Analysis
-
max time kernel
111s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 13:42
Static task
static1
Behavioral task
behavioral1
Sample
dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe
Resource
win10v2004-20240802-en
General
-
Target
dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe
-
Size
684KB
-
MD5
ea3d9a744be6d0f17244447058ef5e00
-
SHA1
a13b28b784070ae943adfa51285073bdb5d005dc
-
SHA256
dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6
-
SHA512
28bf0771f2d423d31769f382d81c4058730e38cbd209eaad34342a6598b0f961da2dcdb59d9e0db3999354c471a7669abee2117d111fd600d0a146d0db1290ae
-
SSDEEP
12288:eeS04QhRKKkoTAWuRRxUqbQPlCEXNuBu3Fxfa8XTMfWK8FpPxkk2f15ARISPu+gP:dl4hToTAWuRRBbQdpBzfaCOYukWviISw
Malware Config
Extracted
darkcomet
Kaspersky Anti-Virus
mkidech.zapto.org:1604
DC_MUTEX-QX72V3T
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
mCaGuBRkitKS
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" Kaspersky Anti-Virus.exe -
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/1948-26-0x0000000000400000-0x00000000004F2000-memory.dmp modiloader_stage2 -
Executes dropped EXE 3 IoCs
pid Process 3060 Upgrade.exe 2648 Kaspersky Anti-Virus.exe 2608 msdcsc.exe -
Loads dropped DLL 6 IoCs
pid Process 1948 dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe 1948 dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe 1948 dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe 1948 dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe 2648 Kaspersky Anti-Virus.exe 2648 Kaspersky Anti-Virus.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" Kaspersky Anti-Virus.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Upgrade.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kaspersky Anti-Virus.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2648 Kaspersky Anti-Virus.exe Token: SeSecurityPrivilege 2648 Kaspersky Anti-Virus.exe Token: SeTakeOwnershipPrivilege 2648 Kaspersky Anti-Virus.exe Token: SeLoadDriverPrivilege 2648 Kaspersky Anti-Virus.exe Token: SeSystemProfilePrivilege 2648 Kaspersky Anti-Virus.exe Token: SeSystemtimePrivilege 2648 Kaspersky Anti-Virus.exe Token: SeProfSingleProcessPrivilege 2648 Kaspersky Anti-Virus.exe Token: SeIncBasePriorityPrivilege 2648 Kaspersky Anti-Virus.exe Token: SeCreatePagefilePrivilege 2648 Kaspersky Anti-Virus.exe Token: SeBackupPrivilege 2648 Kaspersky Anti-Virus.exe Token: SeRestorePrivilege 2648 Kaspersky Anti-Virus.exe Token: SeShutdownPrivilege 2648 Kaspersky Anti-Virus.exe Token: SeDebugPrivilege 2648 Kaspersky Anti-Virus.exe Token: SeSystemEnvironmentPrivilege 2648 Kaspersky Anti-Virus.exe Token: SeChangeNotifyPrivilege 2648 Kaspersky Anti-Virus.exe Token: SeRemoteShutdownPrivilege 2648 Kaspersky Anti-Virus.exe Token: SeUndockPrivilege 2648 Kaspersky Anti-Virus.exe Token: SeManageVolumePrivilege 2648 Kaspersky Anti-Virus.exe Token: SeImpersonatePrivilege 2648 Kaspersky Anti-Virus.exe Token: SeCreateGlobalPrivilege 2648 Kaspersky Anti-Virus.exe Token: 33 2648 Kaspersky Anti-Virus.exe Token: 34 2648 Kaspersky Anti-Virus.exe Token: 35 2648 Kaspersky Anti-Virus.exe Token: SeIncreaseQuotaPrivilege 2608 msdcsc.exe Token: SeSecurityPrivilege 2608 msdcsc.exe Token: SeTakeOwnershipPrivilege 2608 msdcsc.exe Token: SeLoadDriverPrivilege 2608 msdcsc.exe Token: SeSystemProfilePrivilege 2608 msdcsc.exe Token: SeSystemtimePrivilege 2608 msdcsc.exe Token: SeProfSingleProcessPrivilege 2608 msdcsc.exe Token: SeIncBasePriorityPrivilege 2608 msdcsc.exe Token: SeCreatePagefilePrivilege 2608 msdcsc.exe Token: SeBackupPrivilege 2608 msdcsc.exe Token: SeRestorePrivilege 2608 msdcsc.exe Token: SeShutdownPrivilege 2608 msdcsc.exe Token: SeDebugPrivilege 2608 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2608 msdcsc.exe Token: SeChangeNotifyPrivilege 2608 msdcsc.exe Token: SeRemoteShutdownPrivilege 2608 msdcsc.exe Token: SeUndockPrivilege 2608 msdcsc.exe Token: SeManageVolumePrivilege 2608 msdcsc.exe Token: SeImpersonatePrivilege 2608 msdcsc.exe Token: SeCreateGlobalPrivilege 2608 msdcsc.exe Token: 33 2608 msdcsc.exe Token: 34 2608 msdcsc.exe Token: 35 2608 msdcsc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3060 Upgrade.exe 3060 Upgrade.exe 2608 msdcsc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1948 wrote to memory of 3060 1948 dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe 29 PID 1948 wrote to memory of 3060 1948 dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe 29 PID 1948 wrote to memory of 3060 1948 dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe 29 PID 1948 wrote to memory of 3060 1948 dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe 29 PID 1948 wrote to memory of 2648 1948 dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe 30 PID 1948 wrote to memory of 2648 1948 dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe 30 PID 1948 wrote to memory of 2648 1948 dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe 30 PID 1948 wrote to memory of 2648 1948 dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe 30 PID 2648 wrote to memory of 2608 2648 Kaspersky Anti-Virus.exe 31 PID 2648 wrote to memory of 2608 2648 Kaspersky Anti-Virus.exe 31 PID 2648 wrote to memory of 2608 2648 Kaspersky Anti-Virus.exe 31 PID 2648 wrote to memory of 2608 2648 Kaspersky Anti-Virus.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe"C:\Users\Admin\AppData\Local\Temp\dc561c8b1084253ebe75538353ad115963a6c26bf4b02bce516d70ef9ef09bf6N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\Upgrade.exe"C:\Users\Admin\AppData\Local\Temp\Upgrade.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\Kaspersky Anti-Virus.exe"C:\Users\Admin\AppData\Local\Temp\Kaspersky Anti-Virus.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
333KB
MD5eca6f73f0bad1fc2b1bc66b97b198b30
SHA12a510aa61c64b7ce3bb4de4feb2674b173e73dff
SHA256d62523db3e9420e99856deba7cddf411ede9467c225a90945b284e8e5baeb724
SHA512710a9948a2f1cfe31683fd283b1e87430262c7f38801bb7f69c6cc2469ccaf665da206b811be22bb5f749d46da2e332573fa535ea66caf4016f5dc8d5cfc5af2
-
Filesize
524KB
MD50ff5b6af6bf1b5addf53c87d8708f8b3
SHA131fe75ecd3cb684d6561cb9e4c395a9b962a008a
SHA256010fae264448b14fa393205d2ed30d0882925ae1d7c936033c7114784e75e0ce
SHA51294065a9bd90aebd70e6840a3dd2073197cf4d6c09e95700253dae2c81fd4ce1ee1f786bb4ccf08eb383e5059a1aff62296d1255d783e66f3ae50e30a9bb83d92