Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-10-2024 00:35
Behavioral task
behavioral1
Sample
35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe
Resource
win7-20240903-en
General
-
Target
35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe
-
Size
3.8MB
-
MD5
a8fa05ba3069ff13f3973155f2ee5870
-
SHA1
26cd033fe9d42fd61c35beeeb63ef31399272491
-
SHA256
35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193
-
SHA512
3ec0fa1fd5a40f5e3053899fadddfa20611e84a00c0ce4edb6490d8adc99a520b2d2d5c68a48ff3cdfb71c41e8ce8d939959347e03f8b1f4d470d320514f2af3
-
SSDEEP
98304:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/qg:3i4hTLOMtHDMlANqnfVGPyhcMYg4lSi6
Malware Config
Signatures
-
Darkcomet family
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
mcsft.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate mcsft.exe -
Executes dropped EXE 2 IoCs
Processes:
mcsft.exemcsft.exepid Process 2680 mcsft.exe 2820 mcsft.exe -
Loads dropped DLL 6 IoCs
Processes:
35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exemcsft.exepid Process 1756 35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe 1756 35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe 1756 35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe 1756 35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe 1756 35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe 2680 mcsft.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mcrosoft = "C:\\Users\\Admin\\AppData\\Roaming\\mcsft.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
mcsft.exedescription pid Process procid_target PID 2680 set thread context of 2820 2680 mcsft.exe 35 -
Processes:
resource yara_rule behavioral1/memory/1756-1-0x0000000000400000-0x00000000007C9000-memory.dmp upx behavioral1/files/0x0009000000018c34-27.dat upx behavioral1/memory/1756-47-0x0000000000400000-0x00000000007C9000-memory.dmp upx behavioral1/memory/2820-53-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-56-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2680-57-0x0000000000400000-0x00000000007C9000-memory.dmp upx behavioral1/memory/2820-55-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-58-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-61-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-60-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-59-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-64-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-63-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-62-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-65-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-66-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-67-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-68-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-69-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-70-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-71-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-72-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-73-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-74-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-75-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2820-76-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
mcsft.exemcsft.exe35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.execmd.exereg.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcsft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcsft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
mcsft.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mcsft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mcsft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mcsft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier mcsft.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
mcsft.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier mcsft.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
mcsft.exedescription pid Process Token: SeIncreaseQuotaPrivilege 2820 mcsft.exe Token: SeSecurityPrivilege 2820 mcsft.exe Token: SeTakeOwnershipPrivilege 2820 mcsft.exe Token: SeLoadDriverPrivilege 2820 mcsft.exe Token: SeSystemProfilePrivilege 2820 mcsft.exe Token: SeSystemtimePrivilege 2820 mcsft.exe Token: SeProfSingleProcessPrivilege 2820 mcsft.exe Token: SeIncBasePriorityPrivilege 2820 mcsft.exe Token: SeCreatePagefilePrivilege 2820 mcsft.exe Token: SeBackupPrivilege 2820 mcsft.exe Token: SeRestorePrivilege 2820 mcsft.exe Token: SeShutdownPrivilege 2820 mcsft.exe Token: SeDebugPrivilege 2820 mcsft.exe Token: SeSystemEnvironmentPrivilege 2820 mcsft.exe Token: SeChangeNotifyPrivilege 2820 mcsft.exe Token: SeRemoteShutdownPrivilege 2820 mcsft.exe Token: SeUndockPrivilege 2820 mcsft.exe Token: SeManageVolumePrivilege 2820 mcsft.exe Token: SeImpersonatePrivilege 2820 mcsft.exe Token: SeCreateGlobalPrivilege 2820 mcsft.exe Token: 33 2820 mcsft.exe Token: 34 2820 mcsft.exe Token: 35 2820 mcsft.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exemcsft.exemcsft.exepid Process 1756 35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe 2680 mcsft.exe 2820 mcsft.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.execmd.exemcsft.exedescription pid Process procid_target PID 1756 wrote to memory of 2172 1756 35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe 31 PID 1756 wrote to memory of 2172 1756 35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe 31 PID 1756 wrote to memory of 2172 1756 35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe 31 PID 1756 wrote to memory of 2172 1756 35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe 31 PID 2172 wrote to memory of 2356 2172 cmd.exe 33 PID 2172 wrote to memory of 2356 2172 cmd.exe 33 PID 2172 wrote to memory of 2356 2172 cmd.exe 33 PID 2172 wrote to memory of 2356 2172 cmd.exe 33 PID 1756 wrote to memory of 2680 1756 35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe 34 PID 1756 wrote to memory of 2680 1756 35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe 34 PID 1756 wrote to memory of 2680 1756 35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe 34 PID 1756 wrote to memory of 2680 1756 35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe 34 PID 2680 wrote to memory of 2820 2680 mcsft.exe 35 PID 2680 wrote to memory of 2820 2680 mcsft.exe 35 PID 2680 wrote to memory of 2820 2680 mcsft.exe 35 PID 2680 wrote to memory of 2820 2680 mcsft.exe 35 PID 2680 wrote to memory of 2820 2680 mcsft.exe 35 PID 2680 wrote to memory of 2820 2680 mcsft.exe 35 PID 2680 wrote to memory of 2820 2680 mcsft.exe 35 PID 2680 wrote to memory of 2820 2680 mcsft.exe 35 PID 2680 wrote to memory of 2820 2680 mcsft.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe"C:\Users\Admin\AppData\Local\Temp\35b36c3203335b01c3f1c0bdcd40bda5a0135018092dcc30486aca8318499193N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\eHGsB.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Mcrosoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\mcsft.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2356
-
-
-
C:\Users\Admin\AppData\Roaming\mcsft.exe"C:\Users\Admin\AppData\Roaming\mcsft.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Roaming\mcsft.exeC:\Users\Admin\AppData\Roaming\mcsft.exe3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135B
MD5a5feca573884d76f559b996d45e8ad9a
SHA10e81a993f3af4e31d60653dc2513186f0495f1c8
SHA256c98e20d46d6465febb5d29cfab51241521ea5d6cd621f5e18b9b7d6fbfac3f0f
SHA512a9239648b5f15eac4d4151b6e1bdc81065eeaeb101404c2a0126f03bc87f1e6a57206bfa07a44379e9d3bba889e4497a9991ff41fb109099b01512df3dc3cbda
-
Filesize
3.8MB
MD562dfd692d357ad59cce9a36e3ddc609c
SHA1e427186802c4b0fb752ffd865686753fe183c2ee
SHA2560896e69d80d1b544be3d84a5eb7b11c7beba2e7042987c602bab2407b282a4e0
SHA512dedf1f953991cf8d0b326d76994f0b1c7a4afa4d680d82fff98a79a6f59f646cb536a79cfea5fd4f9c19889c02c0517abba69d8c389b5134cb4ead86a70ed0de