOwnershipPrivilege 2364 vbc.exe Token: SeLoadDriverPrivilege 2364 vbc.exe Token: SeSystemProfilePrivilege 2364 vbc.exe Token: SeSystemtimePrivilege 2364 vbc.exe Token: SeProfSingleProcessPrivilege 2364 vbc.exe Token: SeIncBasePriorityPrivilege 2364 vbc.exe Token: SeCreatePagefilePrivilege 2364 vbc.exe Token: SeBackupPrivilege 2364 vbc.exe Token: SeRestorePrivilege 2364 vbc.exe Token: SeShutdownPrivilege 2364 vbc.exe Token: SeDebugPrivilege 2364 vbc.exe Token: SeSystemEnvironmentPrivilege 2364 vbc.exe Token: SeChangeNotifyPrivilege 2364 vbc.exe Token: SeRemoteShutdownPrivilege 2364 vbc.exe Token: SeUndockPrivilege 2364 vbc.exe Token: SeManageVolumePrivilege 2364 vbc.exe Token: SeImpersonatePrivilege 2364 vbc.exe Token: SeCreateGlobalPrivilege 2364 vbc.exe Token: 33 2364 vbc.exe Token: 34 2364 vbc.exe Token: 35 2364 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vbc.exepid process 2364 vbc.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
Triggerbot.exevbc.execmd.execmd.exedescription pid process target process PID 2228 wrote to memory of 2364 2228 Triggerbot.exe vbc.exe PID 2228 wrote to memory of 2364 2228 Triggerbot.exe vbc.exe PID 2228 wrote to memory of 2364 2228 Triggerbot.exe vbc.exe PID 2228 wrote to memory of 2364 2228 Triggerbot.exe vbc.exe PID 2228 wrote to memory of 2364 2228 Triggerbot.exe vbc.exe PID 2228 wrote to memory of 2364 2228 Triggerbot.exe vbc.exe PID 2228 wrote to memory of 2364 2228 Triggerbot.exe vbc.exe PID 2228 wrote to memory of 2364 2228 Triggerbot.exe vbc.exe PID 2228 wrote to memory of 2364 2228 Triggerbot.exe vbc.exe PID 2228 wrote to memory of 2364 2228 Triggerbot.exe vbc.exe PID 2228 wrote to memory of 2364 2228 Triggerbot.exe vbc.exe PID 2228 wrote to memory of 2364 2228 Triggerbot.exe vbc.exe PID 2228 wrote to memory of 2364 2228 Triggerbot.exe vbc.exe PID 2364 wrote to memory of 2188 2364 vbc.exe cmd.exe PID 2364 wrote to memory of 2188 2364 vbc.exe cmd.exe PID 2364 wrote to memory of 2188 2364 vbc.exe cmd.exe PID 2364 wrote to memory of 2188 2364 vbc.exe cmd.exe PID 2364 wrote to memory of 2760 2364 vbc.exe cmd.exe PID 2364 wrote to memory of 2760 2364 vbc.exe cmd.exe PID 2364 wrote to memory of 2760 2364 vbc.exe cmd.exe PID 2364 wrote to memory of 2760 2364 vbc.exe cmd.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2364 wrote to memory of 2592 2364 vbc.exe notepad.exe PID 2760 wrote to memory of 2656 2760 cmd.exe attrib.exe PID 2760 wrote to memory of 2656 2760 cmd.exe attrib.exe PID 2760 wrote to memory of 2656 2760 cmd.exe attrib.exe PID 2760 wrote to memory of 2656 2760 cmd.exe attrib.exe PID 2188 wrote to memory of 2800 2188 cmd.exe attrib.exe PID 2188 wrote to memory of 2800 2188 cmd.exe attrib.exe PID 2188 wrote to memory of 2800 2188 cmd.exe attrib.exe PID 2188 wrote to memory of 2800 2188 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 2656 attrib.exe 2800 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\External Triggerbot\Triggerbot.exe"C:\Users\Admin\AppData\Local\Temp\External Triggerbot\Triggerbot.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" +s +h4⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h4⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2228-0-0x0000000074C51000-0x0000000074C52000-memory.dmpFilesize
4KB
-
memory/2228-1-0x0000000074C50000-0x00000000751FB000-memory.dmpFilesize
5.7MB
-
memory/2228-2-0x0000000074C50000-0x00000000751FB000-memory.dmpFilesize
5.7MB
-
memory/2228-3-0x0000000074C50000-0x00000000751FB000-memory.dmpFilesize
5.7MB
-
memory/2228-4-0x0000000074C50000-0x00000000751FB000-memory.dmpFilesize
5.7MB
-
memory/2228-5-0x0000000074C50000-0x00000000751FB000-memory.dmpFilesize
5.7MB
-
memory/2228-20-0x0000000074C50000-0x00000000751FB000-memory.dmpFilesize
5.7MB
-
memory/2364-8-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-23-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-18-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2364-14-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-12-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-13-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-11-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-10-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-19-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-7-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-21-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-22-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-15-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-71-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-64-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-63-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-70-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-65-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-66-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-67-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-68-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2364-69-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2592-62-0x00000000001A0000-0x00000000001A1000-memory.dmpFilesize
4KB
-
memory/2592-24-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB