Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe
Resource
win10v2004-20241007-en
General
-
Target
01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe
-
Size
1.7MB
-
MD5
758543c7742ff270dcb530cffaf11eeb
-
SHA1
6d1ed43c34365897efcfe903c1214cb714632176
-
SHA256
01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd
-
SHA512
2d1e81f80077cd0876f80086a8e0e941c8846102a7603eff3f9f71af86cd9feb37cb339cb35a15ac6f12e11c9dd602f8e18846caeed8252a40d159ed3f515817
-
SSDEEP
24576:qMyptg5dkAmL8jyLQLNW0yzotcSHVZwMz8gkyJ8fPd:3te3d
Malware Config
Extracted
darkcomet
1
anthraxgold.no-ip.info:666
DC_MUTEX-169BEXQ
-
gencode
M6QvjZgri1v2
-
install
false
-
offline_keylogger
false
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
Processes:
test.exetest.exetest.exepid process 840 test.exe 2728 test.exe 1036 test.exe -
Loads dropped DLL 7 IoCs
Processes:
01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exetest.exepid process 2976 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe 2976 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe 2976 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe 2976 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe 2976 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe 840 test.exe 840 test.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\test\\test.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exetest.exedescription pid process target process PID 2424 set thread context of 2976 2424 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe PID 840 set thread context of 2728 840 test.exe test.exe PID 840 set thread context of 1036 840 test.exe test.exe -
Processes:
resource yara_rule behavioral1/memory/2976-209-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2728-443-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1036-457-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2976-456-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2728-461-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1036-464-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exereg.exetest.exetest.exetest.exe01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
test.exetest.exedescription pid process Token: SeIncreaseQuotaPrivilege 1036 test.exe Token: SeSecurityPrivilege 1036 test.exe Token: SeTakeOwnershipPrivilege 1036 test.exe Token: SeLoadDriverPrivilege 1036 test.exe Token: SeSystemProfilePrivilege 1036 test.exe Token: SeSystemtimePrivilege 1036 test.exe Token: SeProfSingleProcessPrivilege 1036 test.exe Token: SeIncBasePriorityPrivilege 1036 test.exe Token: SeCreatePagefilePrivilege 1036 test.exe Token: SeBackupPrivilege 1036 test.exe Token: SeRestorePrivilege 1036 test.exe Token: SeShutdownPrivilege 1036 test.exe Token: SeDebugPrivilege 1036 test.exe Token: SeSystemEnvironmentPrivilege 1036 test.exe Token: SeChangeNotifyPrivilege 1036 test.exe Token: SeRemoteShutdownPrivilege 1036 test.exe Token: SeUndockPrivilege 1036 test.exe Token: SeManageVolumePrivilege 1036 test.exe Token: SeImpersonatePrivilege 1036 test.exe Token: SeCreateGlobalPrivilege 1036 test.exe Token: 33 1036 test.exe Token: 34 1036 test.exe Token: 35 1036 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe Token: SeDebugPrivilege 2728 test.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exetest.exetest.exepid process 2424 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe 2976 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe 840 test.exe 2728 test.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.execmd.exetest.exedescription pid process target process PID 2424 wrote to memory of 2976 2424 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe PID 2424 wrote to memory of 2976 2424 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe PID 2424 wrote to memory of 2976 2424 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe PID 2424 wrote to memory of 2976 2424 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe PID 2424 wrote to memory of 2976 2424 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe PID 2424 wrote to memory of 2976 2424 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe PID 2424 wrote to memory of 2976 2424 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe PID 2424 wrote to memory of 2976 2424 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe PID 2976 wrote to memory of 408 2976 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe cmd.exe PID 2976 wrote to memory of 408 2976 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe cmd.exe PID 2976 wrote to memory of 408 2976 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe cmd.exe PID 2976 wrote to memory of 408 2976 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe cmd.exe PID 408 wrote to memory of 1452 408 cmd.exe reg.exe PID 408 wrote to memory of 1452 408 cmd.exe reg.exe PID 408 wrote to memory of 1452 408 cmd.exe reg.exe PID 408 wrote to memory of 1452 408 cmd.exe reg.exe PID 2976 wrote to memory of 840 2976 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe test.exe PID 2976 wrote to memory of 840 2976 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe test.exe PID 2976 wrote to memory of 840 2976 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe test.exe PID 2976 wrote to memory of 840 2976 01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe test.exe PID 840 wrote to memory of 2728 840 test.exe test.exe PID 840 wrote to memory of 2728 840 test.exe test.exe PID 840 wrote to memory of 2728 840 test.exe test.exe PID 840 wrote to memory of 2728 840 test.exe test.exe PID 840 wrote to memory of 2728 840 test.exe test.exe PID 840 wrote to memory of 2728 840 test.exe test.exe PID 840 wrote to memory of 2728 840 test.exe test.exe PID 840 wrote to memory of 2728 840 test.exe test.exe PID 840 wrote to memory of 1036 840 test.exe test.exe PID 840 wrote to memory of 1036 840 test.exe test.exe PID 840 wrote to memory of 1036 840 test.exe test.exe PID 840 wrote to memory of 1036 840 test.exe test.exe PID 840 wrote to memory of 1036 840 test.exe test.exe PID 840 wrote to memory of 1036 840 test.exe test.exe PID 840 wrote to memory of 1036 840 test.exe test.exe PID 840 wrote to memory of 1036 840 test.exe test.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe"C:\Users\Admin\AppData\Local\Temp\01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe"C:\Users\Admin\AppData\Local\Temp\01bf13a6e114429aa1a7cc6e8eddc8fb19965bb9832a5197d7724d671aeb33dd.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EAWVM.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svchost" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\test\test.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1452
-
-
-
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138B
MD5527683c48cc4c7190219814c77b72fe0
SHA1d995878a8f4b9824a0508039eeada5376be9a52d
SHA256bbebf3e66136e700d8e3e2e0c8f461cdd9d7e68fe5a18a235afe86344932fb4b
SHA512408a53b240c23fa34153ccc2b2315f28a9741121ecc9b76d50267ee62d78230e65574327369f83c779c781802c0c28f6c578703c01a67de46c3d44f71b814fa6
-
Filesize
1.7MB
MD50470a7229609b76239aa88b5a873434a
SHA162f5859482e0675fc50b1d7c4b61340b69371059
SHA256bb5d896ee618e882a4b63506f590a82f11df2ca949ed5b23b3b3db35b6e8601f
SHA512a1db9e7730f5f08ff9dc97eba53a901459bac50e0ba65ca034b4b56527b565a53a8350fbb8425ee7c7ba4a78c8c7603663a0af52f5b11480a47914aa493a78a7