Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe
Resource
win10v2004-20241007-en
General
-
Target
417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe
-
Size
872KB
-
MD5
1814d0dd236332062e799516bfaf7ca0
-
SHA1
2a649cb42c76001ff9ff7a6e4a26863ea206039a
-
SHA256
417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22f
-
SHA512
30213fcd373e64abe7c3cb45a44273e78f32cc3f85abfc47b928f2a1754288ee9757a96028e7d0dacaac3f6708f544bf0ac6f9a3ba5440d212a52168f4d2a464
-
SSDEEP
12288:GqHUvn8c7YwP+5Omwe5aqe3RaLuIelZ89nQfwZ9XG4Oem5YAVS8qi4QtKGL6:GbTYT5uqe3RaYJwDW1eh3drGL6
Malware Config
Extracted
darkcomet
VantomHell
skynet3310.zapto.org:1604
DC_MUTEX-E0XQU97
-
gencode
ER6pH0mCp3uT
-
install
false
-
offline_keylogger
true
-
password
webland3310
-
persistence
false
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system.pif 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\help = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\help.exe" 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\help = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\help.exe" 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2688 set thread context of 4224 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeSecurityPrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeTakeOwnershipPrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeLoadDriverPrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeSystemProfilePrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeSystemtimePrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeProfSingleProcessPrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeIncBasePriorityPrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeCreatePagefilePrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeBackupPrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeRestorePrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeShutdownPrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeDebugPrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeSystemEnvironmentPrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeChangeNotifyPrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeRemoteShutdownPrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeUndockPrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeManageVolumePrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeImpersonatePrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: SeCreateGlobalPrivilege 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: 33 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: 34 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: 35 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe Token: 36 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 4224 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2688 wrote to memory of 3048 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 85 PID 2688 wrote to memory of 3048 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 85 PID 2688 wrote to memory of 3048 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 85 PID 2688 wrote to memory of 4224 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 86 PID 2688 wrote to memory of 4224 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 86 PID 2688 wrote to memory of 4224 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 86 PID 2688 wrote to memory of 4224 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 86 PID 2688 wrote to memory of 4224 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 86 PID 2688 wrote to memory of 4224 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 86 PID 2688 wrote to memory of 4224 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 86 PID 2688 wrote to memory of 4224 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 86 PID 2688 wrote to memory of 4224 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 86 PID 2688 wrote to memory of 4224 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 86 PID 2688 wrote to memory of 4224 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 86 PID 2688 wrote to memory of 4224 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 86 PID 2688 wrote to memory of 4224 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 86 PID 2688 wrote to memory of 4224 2688 417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe 86 PID 3048 wrote to memory of 1772 3048 cmd.exe 89 PID 3048 wrote to memory of 1772 3048 cmd.exe 89 PID 3048 wrote to memory of 1772 3048 cmd.exe 89 PID 1772 wrote to memory of 4348 1772 net.exe 90 PID 1772 wrote to memory of 4348 1772 net.exe 90 PID 1772 wrote to memory of 4348 1772 net.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe"C:\Users\Admin\AppData\Local\Temp\417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:4348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exeC:\Users\Admin\AppData\Local\Temp\417e9c969575785680a6146a6f8c302d454304d24b8e8d43c8c621d56f79c22fN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4224
-