Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe
Resource
win7-20240729-en
General
-
Target
1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe
-
Size
520KB
-
MD5
ba49416551a9167e624a8edbfa630140
-
SHA1
1ba7883e87d8841dfb2fd33dfce3aa08f4ddcef2
-
SHA256
1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630
-
SHA512
facf64b14db184efb38646d65431c993a0647790187c7fb218b434fee92afd0d3c5bec5e914272fd7920e52d8dea5e67586caae175a196345ceedfa68d905247
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMb+:f9fC3hh29Ya77A90aFtDfT5IMb+
Malware Config
Extracted
darkcomet
PrivateEye
ratblackshades.no-ip.biz:1604
DC_MUTEX-ACC1R98
-
gencode
8GG5LVVGljSF
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
winupd.exewinupd.exewinupd.exepid Process 4180 winupd.exe 4412 winupd.exe 3640 winupd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exewinupd.exedescription pid Process procid_target PID 736 set thread context of 3892 736 1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe 96 PID 4180 set thread context of 4412 4180 winupd.exe 102 PID 4180 set thread context of 3640 4180 winupd.exe 103 -
Processes:
resource yara_rule behavioral2/memory/3640-38-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3640-39-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3640-41-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3640-40-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3640-35-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3640-34-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3640-30-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3640-44-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3640-45-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3640-46-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3640-47-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3640-48-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3640-49-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3640-50-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3640-51-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process 1520 2776 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exewinupd.exewinupd.exewinupd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid Process 2776 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
winupd.exedescription pid Process Token: SeIncreaseQuotaPrivilege 3640 winupd.exe Token: SeSecurityPrivilege 3640 winupd.exe Token: SeTakeOwnershipPrivilege 3640 winupd.exe Token: SeLoadDriverPrivilege 3640 winupd.exe Token: SeSystemProfilePrivilege 3640 winupd.exe Token: SeSystemtimePrivilege 3640 winupd.exe Token: SeProfSingleProcessPrivilege 3640 winupd.exe Token: SeIncBasePriorityPrivilege 3640 winupd.exe Token: SeCreatePagefilePrivilege 3640 winupd.exe Token: SeBackupPrivilege 3640 winupd.exe Token: SeRestorePrivilege 3640 winupd.exe Token: SeShutdownPrivilege 3640 winupd.exe Token: SeDebugPrivilege 3640 winupd.exe Token: SeSystemEnvironmentPrivilege 3640 winupd.exe Token: SeChangeNotifyPrivilege 3640 winupd.exe Token: SeRemoteShutdownPrivilege 3640 winupd.exe Token: SeUndockPrivilege 3640 winupd.exe Token: SeManageVolumePrivilege 3640 winupd.exe Token: SeImpersonatePrivilege 3640 winupd.exe Token: SeCreateGlobalPrivilege 3640 winupd.exe Token: 33 3640 winupd.exe Token: 34 3640 winupd.exe Token: 35 3640 winupd.exe Token: 36 3640 winupd.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exewinupd.exewinupd.exewinupd.exepid Process 736 1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe 3892 1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe 4180 winupd.exe 4412 winupd.exe 3640 winupd.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exewinupd.exewinupd.exedescription pid Process procid_target PID 736 wrote to memory of 3892 736 1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe 96 PID 736 wrote to memory of 3892 736 1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe 96 PID 736 wrote to memory of 3892 736 1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe 96 PID 736 wrote to memory of 3892 736 1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe 96 PID 736 wrote to memory of 3892 736 1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe 96 PID 736 wrote to memory of 3892 736 1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe 96 PID 736 wrote to memory of 3892 736 1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe 96 PID 736 wrote to memory of 3892 736 1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe 96 PID 3892 wrote to memory of 4180 3892 1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe 97 PID 3892 wrote to memory of 4180 3892 1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe 97 PID 3892 wrote to memory of 4180 3892 1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe 97 PID 4180 wrote to memory of 4412 4180 winupd.exe 102 PID 4180 wrote to memory of 4412 4180 winupd.exe 102 PID 4180 wrote to memory of 4412 4180 winupd.exe 102 PID 4180 wrote to memory of 4412 4180 winupd.exe 102 PID 4180 wrote to memory of 4412 4180 winupd.exe 102 PID 4180 wrote to memory of 4412 4180 winupd.exe 102 PID 4180 wrote to memory of 4412 4180 winupd.exe 102 PID 4180 wrote to memory of 4412 4180 winupd.exe 102 PID 4180 wrote to memory of 3640 4180 winupd.exe 103 PID 4180 wrote to memory of 3640 4180 winupd.exe 103 PID 4180 wrote to memory of 3640 4180 winupd.exe 103 PID 4180 wrote to memory of 3640 4180 winupd.exe 103 PID 4180 wrote to memory of 3640 4180 winupd.exe 103 PID 4180 wrote to memory of 3640 4180 winupd.exe 103 PID 4180 wrote to memory of 3640 4180 winupd.exe 103 PID 4180 wrote to memory of 3640 4180 winupd.exe 103 PID 4412 wrote to memory of 2776 4412 winupd.exe 104 PID 4412 wrote to memory of 2776 4412 winupd.exe 104 PID 4412 wrote to memory of 2776 4412 winupd.exe 104 PID 4412 wrote to memory of 2776 4412 winupd.exe 104 PID 4412 wrote to memory of 2776 4412 winupd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe"C:\Users\Admin\AppData\Local\Temp\1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe"C:\Users\Admin\AppData\Local\Temp\1109beeb061d774b0a516ea4385f029390c24de0ccc2afd56ecd9c5cb3093630N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exeC:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- Gathers network information
PID:2776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 2726⤵
- Program crash
PID:1520
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3640
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2776 -ip 27761⤵PID:4884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD512ddf72942cf4a0f72c9ee5e393a4ab4
SHA1b886fa68c166c3859a05271edf30ea7846b9dc65
SHA2561a57025f5bc163b4b7109019a6c6583dd3ce6ebe15d237f6e63925c1d4e58a04
SHA51209424ac875cb5c4838d2367cb3bd1c966fa1ac55f455ceab71bd11cda934d2516fc2a2172467c5460fbce42f8dd832cfcf1778abf688b9a9a30a612dc6677858