Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe
Resource
win10v2004-20241007-en
General
-
Target
417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe
-
Size
872KB
-
MD5
1814d0dd236332062e799516bfaf7ca0
-
SHA1
2a649cb42c76001ff9ff7a6e4a26863ea206039a
-
SHA256
417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22f
-
SHA512
30213fcd373e64abe7c3cb45a44273e78f32cc3f85abfc47b928f2a1754288ee9757a96028e7d0dacaac3f6708f544bf0ac6f9a3ba5440d212a52168f4d2a464
-
SSDEEP
12288:GqHUvn8c7YwP+5Omwe5aqe3RaLuIelZ89nQfwZ9XG4Oem5YAVS8qi4QtKGL6:GbTYT5uqe3RaYJwDW1eh3drGL6
Malware Config
Extracted
darkcomet
VantomHell
skynet3310.zapto.org:1604
DC_MUTEX-E0XQU97
-
gencode
ER6pH0mCp3uT
-
install
false
-
offline_keylogger
true
-
password
webland3310
-
persistence
false
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system.pif 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\help = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\help.exe" 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\help = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\help.exe" 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2296 set thread context of 3036 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeSecurityPrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeTakeOwnershipPrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeLoadDriverPrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeSystemProfilePrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeSystemtimePrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeProfSingleProcessPrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeIncBasePriorityPrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeCreatePagefilePrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeBackupPrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeRestorePrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeShutdownPrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeDebugPrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeSystemEnvironmentPrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeChangeNotifyPrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeRemoteShutdownPrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeUndockPrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeManageVolumePrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeImpersonatePrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeCreateGlobalPrivilege 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: 33 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: 34 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: 35 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 3036 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1724 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 30 PID 2296 wrote to memory of 1724 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 30 PID 2296 wrote to memory of 1724 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 30 PID 2296 wrote to memory of 1724 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 30 PID 2296 wrote to memory of 3036 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 31 PID 2296 wrote to memory of 3036 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 31 PID 2296 wrote to memory of 3036 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 31 PID 2296 wrote to memory of 3036 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 31 PID 2296 wrote to memory of 3036 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 31 PID 2296 wrote to memory of 3036 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 31 PID 2296 wrote to memory of 3036 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 31 PID 2296 wrote to memory of 3036 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 31 PID 2296 wrote to memory of 3036 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 31 PID 2296 wrote to memory of 3036 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 31 PID 2296 wrote to memory of 3036 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 31 PID 2296 wrote to memory of 3036 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 31 PID 2296 wrote to memory of 3036 2296 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 31 PID 1724 wrote to memory of 2168 1724 cmd.exe 33 PID 1724 wrote to memory of 2168 1724 cmd.exe 33 PID 1724 wrote to memory of 2168 1724 cmd.exe 33 PID 1724 wrote to memory of 2168 1724 cmd.exe 33 PID 2168 wrote to memory of 3052 2168 net.exe 34 PID 2168 wrote to memory of 3052 2168 net.exe 34 PID 2168 wrote to memory of 3052 2168 net.exe 34 PID 2168 wrote to memory of 3052 2168 net.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe"C:\Users\Admin\AppData\Local\Temp\417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:3052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exeC:\Users\Admin\AppData\Local\Temp\417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3036
-