Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 04:03
Static task
static1
General
-
Target
Fritz 19.4 Multilingual\Crack\ChessProgram19.exe
-
Size
10.1MB
-
MD5
aae62ebe0521ea14a732e6902e9552ca
-
SHA1
12bc209fd466b4df1d37fdcff6c7357b5e2059c0
-
SHA256
92ea6ba3b76c78c6a69cce7928933c35de64647128aa6a4068edb2a54368e31a
-
SHA512
8a4e9814d150cedf3d7ff64c4a7f3a67dff13e4ec608fa3ef7169edd92bc8b06643217a02a8e4faca249d660e01f0d694223b4a029b9231bcc6d5a80baa7aa34
-
SSDEEP
196608:GrYYQAbd3vZoubIJkPoYuIVcgjAhJkEpO67hLp04rI7+XGkjiNuO/:2JQA9+ubokPoXIXEhtpFl04rGk
Malware Config
Extracted
darkcomet
RaR
bonda7678.ddns.net:7678
DCMIN_MUTEX-1CEG3YX
-
gencode
2ce0rUX8Kbq9
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3756 DR.exe 4004 CHESSP~1.EXE -
resource yara_rule behavioral1/memory/3260-19-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral1/memory/3260-21-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral1/memory/3260-22-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral1/memory/3260-24-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral1/memory/3260-25-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral1/memory/3260-26-0x0000000000400000-0x00000000004B8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ChessProgram19.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3756 set thread context of 3260 3756 DR.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChessProgram19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3756 DR.exe 3756 DR.exe 3756 DR.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 3756 DR.exe Token: SeIncreaseQuotaPrivilege 3260 CasPol.exe Token: SeSecurityPrivilege 3260 CasPol.exe Token: SeTakeOwnershipPrivilege 3260 CasPol.exe Token: SeLoadDriverPrivilege 3260 CasPol.exe Token: SeSystemProfilePrivilege 3260 CasPol.exe Token: SeSystemtimePrivilege 3260 CasPol.exe Token: SeProfSingleProcessPrivilege 3260 CasPol.exe Token: SeIncBasePriorityPrivilege 3260 CasPol.exe Token: SeCreatePagefilePrivilege 3260 CasPol.exe Token: SeBackupPrivilege 3260 CasPol.exe Token: SeRestorePrivilege 3260 CasPol.exe Token: SeShutdownPrivilege 3260 CasPol.exe Token: SeDebugPrivilege 3260 CasPol.exe Token: SeSystemEnvironmentPrivilege 3260 CasPol.exe Token: SeChangeNotifyPrivilege 3260 CasPol.exe Token: SeRemoteShutdownPrivilege 3260 CasPol.exe Token: SeUndockPrivilege 3260 CasPol.exe Token: SeManageVolumePrivilege 3260 CasPol.exe Token: SeImpersonatePrivilege 3260 CasPol.exe Token: SeCreateGlobalPrivilege 3260 CasPol.exe Token: 33 3260 CasPol.exe Token: 34 3260 CasPol.exe Token: 35 3260 CasPol.exe Token: 36 3260 CasPol.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3260 CasPol.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3756 2816 ChessProgram19.exe 82 PID 2816 wrote to memory of 3756 2816 ChessProgram19.exe 82 PID 2816 wrote to memory of 3756 2816 ChessProgram19.exe 82 PID 3756 wrote to memory of 3260 3756 DR.exe 92 PID 3756 wrote to memory of 3260 3756 DR.exe 92 PID 3756 wrote to memory of 3260 3756 DR.exe 92 PID 3756 wrote to memory of 3260 3756 DR.exe 92 PID 3756 wrote to memory of 3260 3756 DR.exe 92 PID 3756 wrote to memory of 3260 3756 DR.exe 92 PID 3756 wrote to memory of 3260 3756 DR.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fritz 19.4 Multilingual\Crack\ChessProgram19.exe"C:\Users\Admin\AppData\Local\Temp\Fritz 19.4 Multilingual\Crack\ChessProgram19.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DR.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DR.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3260
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CHESSP~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CHESSP~1.EXE2⤵
- Executes dropped EXE
PID:4004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25.6MB
MD5090a3402251b08d87b0c487e575307db
SHA186dd99ceb1f07d6cf3561e13240e44ef38500ab3
SHA256e5b45e5f470f880511637d47e0a92e923ffd0b0c2645d7c6bbaaa4d33430c6b8
SHA512ad0adbe865514ee3199db42cd39ae701b0b0d970244acd8cf8c6454b42298e9d2d493ccba779452045df2c7fecda22305d53a56c997631ac78d2cdd822f2c579
-
Filesize
1.1MB
MD534d2e39ccda0b24f2fa3a18ad7bfc3ea
SHA13328ea22219e19acfca2739da6cfad0f9e2b5593
SHA256091f1c9215727a96e78f74f1abbff5b2e12973c9e44d49b6179769c104154304
SHA512beea0171d13dbc714fa50be3f865a8c88ce8484866279c8c40f2d81c3a04a8b1951efd8faf817e9458c0737f3045aad2f5c8c516ec2ef8e4ad3a1d79ee7a48df