Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 02:59
Static task
static1
Behavioral task
behavioral1
Sample
Black Beauty Rainmeter Skin/black_beauty_by_mic831-d4thkf?niksmr..exe
Resource
win7-20240611-en
General
-
Target
Black Beauty Rainmeter Skin/black_beauty_by_mic831-d4thkf?niksmr..exe
-
Size
1.3MB
-
MD5
ab28e71a44f8c8214696385bd7c907a3
-
SHA1
e770fedad3afc03958b0a9e2ae1ed7ddbafab29c
-
SHA256
d94e345b0a18789dd346679473f4a2721f97fb3d7cf289b39fe4e540f258fed6
-
SHA512
7729f48cb1659a6512dfa8e8f37771c7d406307ef73e5507f80e4e1e7dbebef9030eeb33d3ba4cedca0a7a2ece17f014b56e7af957eea93eba55bbf5c04344a3
-
SSDEEP
24576:MlmawWOifU8NaofT5j1W6azCEO9QJC2f3iuFg/Kn7W:QddMSpfT5j1ozIQJ1SEg/KC
Malware Config
Extracted
darkcomet
Slave
haaadukit.no-ip.biz:3365
DCMIN_MUTEX-6ABRBTZ
-
gencode
S6MwSKuUU9ju
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1124-16-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral2/memory/1124-17-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral2/memory/1124-20-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral2/memory/1124-22-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral2/memory/1124-21-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral2/memory/1124-24-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral2/memory/1124-23-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral2/memory/1124-25-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral2/memory/1124-27-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral2/memory/1124-29-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral2/memory/1124-31-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral2/memory/1124-33-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral2/memory/1124-35-0x0000000000400000-0x00000000004BB000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmpnetk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wmpnet32.exe" vbc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
black_beauty_by_mic831-d4thkf_niksmr..exedescription pid process target process PID 4068 set thread context of 4136 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 4068 set thread context of 1124 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
OpenWith.exeblack_beauty_by_mic831-d4thkf_niksmr..exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings black_beauty_by_mic831-d4thkf_niksmr..exe -
NTFS ADS 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\svchost.exe:ZONE.identifier cmd.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
vbc.exedescription pid process Token: SeIncreaseQuotaPrivilege 1124 vbc.exe Token: SeSecurityPrivilege 1124 vbc.exe Token: SeTakeOwnershipPrivilege 1124 vbc.exe Token: SeLoadDriverPrivilege 1124 vbc.exe Token: SeSystemProfilePrivilege 1124 vbc.exe Token: SeSystemtimePrivilege 1124 vbc.exe Token: SeProfSingleProcessPrivilege 1124 vbc.exe Token: SeIncBasePriorityPrivilege 1124 vbc.exe Token: SeCreatePagefilePrivilege 1124 vbc.exe Token: SeBackupPrivilege 1124 vbc.exe Token: SeRestorePrivilege 1124 vbc.exe Token: SeShutdownPrivilege 1124 vbc.exe Token: SeDebugPrivilege 1124 vbc.exe Token: SeSystemEnvironmentPrivilege 1124 vbc.exe Token: SeChangeNotifyPrivilege 1124 vbc.exe Token: SeRemoteShutdownPrivilege 1124 vbc.exe Token: SeUndockPrivilege 1124 vbc.exe Token: SeManageVolumePrivilege 1124 vbc.exe Token: SeImpersonatePrivilege 1124 vbc.exe Token: SeCreateGlobalPrivilege 1124 vbc.exe Token: 33 1124 vbc.exe Token: 34 1124 vbc.exe Token: 35 1124 vbc.exe Token: 36 1124 vbc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
vbc.exeOpenWith.exevbc.exepid process 4136 vbc.exe 1700 OpenWith.exe 1124 vbc.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
black_beauty_by_mic831-d4thkf_niksmr..exedescription pid process target process PID 4068 wrote to memory of 4136 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 4068 wrote to memory of 4136 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 4068 wrote to memory of 4136 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 4068 wrote to memory of 4136 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 4068 wrote to memory of 4136 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 4068 wrote to memory of 4136 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 4068 wrote to memory of 4136 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 4068 wrote to memory of 4136 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 4068 wrote to memory of 2592 4068 black_beauty_by_mic831-d4thkf_niksmr..exe cmd.exe PID 4068 wrote to memory of 2592 4068 black_beauty_by_mic831-d4thkf_niksmr..exe cmd.exe PID 4068 wrote to memory of 2592 4068 black_beauty_by_mic831-d4thkf_niksmr..exe cmd.exe PID 4068 wrote to memory of 1124 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 4068 wrote to memory of 1124 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 4068 wrote to memory of 1124 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 4068 wrote to memory of 1124 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 4068 wrote to memory of 1124 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 4068 wrote to memory of 1124 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 4068 wrote to memory of 1124 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe PID 4068 wrote to memory of 1124 4068 black_beauty_by_mic831-d4thkf_niksmr..exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Black Beauty Rainmeter Skin\black_beauty_by_mic831-d4thkf_niksmr..exe"C:\Users\Admin\AppData\Local\Temp\Black Beauty Rainmeter Skin\black_beauty_by_mic831-d4thkf_niksmr..exe"1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"cmd"2⤵
- NTFS ADS
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\fp.txtFilesize
103B
MD5d1d57811ea8479eb76ba617b25c1bf91
SHA1979ac8b7365725a96ebcee80a2a2ae2622c7afa9
SHA256d84715b33fdd79464ea60a82cffcc86eccbbd55ed42b948894d13df0e14316cd
SHA512a08401d6443a144c1016676706961b5a62f5ca5a6f82f257ec8bee49a007f28de9532a311309b46b7d8355b000e92018d7d84c36018481aa6471522912803db0
-
memory/1124-20-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/1124-23-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/1124-33-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/1124-29-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/1124-27-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/1124-25-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/1124-16-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/1124-22-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/1124-35-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/1124-31-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/1124-17-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/1124-21-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/1124-24-0x0000000000400000-0x00000000004BB000-memory.dmpFilesize
748KB
-
memory/4068-2-0x0000000075290000-0x0000000075841000-memory.dmpFilesize
5.7MB
-
memory/4068-1-0x0000000075290000-0x0000000075841000-memory.dmpFilesize
5.7MB
-
memory/4068-0-0x0000000075292000-0x0000000075293000-memory.dmpFilesize
4KB
-
memory/4068-19-0x0000000075290000-0x0000000075841000-memory.dmpFilesize
5.7MB
-
memory/4136-12-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/4136-6-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/4136-4-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB