Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe
Resource
win7-20241010-en
General
-
Target
35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe
-
Size
520KB
-
MD5
f5fbc433f561df9781299e25de76a492
-
SHA1
00155e13f82b8bbebb98ee3f2a389e9d8be59c9f
-
SHA256
35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec
-
SHA512
6ef4f00b7087a1e3b34e037da00e0b3544fe37896f6d289211c68b332aa0ec38bb50ee0f360f7cf44cac0935b433ec1722233983acc298666e3d23b48b1a556a
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbS:f9fC3hh29Ya77A90aFtDfT5IMbS
Malware Config
Extracted
darkcomet
PrivateEye
ratblackshades.no-ip.biz:1604
DC_MUTEX-ACC1R98
-
gencode
8GG5LVVGljSF
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
Processes:
winupd.exewinupd.exewinupd.exepid process 2988 winupd.exe 2904 winupd.exe 2808 winupd.exe -
Loads dropped DLL 4 IoCs
Processes:
35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exewinupd.exepid process 2956 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe 2956 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe 2988 winupd.exe 2988 winupd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\winupd.exe -notray" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exewinupd.exedescription pid process target process PID 2524 set thread context of 2956 2524 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe PID 2988 set thread context of 2904 2988 winupd.exe winupd.exe PID 2988 set thread context of 2808 2988 winupd.exe winupd.exe -
Processes:
resource yara_rule behavioral1/memory/2808-53-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-71-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-70-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-69-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-66-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-55-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-59-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-76-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-77-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-78-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-82-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-84-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-85-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-86-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-87-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-88-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-89-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-90-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-91-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-92-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2808-93-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exereg.exe35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exewinupd.exewinupd.exewinupd.exeipconfig.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 2780 ipconfig.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
winupd.exedescription pid process Token: SeIncreaseQuotaPrivilege 2808 winupd.exe Token: SeSecurityPrivilege 2808 winupd.exe Token: SeTakeOwnershipPrivilege 2808 winupd.exe Token: SeLoadDriverPrivilege 2808 winupd.exe Token: SeSystemProfilePrivilege 2808 winupd.exe Token: SeSystemtimePrivilege 2808 winupd.exe Token: SeProfSingleProcessPrivilege 2808 winupd.exe Token: SeIncBasePriorityPrivilege 2808 winupd.exe Token: SeCreatePagefilePrivilege 2808 winupd.exe Token: SeBackupPrivilege 2808 winupd.exe Token: SeRestorePrivilege 2808 winupd.exe Token: SeShutdownPrivilege 2808 winupd.exe Token: SeDebugPrivilege 2808 winupd.exe Token: SeSystemEnvironmentPrivilege 2808 winupd.exe Token: SeChangeNotifyPrivilege 2808 winupd.exe Token: SeRemoteShutdownPrivilege 2808 winupd.exe Token: SeUndockPrivilege 2808 winupd.exe Token: SeManageVolumePrivilege 2808 winupd.exe Token: SeImpersonatePrivilege 2808 winupd.exe Token: SeCreateGlobalPrivilege 2808 winupd.exe Token: 33 2808 winupd.exe Token: 34 2808 winupd.exe Token: 35 2808 winupd.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exewinupd.exewinupd.exewinupd.exepid process 2524 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe 2956 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe 2988 winupd.exe 2904 winupd.exe 2808 winupd.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exewinupd.exewinupd.exeipconfig.execmd.exedescription pid process target process PID 2524 wrote to memory of 2956 2524 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe PID 2524 wrote to memory of 2956 2524 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe PID 2524 wrote to memory of 2956 2524 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe PID 2524 wrote to memory of 2956 2524 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe PID 2524 wrote to memory of 2956 2524 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe PID 2524 wrote to memory of 2956 2524 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe PID 2524 wrote to memory of 2956 2524 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe PID 2524 wrote to memory of 2956 2524 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe PID 2524 wrote to memory of 2956 2524 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe PID 2956 wrote to memory of 2988 2956 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe winupd.exe PID 2956 wrote to memory of 2988 2956 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe winupd.exe PID 2956 wrote to memory of 2988 2956 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe winupd.exe PID 2956 wrote to memory of 2988 2956 35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe winupd.exe PID 2988 wrote to memory of 2904 2988 winupd.exe winupd.exe PID 2988 wrote to memory of 2904 2988 winupd.exe winupd.exe PID 2988 wrote to memory of 2904 2988 winupd.exe winupd.exe PID 2988 wrote to memory of 2904 2988 winupd.exe winupd.exe PID 2988 wrote to memory of 2904 2988 winupd.exe winupd.exe PID 2988 wrote to memory of 2904 2988 winupd.exe winupd.exe PID 2988 wrote to memory of 2904 2988 winupd.exe winupd.exe PID 2988 wrote to memory of 2904 2988 winupd.exe winupd.exe PID 2988 wrote to memory of 2904 2988 winupd.exe winupd.exe PID 2988 wrote to memory of 2808 2988 winupd.exe winupd.exe PID 2988 wrote to memory of 2808 2988 winupd.exe winupd.exe PID 2988 wrote to memory of 2808 2988 winupd.exe winupd.exe PID 2988 wrote to memory of 2808 2988 winupd.exe winupd.exe PID 2988 wrote to memory of 2808 2988 winupd.exe winupd.exe PID 2988 wrote to memory of 2808 2988 winupd.exe winupd.exe PID 2988 wrote to memory of 2808 2988 winupd.exe winupd.exe PID 2988 wrote to memory of 2808 2988 winupd.exe winupd.exe PID 2904 wrote to memory of 2780 2904 winupd.exe ipconfig.exe PID 2904 wrote to memory of 2780 2904 winupd.exe ipconfig.exe PID 2904 wrote to memory of 2780 2904 winupd.exe ipconfig.exe PID 2904 wrote to memory of 2780 2904 winupd.exe ipconfig.exe PID 2904 wrote to memory of 2780 2904 winupd.exe ipconfig.exe PID 2904 wrote to memory of 2780 2904 winupd.exe ipconfig.exe PID 2780 wrote to memory of 1044 2780 ipconfig.exe cmd.exe PID 2780 wrote to memory of 1044 2780 ipconfig.exe cmd.exe PID 2780 wrote to memory of 1044 2780 ipconfig.exe cmd.exe PID 2780 wrote to memory of 1044 2780 ipconfig.exe cmd.exe PID 1044 wrote to memory of 1720 1044 cmd.exe reg.exe PID 1044 wrote to memory of 1720 1044 cmd.exe reg.exe PID 1044 wrote to memory of 1720 1044 cmd.exe reg.exe PID 1044 wrote to memory of 1720 1044 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe"C:\Users\Admin\AppData\Local\Temp\35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe"C:\Users\Admin\AppData\Local\Temp\35508885f58f8ed3817de9d3f8166808a61558f055c3c50b4c9964a8c70c1eec.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exeC:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HRIFTXJK.bat" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v WinUpdate /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1720
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5cac890d00365d07b9ca89def17cc3a36
SHA16fa99679ede791c16b5d3e6d243a98e8bbdb7eab
SHA2564f98ddee89760080a5c8a93666d2f5c97be52b741265ef4d1ce9aaebf05f12da
SHA512124dc0b18e13425bde43bcbbe2a99005928e398bffcb458d498aac9e754bc5b92b703270667800876c60b0801343f2de8c6b9a1eebafd80bb4f6d5dc295dd9f1
-
Filesize
520KB
MD5dd103ae6b40ceb104feb2e6fcb115ba9
SHA1ab80ce1bea0b6473363dee6910d013516ab7dfc3
SHA256fd6de9ed6cf6405a0a9f70d317424367cb308add854f54af440a512deea3237a
SHA5122f71bf51c40a1880c7e21479379ba45fa597e543b864756945435cd79ceb10f3af82ddef79a0efcc54082c6975522e71d9bbfb4685dfdebbd31932c52f47bdc0