Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 02:59
Static task
static1
Behavioral task
behavioral1
Sample
Black Beauty Rainmeter Skin/black_beauty_by_mic831-d4thkf?niksmr..exe
Resource
win7-20240611-en
General
-
Target
Black Beauty Rainmeter Skin/black_beauty_by_mic831-d4thkf?niksmr..exe
-
Size
1.3MB
-
MD5
ab28e71a44f8c8214696385bd7c907a3
-
SHA1
e770fedad3afc03958b0a9e2ae1ed7ddbafab29c
-
SHA256
d94e345b0a18789dd346679473f4a2721f97fb3d7cf289b39fe4e540f258fed6
-
SHA512
7729f48cb1659a6512dfa8e8f37771c7d406307ef73e5507f80e4e1e7dbebef9030eeb33d3ba4cedca0a7a2ece17f014b56e7af957eea93eba55bbf5c04344a3
-
SSDEEP
24576:MlmawWOifU8NaofT5j1W6azCEO9QJC2f3iuFg/Kn7W:QddMSpfT5j1ozIQJ1SEg/KC
Malware Config
Extracted
darkcomet
Slave
haaadukit.no-ip.biz:3365
DCMIN_MUTEX-6ABRBTZ
-
gencode
S6MwSKuUU9ju
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2660-30-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/2660-29-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/2660-31-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/2660-26-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/2660-24-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/2660-32-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/2660-35-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/2660-36-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/2660-34-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/2660-38-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/2660-37-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/2660-40-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/2660-59-0x0000000000400000-0x00000000004BB000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmpnetk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wmpnet32.exe" vbc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
black_beauty_by_mic831-d4thkf_niksmr..exedescription pid process target process PID 2180 set thread context of 2724 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2180 set thread context of 2660 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000_CLASSES\.rmskin rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000_CLASSES\.rmskin\ = "rmskin_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000_CLASSES\rmskin_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000_CLASSES\rmskin_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000_CLASSES\rmskin_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000_CLASSES\rmskin_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000_CLASSES\rmskin_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000_CLASSES\rmskin_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
NTFS ADS 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\svchost.exe:ZONE.identifier cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 3052 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
vbc.exedescription pid process Token: SeIncreaseQuotaPrivilege 2660 vbc.exe Token: SeSecurityPrivilege 2660 vbc.exe Token: SeTakeOwnershipPrivilege 2660 vbc.exe Token: SeLoadDriverPrivilege 2660 vbc.exe Token: SeSystemProfilePrivilege 2660 vbc.exe Token: SeSystemtimePrivilege 2660 vbc.exe Token: SeProfSingleProcessPrivilege 2660 vbc.exe Token: SeIncBasePriorityPrivilege 2660 vbc.exe Token: SeCreatePagefilePrivilege 2660 vbc.exe Token: SeBackupPrivilege 2660 vbc.exe Token: SeRestorePrivilege 2660 vbc.exe Token: SeShutdownPrivilege 2660 vbc.exe Token: SeDebugPrivilege 2660 vbc.exe Token: SeSystemEnvironmentPrivilege 2660 vbc.exe Token: SeChangeNotifyPrivilege 2660 vbc.exe Token: SeRemoteShutdownPrivilege 2660 vbc.exe Token: SeUndockPrivilege 2660 vbc.exe Token: SeManageVolumePrivilege 2660 vbc.exe Token: SeImpersonatePrivilege 2660 vbc.exe Token: SeCreateGlobalPrivilege 2660 vbc.exe Token: 33 2660 vbc.exe Token: 34 2660 vbc.exe Token: 35 2660 vbc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
vbc.exevbc.exeAcroRd32.exepid process 2724 vbc.exe 2660 vbc.exe 3052 AcroRd32.exe 3052 AcroRd32.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
black_beauty_by_mic831-d4thkf_niksmr..exerundll32.exedescription pid process target process PID 2180 wrote to memory of 2724 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2180 wrote to memory of 2724 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2180 wrote to memory of 2724 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2180 wrote to memory of 2724 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2180 wrote to memory of 2724 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2180 wrote to memory of 2724 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2180 wrote to memory of 2724 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2180 wrote to memory of 2724 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2180 wrote to memory of 2724 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2180 wrote to memory of 2740 2180 black_beauty_by_mic831-d4thkf_niksmr..exe cmd.exe PID 2180 wrote to memory of 2740 2180 black_beauty_by_mic831-d4thkf_niksmr..exe cmd.exe PID 2180 wrote to memory of 2740 2180 black_beauty_by_mic831-d4thkf_niksmr..exe cmd.exe PID 2180 wrote to memory of 2740 2180 black_beauty_by_mic831-d4thkf_niksmr..exe cmd.exe PID 2180 wrote to memory of 2692 2180 black_beauty_by_mic831-d4thkf_niksmr..exe rundll32.exe PID 2180 wrote to memory of 2692 2180 black_beauty_by_mic831-d4thkf_niksmr..exe rundll32.exe PID 2180 wrote to memory of 2692 2180 black_beauty_by_mic831-d4thkf_niksmr..exe rundll32.exe PID 2180 wrote to memory of 2692 2180 black_beauty_by_mic831-d4thkf_niksmr..exe rundll32.exe PID 2180 wrote to memory of 2692 2180 black_beauty_by_mic831-d4thkf_niksmr..exe rundll32.exe PID 2180 wrote to memory of 2692 2180 black_beauty_by_mic831-d4thkf_niksmr..exe rundll32.exe PID 2180 wrote to memory of 2692 2180 black_beauty_by_mic831-d4thkf_niksmr..exe rundll32.exe PID 2180 wrote to memory of 2660 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2180 wrote to memory of 2660 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2180 wrote to memory of 2660 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2180 wrote to memory of 2660 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2180 wrote to memory of 2660 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2180 wrote to memory of 2660 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2180 wrote to memory of 2660 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2180 wrote to memory of 2660 2180 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 2692 wrote to memory of 3052 2692 rundll32.exe AcroRd32.exe PID 2692 wrote to memory of 3052 2692 rundll32.exe AcroRd32.exe PID 2692 wrote to memory of 3052 2692 rundll32.exe AcroRd32.exe PID 2692 wrote to memory of 3052 2692 rundll32.exe AcroRd32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Black Beauty Rainmeter Skin\black_beauty_by_mic831-d4thkf_niksmr..exe"C:\Users\Admin\AppData\Local\Temp\Black Beauty Rainmeter Skin\black_beauty_by_mic831-d4thkf_niksmr..exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"cmd"2⤵
- NTFS ADS
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\black_beauty_by_mic831-d4thkf0.rmskin2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\black_beauty_by_mic831-d4thkf0.rmskin"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\black_beauty_by_mic831-d4thkf0.rmskinFilesize
432KB
MD5a1f4029acd9802c948cc770c24d488b6
SHA18907f81f4d5226c860ec47e0067e1606f35d484a
SHA256b60d4947c4dafc66f0c6ab83b7ea9594dc03508151b07508527612c5f0b5c3c1
SHA5122e449338913968cfebc85a2b92f812e18f894bb7c042f03a7f463a20bcf2f857017a82b689c0615adaa912c1b798e3f3e014728a7638320901999e49b170aac0
-
C:\Users\Admin\AppData\Local\Temp\fp.txtFilesize
103B
MD5d1d57811ea8479eb76ba617b25c1bf91
SHA1979ac8b7365725a96ebcee80a2a2ae2622c7afa9
SHA256d84715b33fdd79464ea60a82cffcc86eccbbd55ed42b948894d13df0e14316cd
SHA512a08401d6443a144c1016676706961b5a62f5ca5a6f82f257ec8bee49a007f28de9532a311309b46b7d8355b000e92018d7d84c36018481aa6471522912803db0
-
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEventsFilesize
3KB
MD52eb76e8477f28331a3fb1010167385cb
SHA1cfa0f15e04850a9cf91aebc999cc60e8dc2e7d46
SHA256839d39a39e1841bfa0edd76d192d48f0c788d109a5b881f4de921ebcab7d7a12
SHA5123f7fe881fc4b4c1230bd8758289a96409bf4bb8343ae4a1709c2422706e195957bbda21c7d94bc45c927afe92299e0cbde14ae248f3a5c289dde9416bb46b111
-
memory/2180-1-0x0000000074B60000-0x000000007510B000-memory.dmpFilesize
5.7MB
-
memory/2180-2-0x0000000074B60000-0x000000007510B000-memory.dmpFilesize
5.7MB
-
memory/2180-0-0x0000000074B61000-0x0000000074B62000-memory.dmpFilesize
4KB
-
memory/2180-33-0x0000000074B60000-0x000000007510B000-memory.dmpFilesize
5.7MB
-
memory/2660-34-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/2660-37-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/2660-59-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/2660-40-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/2660-22-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/2660-30-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/2660-29-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/2660-31-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/2660-26-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/2660-24-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/2660-32-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/2660-38-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/2660-35-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/2660-36-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/2724-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2724-6-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/2724-13-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/2724-11-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/2724-19-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/2724-7-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/2724-4-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB