Analysis
-
max time kernel
111s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/10/2024, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
e95cc70d8ce174cc2b28667e97552a26a91fcb7991d32a81fd23c9460af69af4N.exe
Resource
win7-20240903-en
General
-
Target
e95cc70d8ce174cc2b28667e97552a26a91fcb7991d32a81fd23c9460af69af4N.exe
-
Size
849KB
-
MD5
5af9f8351c27c32d1c9d2179a34a0620
-
SHA1
b5046e105332a7fe6c71bd0f7d676158f30309f9
-
SHA256
e95cc70d8ce174cc2b28667e97552a26a91fcb7991d32a81fd23c9460af69af4
-
SHA512
436d353271c2e9a1282c89b84fca67d9f03891d0a4800902cd580fae071ff28aa361f2bdfd31bb207a84edc9d029a6257f8f8954f0092f033122dbd048adec62
-
SSDEEP
24576:o/QCXJSjgFOc433HWfFLj9kN+z9SprkSf2:F6Sjgp2m939kY90Lu
Malware Config
Extracted
darkcomet
Guest16
46.130.27.71:2000
DC_MUTEX-NDU3QZA
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
qghUM0qoxpi0
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" ãã.exe -
Executes dropped EXE 2 IoCs
pid Process 1736 ãã.exe 2816 msdcsc.exe -
Loads dropped DLL 4 IoCs
pid Process 2540 e95cc70d8ce174cc2b28667e97552a26a91fcb7991d32a81fd23c9460af69af4N.exe 2540 e95cc70d8ce174cc2b28667e97552a26a91fcb7991d32a81fd23c9460af69af4N.exe 1736 ãã.exe 1736 ãã.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" ãã.exe -
resource yara_rule behavioral1/files/0x0007000000012117-3.dat upx behavioral1/memory/1736-14-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1736-28-0x0000000003DF0000-0x0000000003EA7000-memory.dmp upx behavioral1/memory/2816-31-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1736-35-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2816-36-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2816-38-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e95cc70d8ce174cc2b28667e97552a26a91fcb7991d32a81fd23c9460af69af4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ãã.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1736 ãã.exe Token: SeSecurityPrivilege 1736 ãã.exe Token: SeTakeOwnershipPrivilege 1736 ãã.exe Token: SeLoadDriverPrivilege 1736 ãã.exe Token: SeSystemProfilePrivilege 1736 ãã.exe Token: SeSystemtimePrivilege 1736 ãã.exe Token: SeProfSingleProcessPrivilege 1736 ãã.exe Token: SeIncBasePriorityPrivilege 1736 ãã.exe Token: SeCreatePagefilePrivilege 1736 ãã.exe Token: SeBackupPrivilege 1736 ãã.exe Token: SeRestorePrivilege 1736 ãã.exe Token: SeShutdownPrivilege 1736 ãã.exe Token: SeDebugPrivilege 1736 ãã.exe Token: SeSystemEnvironmentPrivilege 1736 ãã.exe Token: SeChangeNotifyPrivilege 1736 ãã.exe Token: SeRemoteShutdownPrivilege 1736 ãã.exe Token: SeUndockPrivilege 1736 ãã.exe Token: SeManageVolumePrivilege 1736 ãã.exe Token: SeImpersonatePrivilege 1736 ãã.exe Token: SeCreateGlobalPrivilege 1736 ãã.exe Token: 33 1736 ãã.exe Token: 34 1736 ãã.exe Token: 35 1736 ãã.exe Token: SeIncreaseQuotaPrivilege 2816 msdcsc.exe Token: SeSecurityPrivilege 2816 msdcsc.exe Token: SeTakeOwnershipPrivilege 2816 msdcsc.exe Token: SeLoadDriverPrivilege 2816 msdcsc.exe Token: SeSystemProfilePrivilege 2816 msdcsc.exe Token: SeSystemtimePrivilege 2816 msdcsc.exe Token: SeProfSingleProcessPrivilege 2816 msdcsc.exe Token: SeIncBasePriorityPrivilege 2816 msdcsc.exe Token: SeCreatePagefilePrivilege 2816 msdcsc.exe Token: SeBackupPrivilege 2816 msdcsc.exe Token: SeRestorePrivilege 2816 msdcsc.exe Token: SeShutdownPrivilege 2816 msdcsc.exe Token: SeDebugPrivilege 2816 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2816 msdcsc.exe Token: SeChangeNotifyPrivilege 2816 msdcsc.exe Token: SeRemoteShutdownPrivilege 2816 msdcsc.exe Token: SeUndockPrivilege 2816 msdcsc.exe Token: SeManageVolumePrivilege 2816 msdcsc.exe Token: SeImpersonatePrivilege 2816 msdcsc.exe Token: SeCreateGlobalPrivilege 2816 msdcsc.exe Token: 33 2816 msdcsc.exe Token: 34 2816 msdcsc.exe Token: 35 2816 msdcsc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 DllHost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2816 msdcsc.exe 2256 DllHost.exe 2256 DllHost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1736 2540 e95cc70d8ce174cc2b28667e97552a26a91fcb7991d32a81fd23c9460af69af4N.exe 30 PID 2540 wrote to memory of 1736 2540 e95cc70d8ce174cc2b28667e97552a26a91fcb7991d32a81fd23c9460af69af4N.exe 30 PID 2540 wrote to memory of 1736 2540 e95cc70d8ce174cc2b28667e97552a26a91fcb7991d32a81fd23c9460af69af4N.exe 30 PID 2540 wrote to memory of 1736 2540 e95cc70d8ce174cc2b28667e97552a26a91fcb7991d32a81fd23c9460af69af4N.exe 30 PID 1736 wrote to memory of 2816 1736 ãã.exe 32 PID 1736 wrote to memory of 2816 1736 ãã.exe 32 PID 1736 wrote to memory of 2816 1736 ãã.exe 32 PID 1736 wrote to memory of 2816 1736 ãã.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e95cc70d8ce174cc2b28667e97552a26a91fcb7991d32a81fd23c9460af69af4N.exe"C:\Users\Admin\AppData\Local\Temp\e95cc70d8ce174cc2b28667e97552a26a91fcb7991d32a81fd23c9460af69af4N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\ãã.exe"C:\Users\Admin\AppData\Local\Temp\ãã.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2256
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
607KB
MD59112df1b4e0eb539ac980cb4e21b29a8
SHA1c44136037303b0e8d28f59e2657f308241ca6c9c
SHA2562f3991ac90c2b4dd9718db100dda1fcfb203cd2e5fd67665b91059b8c25bc022
SHA512e5438e1a71be657e76418be68e3b4a78ad8fac71485fc8c72812c21bc9bf2b109ad7fdbcf534f824aa24e952dfe6cef677b632c9db7d49eb23cb8274dbba097e
-
Filesize
251KB
MD5b0ee29daad196846092c646453938d80
SHA1c72fd553d44745b81a285be1d46214f11610d89d
SHA256b78166222dfa01f6583443162cc1d4780347943297ccf30eb114ba61119f2765
SHA512582ba8bf7817ebef597e9520183adb28946388a54e494769016a0ad0108a4391f0f111dcb0f5d8e64fa7a351e698a8fe888eb84da4ac1e8de6fd33136b2bd980