Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2024 09:25
Static task
static1
Behavioral task
behavioral1
Sample
b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe
Resource
win7-20241010-en
General
-
Target
b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe
-
Size
520KB
-
MD5
74b0b03fff3d28b89f0e8027d8142530
-
SHA1
4c8d197f26635b263ac7200b9d0c8283b1d07351
-
SHA256
b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893
-
SHA512
0922391e521f1b656230016382a2a684c9cbe96f45a5a291c99b93ee508c4d9344423c1144b37a968db94fa96ddc14213a16c2926c6f12c32dd59d87d9227856
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbQ:f9fC3hh29Ya77A90aFtDfT5IMbQ
Malware Config
Extracted
darkcomet
PrivateEye
ratblackshades.no-ip.biz:1604
DC_MUTEX-ACC1R98
-
gencode
8GG5LVVGljSF
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
Processes:
winupd.exewinupd.exewinupd.exepid Process 2240 winupd.exe 64 winupd.exe 2284 winupd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exewinupd.exedescription pid Process procid_target PID 3960 set thread context of 4572 3960 b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe 96 PID 2240 set thread context of 64 2240 winupd.exe 102 PID 2240 set thread context of 2284 2240 winupd.exe 103 -
Processes:
resource yara_rule behavioral2/memory/2284-30-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-39-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-42-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-41-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-40-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-38-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-37-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-45-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-46-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-47-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-48-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-49-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-50-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-51-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-52-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-53-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-54-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-55-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2284-56-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1124 1316 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
winupd.exeb8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exeb8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exewinupd.exewinupd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid Process 1316 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
winupd.exedescription pid Process Token: SeIncreaseQuotaPrivilege 2284 winupd.exe Token: SeSecurityPrivilege 2284 winupd.exe Token: SeTakeOwnershipPrivilege 2284 winupd.exe Token: SeLoadDriverPrivilege 2284 winupd.exe Token: SeSystemProfilePrivilege 2284 winupd.exe Token: SeSystemtimePrivilege 2284 winupd.exe Token: SeProfSingleProcessPrivilege 2284 winupd.exe Token: SeIncBasePriorityPrivilege 2284 winupd.exe Token: SeCreatePagefilePrivilege 2284 winupd.exe Token: SeBackupPrivilege 2284 winupd.exe Token: SeRestorePrivilege 2284 winupd.exe Token: SeShutdownPrivilege 2284 winupd.exe Token: SeDebugPrivilege 2284 winupd.exe Token: SeSystemEnvironmentPrivilege 2284 winupd.exe Token: SeChangeNotifyPrivilege 2284 winupd.exe Token: SeRemoteShutdownPrivilege 2284 winupd.exe Token: SeUndockPrivilege 2284 winupd.exe Token: SeManageVolumePrivilege 2284 winupd.exe Token: SeImpersonatePrivilege 2284 winupd.exe Token: SeCreateGlobalPrivilege 2284 winupd.exe Token: 33 2284 winupd.exe Token: 34 2284 winupd.exe Token: 35 2284 winupd.exe Token: 36 2284 winupd.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exeb8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exewinupd.exewinupd.exewinupd.exepid Process 3960 b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe 4572 b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe 2240 winupd.exe 64 winupd.exe 2284 winupd.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exeb8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exewinupd.exewinupd.exedescription pid Process procid_target PID 3960 wrote to memory of 4572 3960 b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe 96 PID 3960 wrote to memory of 4572 3960 b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe 96 PID 3960 wrote to memory of 4572 3960 b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe 96 PID 3960 wrote to memory of 4572 3960 b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe 96 PID 3960 wrote to memory of 4572 3960 b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe 96 PID 3960 wrote to memory of 4572 3960 b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe 96 PID 3960 wrote to memory of 4572 3960 b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe 96 PID 3960 wrote to memory of 4572 3960 b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe 96 PID 4572 wrote to memory of 2240 4572 b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe 97 PID 4572 wrote to memory of 2240 4572 b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe 97 PID 4572 wrote to memory of 2240 4572 b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe 97 PID 2240 wrote to memory of 64 2240 winupd.exe 102 PID 2240 wrote to memory of 64 2240 winupd.exe 102 PID 2240 wrote to memory of 64 2240 winupd.exe 102 PID 2240 wrote to memory of 64 2240 winupd.exe 102 PID 2240 wrote to memory of 64 2240 winupd.exe 102 PID 2240 wrote to memory of 64 2240 winupd.exe 102 PID 2240 wrote to memory of 64 2240 winupd.exe 102 PID 2240 wrote to memory of 64 2240 winupd.exe 102 PID 2240 wrote to memory of 2284 2240 winupd.exe 103 PID 2240 wrote to memory of 2284 2240 winupd.exe 103 PID 2240 wrote to memory of 2284 2240 winupd.exe 103 PID 2240 wrote to memory of 2284 2240 winupd.exe 103 PID 2240 wrote to memory of 2284 2240 winupd.exe 103 PID 2240 wrote to memory of 2284 2240 winupd.exe 103 PID 2240 wrote to memory of 2284 2240 winupd.exe 103 PID 2240 wrote to memory of 2284 2240 winupd.exe 103 PID 64 wrote to memory of 1316 64 winupd.exe 104 PID 64 wrote to memory of 1316 64 winupd.exe 104 PID 64 wrote to memory of 1316 64 winupd.exe 104 PID 64 wrote to memory of 1316 64 winupd.exe 104 PID 64 wrote to memory of 1316 64 winupd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe"C:\Users\Admin\AppData\Local\Temp\b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe"C:\Users\Admin\AppData\Local\Temp\b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exeC:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- Gathers network information
PID:1316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 2726⤵
- Program crash
PID:1124
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2284
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1316 -ip 13161⤵PID:4016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD5a5ec66cdde8727295099a0f1b8b52484
SHA14cb4831b2ab4471e25dc2244d107a21639a5f228
SHA256b0e831cd45c7dad7308f8916d6be0e6ffe71b83e223bbf855ac5f615521de653
SHA512965c2c039b6b46932e44d69224db86cf3c6dd52b517951791be1948655477c7b0ce52b671bbca275e1f56b768f547aeffd573e74561af3a90ef61ae1f85cef40