Analysis
-
max time kernel
140s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 23:24
Behavioral task
behavioral1
Sample
8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe
Resource
win7-20240903-en
General
-
Target
8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe
-
Size
658KB
-
MD5
8b6332828d48d0c640fc3bbe1120cfa9
-
SHA1
6582266a29c36a3fb9f7bf157d465ff9843b4bef
-
SHA256
8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2
-
SHA512
07719e8a78c85fc14dfe74a47caf548a09fa112c56876455806562674bb27aaa8dc136fd40b67a8eaba961d53a4c9c3a6230637bafe49feb0a52defe8de48703
-
SSDEEP
12288:29HMeUmcufrvA3kb445UEJ2jsWiD4EvFuu4cNgZhCiZKD/XdyFZ:SiBIGkbxqEcjsWiDxguehC2SW
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-MLSJZEK
-
gencode
NzJ0ZsZsDhVk
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeSecurityPrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeTakeOwnershipPrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeLoadDriverPrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeSystemProfilePrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeSystemtimePrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeProfSingleProcessPrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeIncBasePriorityPrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeCreatePagefilePrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeBackupPrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeRestorePrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeShutdownPrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeDebugPrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeSystemEnvironmentPrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeChangeNotifyPrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeRemoteShutdownPrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeUndockPrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeManageVolumePrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeImpersonatePrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: SeCreateGlobalPrivilege 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: 33 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: 34 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: 35 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe Token: 36 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4916 8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe"C:\Users\Admin\AppData\Local\Temp\8a387ed7c415553e0b196cc91e975b4f1de4d9212f9f82aaccc5ebf2e68965a2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4916