Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 21:03
Static task
static1
Behavioral task
behavioral1
Sample
1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe
Resource
win10v2004-20241007-en
General
-
Target
1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe
-
Size
1.9MB
-
MD5
299c3a82d3402fa86e867c012e7ef5d0
-
SHA1
8a744e622f52d464db99bc6c00c3b48a3bb1ce8d
-
SHA256
1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88
-
SHA512
9140ec26f011949a0c0db3c16dec890c8943462a9b89710a9c113bfa48804b896e4000e6fd06196b2da619f465943141d45086f8890c7614aedeba34c527e643
-
SSDEEP
24576:qMyptg5dkAmL8jyLQLNW0yzotcSHVZwMz8gkyJ8fP4lw46lw4Pz9ELqjLb:3te3ow4+w4PzqLcLb
Malware Config
Extracted
darkcomet
1
anthraxgold.no-ip.info:666
DC_MUTEX-169BEXQ
-
gencode
M6QvjZgri1v2
-
install
false
-
offline_keylogger
false
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
Processes:
test.exetest.exetest.exepid Process 796 test.exe 2860 test.exe 1628 test.exe -
Loads dropped DLL 7 IoCs
Processes:
1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exetest.exepid Process 1744 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 1744 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 1744 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 1744 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 1744 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 796 test.exe 796 test.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\test\\test.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exetest.exedescription pid Process procid_target PID 2520 set thread context of 1744 2520 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 30 PID 796 set thread context of 2860 796 test.exe 35 PID 796 set thread context of 1628 796 test.exe 36 -
Processes:
resource yara_rule behavioral1/memory/1744-209-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2860-438-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1628-457-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1744-456-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2860-461-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1628-464-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
test.exe1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.execmd.exereg.exetest.exetest.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
test.exetest.exedescription pid Process Token: SeIncreaseQuotaPrivilege 1628 test.exe Token: SeSecurityPrivilege 1628 test.exe Token: SeTakeOwnershipPrivilege 1628 test.exe Token: SeLoadDriverPrivilege 1628 test.exe Token: SeSystemProfilePrivilege 1628 test.exe Token: SeSystemtimePrivilege 1628 test.exe Token: SeProfSingleProcessPrivilege 1628 test.exe Token: SeIncBasePriorityPrivilege 1628 test.exe Token: SeCreatePagefilePrivilege 1628 test.exe Token: SeBackupPrivilege 1628 test.exe Token: SeRestorePrivilege 1628 test.exe Token: SeShutdownPrivilege 1628 test.exe Token: SeDebugPrivilege 1628 test.exe Token: SeSystemEnvironmentPrivilege 1628 test.exe Token: SeChangeNotifyPrivilege 1628 test.exe Token: SeRemoteShutdownPrivilege 1628 test.exe Token: SeUndockPrivilege 1628 test.exe Token: SeManageVolumePrivilege 1628 test.exe Token: SeImpersonatePrivilege 1628 test.exe Token: SeCreateGlobalPrivilege 1628 test.exe Token: 33 1628 test.exe Token: 34 1628 test.exe Token: 35 1628 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe Token: SeDebugPrivilege 2860 test.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exetest.exetest.exepid Process 2520 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 1744 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 796 test.exe 2860 test.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.execmd.exetest.exedescription pid Process procid_target PID 2520 wrote to memory of 1744 2520 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 30 PID 2520 wrote to memory of 1744 2520 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 30 PID 2520 wrote to memory of 1744 2520 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 30 PID 2520 wrote to memory of 1744 2520 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 30 PID 2520 wrote to memory of 1744 2520 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 30 PID 2520 wrote to memory of 1744 2520 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 30 PID 2520 wrote to memory of 1744 2520 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 30 PID 2520 wrote to memory of 1744 2520 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 30 PID 1744 wrote to memory of 2980 1744 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 31 PID 1744 wrote to memory of 2980 1744 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 31 PID 1744 wrote to memory of 2980 1744 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 31 PID 1744 wrote to memory of 2980 1744 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 31 PID 2980 wrote to memory of 348 2980 cmd.exe 33 PID 2980 wrote to memory of 348 2980 cmd.exe 33 PID 2980 wrote to memory of 348 2980 cmd.exe 33 PID 2980 wrote to memory of 348 2980 cmd.exe 33 PID 1744 wrote to memory of 796 1744 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 34 PID 1744 wrote to memory of 796 1744 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 34 PID 1744 wrote to memory of 796 1744 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 34 PID 1744 wrote to memory of 796 1744 1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe 34 PID 796 wrote to memory of 2860 796 test.exe 35 PID 796 wrote to memory of 2860 796 test.exe 35 PID 796 wrote to memory of 2860 796 test.exe 35 PID 796 wrote to memory of 2860 796 test.exe 35 PID 796 wrote to memory of 2860 796 test.exe 35 PID 796 wrote to memory of 2860 796 test.exe 35 PID 796 wrote to memory of 2860 796 test.exe 35 PID 796 wrote to memory of 2860 796 test.exe 35 PID 796 wrote to memory of 1628 796 test.exe 36 PID 796 wrote to memory of 1628 796 test.exe 36 PID 796 wrote to memory of 1628 796 test.exe 36 PID 796 wrote to memory of 1628 796 test.exe 36 PID 796 wrote to memory of 1628 796 test.exe 36 PID 796 wrote to memory of 1628 796 test.exe 36 PID 796 wrote to memory of 1628 796 test.exe 36 PID 796 wrote to memory of 1628 796 test.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe"C:\Users\Admin\AppData\Local\Temp\1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe"C:\Users\Admin\AppData\Local\Temp\1991dad9c5af6524b377e8971e19997162d42f7ff50b346974ed5e5061222d88N.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\NIHVC.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svchost" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\test\test.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:348
-
-
-
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138B
MD5527683c48cc4c7190219814c77b72fe0
SHA1d995878a8f4b9824a0508039eeada5376be9a52d
SHA256bbebf3e66136e700d8e3e2e0c8f461cdd9d7e68fe5a18a235afe86344932fb4b
SHA512408a53b240c23fa34153ccc2b2315f28a9741121ecc9b76d50267ee62d78230e65574327369f83c779c781802c0c28f6c578703c01a67de46c3d44f71b814fa6
-
Filesize
1.9MB
MD58e5b4b5e5a79df2f3d34eab5ae330dca
SHA113a290f8181fe0998db5c3b958edabf144f8af4b
SHA256ae8a367021399c36f3548ea05f53b412d1f01c24a03ca62afc373fd48dff51f8
SHA512d9106c6cdd1281b42abd191cc8e5e6864db2c9ebe3b06582939c8c8e08eb00bfa2231d9843424ea19a6bcd6ad0dbd5484e54a9904e783c129ec99d64079bb5eb