Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 00:30
Static task
static1
Behavioral task
behavioral1
Sample
6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe
Resource
win10v2004-20241007-en
General
-
Target
6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe
-
Size
1.7MB
-
MD5
7401a33cbb76ea99fa54a8420b3be420
-
SHA1
6351cae2ac6e773bb6d43618fe47294e48cf6e0c
-
SHA256
6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1b
-
SHA512
5632d90652ee1c7c00e7563a488e3403cf91f9ebafd4a43d34ee83a1f04e18ee6a5fe7a1fe0db7de1e398c974c89d212407f7f9711d334fd7057cc919681bab4
-
SSDEEP
24576:qMyptg5dkAmL8jyLQLNW0yzotcSHVZwMz8gkyJ8fPO:3te3O
Malware Config
Extracted
darkcomet
1
anthraxgold.no-ip.info:666
DC_MUTEX-169BEXQ
-
gencode
M6QvjZgri1v2
-
install
false
-
offline_keylogger
false
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 828 test.exe 2736 test.exe 2068 test.exe -
Loads dropped DLL 7 IoCs
pid Process 2864 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 2864 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 2864 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 2864 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 2864 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 828 test.exe 828 test.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\test\\test.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2280 set thread context of 2864 2280 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 31 PID 828 set thread context of 2736 828 test.exe 36 PID 828 set thread context of 2068 828 test.exe 37 -
resource yara_rule behavioral1/memory/2864-209-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2068-455-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2736-453-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2864-458-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2736-461-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2068-462-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2068 test.exe Token: SeSecurityPrivilege 2068 test.exe Token: SeTakeOwnershipPrivilege 2068 test.exe Token: SeLoadDriverPrivilege 2068 test.exe Token: SeSystemProfilePrivilege 2068 test.exe Token: SeSystemtimePrivilege 2068 test.exe Token: SeProfSingleProcessPrivilege 2068 test.exe Token: SeIncBasePriorityPrivilege 2068 test.exe Token: SeCreatePagefilePrivilege 2068 test.exe Token: SeBackupPrivilege 2068 test.exe Token: SeRestorePrivilege 2068 test.exe Token: SeShutdownPrivilege 2068 test.exe Token: SeDebugPrivilege 2068 test.exe Token: SeSystemEnvironmentPrivilege 2068 test.exe Token: SeChangeNotifyPrivilege 2068 test.exe Token: SeRemoteShutdownPrivilege 2068 test.exe Token: SeUndockPrivilege 2068 test.exe Token: SeManageVolumePrivilege 2068 test.exe Token: SeImpersonatePrivilege 2068 test.exe Token: SeCreateGlobalPrivilege 2068 test.exe Token: 33 2068 test.exe Token: 34 2068 test.exe Token: 35 2068 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2280 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 2864 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 828 test.exe 2736 test.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2864 2280 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 31 PID 2280 wrote to memory of 2864 2280 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 31 PID 2280 wrote to memory of 2864 2280 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 31 PID 2280 wrote to memory of 2864 2280 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 31 PID 2280 wrote to memory of 2864 2280 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 31 PID 2280 wrote to memory of 2864 2280 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 31 PID 2280 wrote to memory of 2864 2280 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 31 PID 2280 wrote to memory of 2864 2280 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 31 PID 2864 wrote to memory of 1912 2864 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 32 PID 2864 wrote to memory of 1912 2864 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 32 PID 2864 wrote to memory of 1912 2864 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 32 PID 2864 wrote to memory of 1912 2864 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 32 PID 1912 wrote to memory of 664 1912 cmd.exe 34 PID 1912 wrote to memory of 664 1912 cmd.exe 34 PID 1912 wrote to memory of 664 1912 cmd.exe 34 PID 1912 wrote to memory of 664 1912 cmd.exe 34 PID 2864 wrote to memory of 828 2864 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 35 PID 2864 wrote to memory of 828 2864 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 35 PID 2864 wrote to memory of 828 2864 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 35 PID 2864 wrote to memory of 828 2864 6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe 35 PID 828 wrote to memory of 2736 828 test.exe 36 PID 828 wrote to memory of 2736 828 test.exe 36 PID 828 wrote to memory of 2736 828 test.exe 36 PID 828 wrote to memory of 2736 828 test.exe 36 PID 828 wrote to memory of 2736 828 test.exe 36 PID 828 wrote to memory of 2736 828 test.exe 36 PID 828 wrote to memory of 2736 828 test.exe 36 PID 828 wrote to memory of 2736 828 test.exe 36 PID 828 wrote to memory of 2068 828 test.exe 37 PID 828 wrote to memory of 2068 828 test.exe 37 PID 828 wrote to memory of 2068 828 test.exe 37 PID 828 wrote to memory of 2068 828 test.exe 37 PID 828 wrote to memory of 2068 828 test.exe 37 PID 828 wrote to memory of 2068 828 test.exe 37 PID 828 wrote to memory of 2068 828 test.exe 37 PID 828 wrote to memory of 2068 828 test.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe"C:\Users\Admin\AppData\Local\Temp\6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe"C:\Users\Admin\AppData\Local\Temp\6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CQPBJ.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svchost" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\test\test.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:664
-
-
-
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2736
-
-
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138B
MD5527683c48cc4c7190219814c77b72fe0
SHA1d995878a8f4b9824a0508039eeada5376be9a52d
SHA256bbebf3e66136e700d8e3e2e0c8f461cdd9d7e68fe5a18a235afe86344932fb4b
SHA512408a53b240c23fa34153ccc2b2315f28a9741121ecc9b76d50267ee62d78230e65574327369f83c779c781802c0c28f6c578703c01a67de46c3d44f71b814fa6
-
Filesize
1.7MB
MD556fd309287c6207c1c04120ad3f89a05
SHA1e9a63443019055a5b7a383a0049e4fe76afaf4c1
SHA256a5b742bbba6ac9cde01fa9f79a2fedd527eb0ebe4ebf0230959d51f5033f3808
SHA512eabb63c8bf6b8f41e3d7e17108a72d761ea8b8b72979dd942ac2b0a44c8748dd6c9ab1f2a2d4742f2d2868a0341d28149de6e196ab5bb2cf50fae61957b88089