Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-10-2024 17:24
Behavioral task
behavioral1
Sample
53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe
Resource
win7-20241010-en
General
-
Target
53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe
-
Size
659KB
-
MD5
a7a5110423e033baaf3cf86ca69ab630
-
SHA1
40fcdc432ea715ee418761b83c409cd3c9942a6b
-
SHA256
53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4
-
SHA512
59a32aa912fe3fa35a15980b542fc8fd2b327e11286a01f6285844fa4e1bab298e723fc9bc2d95832f8ab001d2b5a804b3ceef28b276774959c5d15b68061536
-
SSDEEP
12288:G9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/he:iZ1xuVVjfFoynPaVBUR8f+kN10EBM
Malware Config
Extracted
darkcomet
server
sgdy.ddns.net:1122
DC_MUTEX-309Q75Q
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
S89mQro8dxG3
-
install
true
-
offline_keylogger
true
-
password
December2oo2
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msdcsc.exe -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 332 attrib.exe 2464 attrib.exe -
Executes dropped EXE 1 IoCs
pid Process 2808 msdcsc.exe -
Loads dropped DLL 2 IoCs
pid Process 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeSecurityPrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeTakeOwnershipPrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeLoadDriverPrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeSystemProfilePrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeSystemtimePrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeProfSingleProcessPrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeIncBasePriorityPrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeCreatePagefilePrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeBackupPrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeRestorePrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeShutdownPrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeDebugPrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeSystemEnvironmentPrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeChangeNotifyPrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeRemoteShutdownPrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeUndockPrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeManageVolumePrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeImpersonatePrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeCreateGlobalPrivilege 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: 33 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: 34 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: 35 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe Token: SeIncreaseQuotaPrivilege 2808 msdcsc.exe Token: SeSecurityPrivilege 2808 msdcsc.exe Token: SeTakeOwnershipPrivilege 2808 msdcsc.exe Token: SeLoadDriverPrivilege 2808 msdcsc.exe Token: SeSystemProfilePrivilege 2808 msdcsc.exe Token: SeSystemtimePrivilege 2808 msdcsc.exe Token: SeProfSingleProcessPrivilege 2808 msdcsc.exe Token: SeIncBasePriorityPrivilege 2808 msdcsc.exe Token: SeCreatePagefilePrivilege 2808 msdcsc.exe Token: SeBackupPrivilege 2808 msdcsc.exe Token: SeRestorePrivilege 2808 msdcsc.exe Token: SeShutdownPrivilege 2808 msdcsc.exe Token: SeDebugPrivilege 2808 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2808 msdcsc.exe Token: SeChangeNotifyPrivilege 2808 msdcsc.exe Token: SeRemoteShutdownPrivilege 2808 msdcsc.exe Token: SeUndockPrivilege 2808 msdcsc.exe Token: SeManageVolumePrivilege 2808 msdcsc.exe Token: SeImpersonatePrivilege 2808 msdcsc.exe Token: SeCreateGlobalPrivilege 2808 msdcsc.exe Token: 33 2808 msdcsc.exe Token: 34 2808 msdcsc.exe Token: 35 2808 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2808 msdcsc.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2600 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe 31 PID 2636 wrote to memory of 2600 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe 31 PID 2636 wrote to memory of 2600 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe 31 PID 2636 wrote to memory of 2600 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe 31 PID 2636 wrote to memory of 2620 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe 32 PID 2636 wrote to memory of 2620 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe 32 PID 2636 wrote to memory of 2620 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe 32 PID 2636 wrote to memory of 2620 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe 32 PID 2636 wrote to memory of 2808 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe 37 PID 2636 wrote to memory of 2808 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe 37 PID 2636 wrote to memory of 2808 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe 37 PID 2636 wrote to memory of 2808 2636 53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe 37 PID 2600 wrote to memory of 2464 2600 cmd.exe 35 PID 2600 wrote to memory of 2464 2600 cmd.exe 35 PID 2600 wrote to memory of 2464 2600 cmd.exe 35 PID 2600 wrote to memory of 2464 2600 cmd.exe 35 PID 2620 wrote to memory of 332 2620 cmd.exe 36 PID 2620 wrote to memory of 332 2620 cmd.exe 36 PID 2620 wrote to memory of 332 2620 cmd.exe 36 PID 2620 wrote to memory of 332 2620 cmd.exe 36 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 PID 2808 wrote to memory of 2972 2808 msdcsc.exe 38 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 332 attrib.exe 2464 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe"C:\Users\Admin\AppData\Local\Temp\53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\53633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4N.exe" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2464
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:332
-
-
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
659KB
MD5a7a5110423e033baaf3cf86ca69ab630
SHA140fcdc432ea715ee418761b83c409cd3c9942a6b
SHA25653633b7a4243d0b9668ed02310ec0fe2841fc35b024770df0a0ff56e01c956e4
SHA51259a32aa912fe3fa35a15980b542fc8fd2b327e11286a01f6285844fa4e1bab298e723fc9bc2d95832f8ab001d2b5a804b3ceef28b276774959c5d15b68061536