Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 11:44
Behavioral task
behavioral1
Sample
ChangerSteamByOstrogV2/ChangerSteamByOstrog.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ChangerSteamByOstrogV2/ChangerSteamByOstrog.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ChangerSteamByOstrogV2/ChangerSteamByOstrog.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ChangerSteamByOstrogV2/ChangerSteamByOstrog.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Hack.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Hack.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Читы для CS 1.6 ! Программы, Конфиги, Скрипты, Чит-плагины и т.д.url
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Читы для CS 1.6 ! Программы, Конфиги, Скрипты, Чит-плагины и т.д.url
Resource
win10v2004-20241007-en
General
-
Target
Hack.exe
-
Size
283KB
-
MD5
c13e70ba8eba2a5412061203fec20adb
-
SHA1
0cf092ebbf74d8fbb18018224da083331aad8ea2
-
SHA256
91a8a7b0323b6869661c0102128e6d7d5a705ca7336a6828e442612fc6f52c18
-
SHA512
23c518473ea8b2d3bdad5af40dba662618cb1ffa7a99079bdceddc881465b13dd2fe79a2ee9e3ff838fab4729a29203f3d0e8e1487316f8a0f8356e8a5309031
-
SSDEEP
6144:icNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37jl:icW7KEZlPzCy37jl
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1488
109.62.227.63:1488
DC_MUTEX-2A9L649
-
gencode
Tqg7EJyTD5Ds
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
resource yara_rule behavioral6/memory/1612-0-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral6/memory/1612-2-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral6/memory/1612-6-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral6/memory/1612-8-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral6/memory/1612-10-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral6/memory/1612-11-0x0000000000400000-0x00000000004C6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hack.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1612 Hack.exe Token: SeSecurityPrivilege 1612 Hack.exe Token: SeTakeOwnershipPrivilege 1612 Hack.exe Token: SeLoadDriverPrivilege 1612 Hack.exe Token: SeSystemProfilePrivilege 1612 Hack.exe Token: SeSystemtimePrivilege 1612 Hack.exe Token: SeProfSingleProcessPrivilege 1612 Hack.exe Token: SeIncBasePriorityPrivilege 1612 Hack.exe Token: SeCreatePagefilePrivilege 1612 Hack.exe Token: SeBackupPrivilege 1612 Hack.exe Token: SeRestorePrivilege 1612 Hack.exe Token: SeShutdownPrivilege 1612 Hack.exe Token: SeDebugPrivilege 1612 Hack.exe Token: SeSystemEnvironmentPrivilege 1612 Hack.exe Token: SeChangeNotifyPrivilege 1612 Hack.exe Token: SeRemoteShutdownPrivilege 1612 Hack.exe Token: SeUndockPrivilege 1612 Hack.exe Token: SeManageVolumePrivilege 1612 Hack.exe Token: SeImpersonatePrivilege 1612 Hack.exe Token: SeCreateGlobalPrivilege 1612 Hack.exe Token: 33 1612 Hack.exe Token: 34 1612 Hack.exe Token: 35 1612 Hack.exe Token: 36 1612 Hack.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1612 Hack.exe