Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-11-2024 23:03
Static task
static1
Behavioral task
behavioral1
Sample
4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe
Resource
win7-20240903-en
General
-
Target
4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe
-
Size
520KB
-
MD5
d4d59021825d613808c6d07794e1e2d5
-
SHA1
b570d4498144c6c028b4a87a28b8a64f7b698391
-
SHA256
4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41
-
SHA512
f518190fbfda39eee2d2c7825d353d7b86c73158cbfa7bf0026760488b6bdf4dc1432a8f79882a255cda11920a19ba4fea78e070d48e4208187964686cab59f2
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbt:f9fC3hh29Ya77A90aFtDfT5IMbt
Malware Config
Extracted
darkcomet
PrivateEye
ratblackshades.no-ip.biz:1604
DC_MUTEX-ACC1R98
-
gencode
8GG5LVVGljSF
-
install
false
-
offline_keylogger
true
-
persistence
false
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 2256 winupd.exe 2204 winupd.exe 2452 winupd.exe -
Loads dropped DLL 2 IoCs
pid Process 2072 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe 2072 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\winupd.exe -notray" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2384 set thread context of 2072 2384 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe 30 PID 2256 set thread context of 2204 2256 winupd.exe 32 PID 2256 set thread context of 2452 2256 winupd.exe 33 -
resource yara_rule behavioral1/memory/2452-63-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-71-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-70-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-64-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-62-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-60-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-59-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-57-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-53-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-51-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-75-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-74-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-80-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-81-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-82-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-83-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-84-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-85-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-86-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-87-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-88-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-89-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-90-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-91-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-92-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2452-93-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2784 ipconfig.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3032 reg.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2452 winupd.exe Token: SeSecurityPrivilege 2452 winupd.exe Token: SeTakeOwnershipPrivilege 2452 winupd.exe Token: SeLoadDriverPrivilege 2452 winupd.exe Token: SeSystemProfilePrivilege 2452 winupd.exe Token: SeSystemtimePrivilege 2452 winupd.exe Token: SeProfSingleProcessPrivilege 2452 winupd.exe Token: SeIncBasePriorityPrivilege 2452 winupd.exe Token: SeCreatePagefilePrivilege 2452 winupd.exe Token: SeBackupPrivilege 2452 winupd.exe Token: SeRestorePrivilege 2452 winupd.exe Token: SeShutdownPrivilege 2452 winupd.exe Token: SeDebugPrivilege 2452 winupd.exe Token: SeSystemEnvironmentPrivilege 2452 winupd.exe Token: SeChangeNotifyPrivilege 2452 winupd.exe Token: SeRemoteShutdownPrivilege 2452 winupd.exe Token: SeUndockPrivilege 2452 winupd.exe Token: SeManageVolumePrivilege 2452 winupd.exe Token: SeImpersonatePrivilege 2452 winupd.exe Token: SeCreateGlobalPrivilege 2452 winupd.exe Token: 33 2452 winupd.exe Token: 34 2452 winupd.exe Token: 35 2452 winupd.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2384 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe 2072 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe 2256 winupd.exe 2204 winupd.exe 2452 winupd.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2072 2384 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe 30 PID 2384 wrote to memory of 2072 2384 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe 30 PID 2384 wrote to memory of 2072 2384 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe 30 PID 2384 wrote to memory of 2072 2384 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe 30 PID 2384 wrote to memory of 2072 2384 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe 30 PID 2384 wrote to memory of 2072 2384 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe 30 PID 2384 wrote to memory of 2072 2384 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe 30 PID 2384 wrote to memory of 2072 2384 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe 30 PID 2384 wrote to memory of 2072 2384 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe 30 PID 2072 wrote to memory of 2256 2072 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe 31 PID 2072 wrote to memory of 2256 2072 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe 31 PID 2072 wrote to memory of 2256 2072 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe 31 PID 2072 wrote to memory of 2256 2072 4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe 31 PID 2256 wrote to memory of 2204 2256 winupd.exe 32 PID 2256 wrote to memory of 2204 2256 winupd.exe 32 PID 2256 wrote to memory of 2204 2256 winupd.exe 32 PID 2256 wrote to memory of 2204 2256 winupd.exe 32 PID 2256 wrote to memory of 2204 2256 winupd.exe 32 PID 2256 wrote to memory of 2204 2256 winupd.exe 32 PID 2256 wrote to memory of 2204 2256 winupd.exe 32 PID 2256 wrote to memory of 2204 2256 winupd.exe 32 PID 2256 wrote to memory of 2204 2256 winupd.exe 32 PID 2256 wrote to memory of 2452 2256 winupd.exe 33 PID 2256 wrote to memory of 2452 2256 winupd.exe 33 PID 2256 wrote to memory of 2452 2256 winupd.exe 33 PID 2256 wrote to memory of 2452 2256 winupd.exe 33 PID 2256 wrote to memory of 2452 2256 winupd.exe 33 PID 2256 wrote to memory of 2452 2256 winupd.exe 33 PID 2256 wrote to memory of 2452 2256 winupd.exe 33 PID 2256 wrote to memory of 2452 2256 winupd.exe 33 PID 2204 wrote to memory of 2784 2204 winupd.exe 34 PID 2204 wrote to memory of 2784 2204 winupd.exe 34 PID 2204 wrote to memory of 2784 2204 winupd.exe 34 PID 2204 wrote to memory of 2784 2204 winupd.exe 34 PID 2204 wrote to memory of 2784 2204 winupd.exe 34 PID 2204 wrote to memory of 2784 2204 winupd.exe 34 PID 2784 wrote to memory of 2692 2784 ipconfig.exe 36 PID 2784 wrote to memory of 2692 2784 ipconfig.exe 36 PID 2784 wrote to memory of 2692 2784 ipconfig.exe 36 PID 2784 wrote to memory of 2692 2784 ipconfig.exe 36 PID 2692 wrote to memory of 3032 2692 cmd.exe 38 PID 2692 wrote to memory of 3032 2692 cmd.exe 38 PID 2692 wrote to memory of 3032 2692 cmd.exe 38 PID 2692 wrote to memory of 3032 2692 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe"C:\Users\Admin\AppData\Local\Temp\4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe"C:\Users\Admin\AppData\Local\Temp\4f6c3238851f570e902be85c53d9bcb4f589cb6fc2c652fd6ac5509ff26acc41.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exeC:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HQIESXJK.bat" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v WinUpdate /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3032
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2452
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5cac890d00365d07b9ca89def17cc3a36
SHA16fa99679ede791c16b5d3e6d243a98e8bbdb7eab
SHA2564f98ddee89760080a5c8a93666d2f5c97be52b741265ef4d1ce9aaebf05f12da
SHA512124dc0b18e13425bde43bcbbe2a99005928e398bffcb458d498aac9e754bc5b92b703270667800876c60b0801343f2de8c6b9a1eebafd80bb4f6d5dc295dd9f1
-
Filesize
520KB
MD5ae82b9878b95be99a333180cd3dde385
SHA14fbf1409ac99670e2c505b76a66e2b38142559bc
SHA2564287cc5c6db750dd08bcc47c305e7a57b90344487f3cc140765e1d4f3266ff84
SHA512073af4e23350b68ae100e262ce9076548195ab4efc661488db252f1973ef87801cfd72911a12bc90ce0976e4b6187608f4cbce6a7b3d6880056a1fc949b6aa75