Analysis
-
max time kernel
111s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 09:29
Static task
static1
Behavioral task
behavioral1
Sample
2791e87f32ec478fe7a73a4233bd1820d7afbbb4e596c659440c11b0b1ea05eaN.exe
Resource
win7-20241010-en
General
-
Target
2791e87f32ec478fe7a73a4233bd1820d7afbbb4e596c659440c11b0b1ea05eaN.exe
-
Size
574KB
-
MD5
99fb8b9135902f0b8ab71c4677736110
-
SHA1
a4a2bbcc70234d145288fcc15cb11c6478d32e59
-
SHA256
2791e87f32ec478fe7a73a4233bd1820d7afbbb4e596c659440c11b0b1ea05ea
-
SHA512
55c67826f60f2c415ec7cec74163aa379c369ba3b544f1394092c7d8344a4499ebda68b0c0e4e55589d4cc95f1d840a5e7550d83324fcc3e9918645a0c5a7b14
-
SSDEEP
12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3Hdsub7:zFhWAfn22m0eD1GPz8HdxH
Malware Config
Signatures
-
Darkcomet family
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Soundcrd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2791e87f32ec478fe7a73a4233bd1820d7afbbb4e596c659440c11b0b1ea05eaN.exe -
Executes dropped EXE 3 IoCs
pid Process 708 Soundcrd.exe 3572 Soundcrd.exe 116 Soundcrd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mcrosoftt = "C:\\Users\\Admin\\AppData\\Roaming\\Soundcrd.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 708 set thread context of 3572 708 Soundcrd.exe 92 PID 708 set thread context of 116 708 Soundcrd.exe 93 -
resource yara_rule behavioral2/memory/3572-32-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3572-36-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/116-35-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/116-39-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3572-41-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/116-42-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3572-46-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3572-47-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3572-50-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3572-49-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3572-48-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3572-51-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/116-52-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3572-57-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3572-61-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3572-65-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3572-69-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3572-73-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2791e87f32ec478fe7a73a4233bd1820d7afbbb4e596c659440c11b0b1ea05eaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Soundcrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Soundcrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Soundcrd.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Soundcrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Soundcrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Soundcrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Soundcrd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Soundcrd.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 116 Soundcrd.exe Token: SeIncreaseQuotaPrivilege 3572 Soundcrd.exe Token: SeSecurityPrivilege 3572 Soundcrd.exe Token: SeTakeOwnershipPrivilege 3572 Soundcrd.exe Token: SeLoadDriverPrivilege 3572 Soundcrd.exe Token: SeSystemProfilePrivilege 3572 Soundcrd.exe Token: SeSystemtimePrivilege 3572 Soundcrd.exe Token: SeProfSingleProcessPrivilege 3572 Soundcrd.exe Token: SeIncBasePriorityPrivilege 3572 Soundcrd.exe Token: SeCreatePagefilePrivilege 3572 Soundcrd.exe Token: SeBackupPrivilege 3572 Soundcrd.exe Token: SeRestorePrivilege 3572 Soundcrd.exe Token: SeShutdownPrivilege 3572 Soundcrd.exe Token: SeDebugPrivilege 3572 Soundcrd.exe Token: SeSystemEnvironmentPrivilege 3572 Soundcrd.exe Token: SeChangeNotifyPrivilege 3572 Soundcrd.exe Token: SeRemoteShutdownPrivilege 3572 Soundcrd.exe Token: SeUndockPrivilege 3572 Soundcrd.exe Token: SeManageVolumePrivilege 3572 Soundcrd.exe Token: SeImpersonatePrivilege 3572 Soundcrd.exe Token: SeCreateGlobalPrivilege 3572 Soundcrd.exe Token: 33 3572 Soundcrd.exe Token: 34 3572 Soundcrd.exe Token: 35 3572 Soundcrd.exe Token: 36 3572 Soundcrd.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2284 2791e87f32ec478fe7a73a4233bd1820d7afbbb4e596c659440c11b0b1ea05eaN.exe 708 Soundcrd.exe 116 Soundcrd.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2284 wrote to memory of 4268 2284 2791e87f32ec478fe7a73a4233bd1820d7afbbb4e596c659440c11b0b1ea05eaN.exe 86 PID 2284 wrote to memory of 4268 2284 2791e87f32ec478fe7a73a4233bd1820d7afbbb4e596c659440c11b0b1ea05eaN.exe 86 PID 2284 wrote to memory of 4268 2284 2791e87f32ec478fe7a73a4233bd1820d7afbbb4e596c659440c11b0b1ea05eaN.exe 86 PID 4268 wrote to memory of 5076 4268 cmd.exe 89 PID 4268 wrote to memory of 5076 4268 cmd.exe 89 PID 4268 wrote to memory of 5076 4268 cmd.exe 89 PID 2284 wrote to memory of 708 2284 2791e87f32ec478fe7a73a4233bd1820d7afbbb4e596c659440c11b0b1ea05eaN.exe 90 PID 2284 wrote to memory of 708 2284 2791e87f32ec478fe7a73a4233bd1820d7afbbb4e596c659440c11b0b1ea05eaN.exe 90 PID 2284 wrote to memory of 708 2284 2791e87f32ec478fe7a73a4233bd1820d7afbbb4e596c659440c11b0b1ea05eaN.exe 90 PID 708 wrote to memory of 3572 708 Soundcrd.exe 92 PID 708 wrote to memory of 3572 708 Soundcrd.exe 92 PID 708 wrote to memory of 3572 708 Soundcrd.exe 92 PID 708 wrote to memory of 3572 708 Soundcrd.exe 92 PID 708 wrote to memory of 3572 708 Soundcrd.exe 92 PID 708 wrote to memory of 3572 708 Soundcrd.exe 92 PID 708 wrote to memory of 3572 708 Soundcrd.exe 92 PID 708 wrote to memory of 3572 708 Soundcrd.exe 92 PID 708 wrote to memory of 116 708 Soundcrd.exe 93 PID 708 wrote to memory of 116 708 Soundcrd.exe 93 PID 708 wrote to memory of 116 708 Soundcrd.exe 93 PID 708 wrote to memory of 116 708 Soundcrd.exe 93 PID 708 wrote to memory of 116 708 Soundcrd.exe 93 PID 708 wrote to memory of 116 708 Soundcrd.exe 93 PID 708 wrote to memory of 116 708 Soundcrd.exe 93 PID 708 wrote to memory of 116 708 Soundcrd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2791e87f32ec478fe7a73a4233bd1820d7afbbb4e596c659440c11b0b1ea05eaN.exe"C:\Users\Admin\AppData\Local\Temp\2791e87f32ec478fe7a73a4233bd1820d7afbbb4e596c659440c11b0b1ea05eaN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XVQPx.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Mcrosoftt" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Soundcrd.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5076
-
-
-
C:\Users\Admin\AppData\Roaming\Soundcrd.exe"C:\Users\Admin\AppData\Roaming\Soundcrd.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Roaming\Soundcrd.exeC:\Users\Admin\AppData\Roaming\Soundcrd.exe3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
C:\Users\Admin\AppData\Roaming\Soundcrd.exeC:\Users\Admin\AppData\Roaming\Soundcrd.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:116
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD5173bcce4810d4901872d0ef4f0bfea4e
SHA1561b03fdfe68b6419fddf57f32e1aab9a6126a2f
SHA25610ea37eceabbe80fe9814280b66b957636951dbeeed18a9b4d50a1d24a6f1d1d
SHA5122401e0a5e3f7bf590a0767449da2249d09717e8c1cb71a7475e81d9615580001cfc38705cd1a5b4edc33f7df043bf195e28e4a5442a32bc879dffc6473bd545e
-
Filesize
574KB
MD55c12da359179ff094ab0c40fbe87a9ee
SHA155fb6651e9e5035fd54c0a6620a18e3454228894
SHA2567b1c5ed97ea73f6db7f975a3a4d1a5bc5cb9325bbc0e70d25a3cc4a8b4420809
SHA512b0d67d1822d743a6803c962101275d2814a9bdc2846e4433e2badf861ed9cfd8b9e4ecbf5c37bd12b2de0e91e620d711bccfe8282d045f6281decaf164ca2857