Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 13:19
Static task
static1
Behavioral task
behavioral1
Sample
1348493b6f64887733493d5410611dc0e30a21bb5b0ad75550614b285d8419cfN.exe
Resource
win7-20240903-en
General
-
Target
1348493b6f64887733493d5410611dc0e30a21bb5b0ad75550614b285d8419cfN.exe
-
Size
4.5MB
-
MD5
42915e4c23133dad9b7dfe6e26e59e00
-
SHA1
6f5166b6348536f21e433d4c13fce83d5641de16
-
SHA256
1348493b6f64887733493d5410611dc0e30a21bb5b0ad75550614b285d8419cf
-
SHA512
e5d01879e5713d1a7b076fbb53290a831f7b159b7f418094717babc1552859d947eb55bcc533f4435cac52c29d21809ca7ceef49c199ce36d8525beb1a65c6ef
-
SSDEEP
49152:VNkIeCY8EHOEoYzTny4X6gO0DA4HlEzD4ft:d4ft
Malware Config
Extracted
darkcomet
crypter_t411
milanilou007.ddns.me:1604
DC_MUTEX-92C3TY1
-
gencode
KpEHFrlns92y
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 880 installerfile.exe 2088 MINILYRICS02.EXE 2868 MINILYRICS02.EXE -
Loads dropped DLL 15 IoCs
pid Process 880 installerfile.exe 880 installerfile.exe 880 installerfile.exe 880 installerfile.exe 2088 MINILYRICS02.EXE 2088 MINILYRICS02.EXE 2088 MINILYRICS02.EXE 2088 MINILYRICS02.EXE 880 installerfile.exe 2868 MINILYRICS02.EXE 2868 MINILYRICS02.EXE 2868 MINILYRICS02.EXE 2868 MINILYRICS02.EXE 2088 MINILYRICS02.EXE 2868 MINILYRICS02.EXE -
resource yara_rule behavioral1/files/0x000f0000000139a5-7.dat upx behavioral1/memory/880-12-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/memory/880-119-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/memory/880-122-0x0000000000400000-0x0000000000613000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MINILYRICS02.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installerfile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MINILYRICS02.EXE -
NSIS installer 1 IoCs
resource yara_rule behavioral1/files/0x00080000000173b2-24.dat nsis_installer_1 -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2868 MINILYRICS02.EXE 2088 MINILYRICS02.EXE -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 1224 1348493b6f64887733493d5410611dc0e30a21bb5b0ad75550614b285d8419cfN.exe Token: SeIncreaseQuotaPrivilege 880 installerfile.exe Token: SeSecurityPrivilege 880 installerfile.exe Token: SeTakeOwnershipPrivilege 880 installerfile.exe Token: SeLoadDriverPrivilege 880 installerfile.exe Token: SeSystemProfilePrivilege 880 installerfile.exe Token: SeSystemtimePrivilege 880 installerfile.exe Token: SeProfSingleProcessPrivilege 880 installerfile.exe Token: SeIncBasePriorityPrivilege 880 installerfile.exe Token: SeCreatePagefilePrivilege 880 installerfile.exe Token: SeBackupPrivilege 880 installerfile.exe Token: SeRestorePrivilege 880 installerfile.exe Token: SeShutdownPrivilege 880 installerfile.exe Token: SeDebugPrivilege 880 installerfile.exe Token: SeSystemEnvironmentPrivilege 880 installerfile.exe Token: SeChangeNotifyPrivilege 880 installerfile.exe Token: SeRemoteShutdownPrivilege 880 installerfile.exe Token: SeUndockPrivilege 880 installerfile.exe Token: SeManageVolumePrivilege 880 installerfile.exe Token: SeImpersonatePrivilege 880 installerfile.exe Token: SeCreateGlobalPrivilege 880 installerfile.exe Token: 33 880 installerfile.exe Token: 34 880 installerfile.exe Token: 35 880 installerfile.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 880 installerfile.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1224 wrote to memory of 880 1224 1348493b6f64887733493d5410611dc0e30a21bb5b0ad75550614b285d8419cfN.exe 31 PID 1224 wrote to memory of 880 1224 1348493b6f64887733493d5410611dc0e30a21bb5b0ad75550614b285d8419cfN.exe 31 PID 1224 wrote to memory of 880 1224 1348493b6f64887733493d5410611dc0e30a21bb5b0ad75550614b285d8419cfN.exe 31 PID 1224 wrote to memory of 880 1224 1348493b6f64887733493d5410611dc0e30a21bb5b0ad75550614b285d8419cfN.exe 31 PID 1224 wrote to memory of 880 1224 1348493b6f64887733493d5410611dc0e30a21bb5b0ad75550614b285d8419cfN.exe 31 PID 1224 wrote to memory of 880 1224 1348493b6f64887733493d5410611dc0e30a21bb5b0ad75550614b285d8419cfN.exe 31 PID 1224 wrote to memory of 880 1224 1348493b6f64887733493d5410611dc0e30a21bb5b0ad75550614b285d8419cfN.exe 31 PID 880 wrote to memory of 2088 880 installerfile.exe 32 PID 880 wrote to memory of 2088 880 installerfile.exe 32 PID 880 wrote to memory of 2088 880 installerfile.exe 32 PID 880 wrote to memory of 2088 880 installerfile.exe 32 PID 880 wrote to memory of 2088 880 installerfile.exe 32 PID 880 wrote to memory of 2088 880 installerfile.exe 32 PID 880 wrote to memory of 2088 880 installerfile.exe 32 PID 880 wrote to memory of 2868 880 installerfile.exe 33 PID 880 wrote to memory of 2868 880 installerfile.exe 33 PID 880 wrote to memory of 2868 880 installerfile.exe 33 PID 880 wrote to memory of 2868 880 installerfile.exe 33 PID 880 wrote to memory of 2868 880 installerfile.exe 33 PID 880 wrote to memory of 2868 880 installerfile.exe 33 PID 880 wrote to memory of 2868 880 installerfile.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1348493b6f64887733493d5410611dc0e30a21bb5b0ad75550614b285d8419cfN.exe"C:\Users\Admin\AppData\Local\Temp\1348493b6f64887733493d5410611dc0e30a21bb5b0ad75550614b285d8419cfN.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\installerfile.exe"C:\Users\Admin\AppData\Local\Temp\installerfile.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\MINILYRICS02.EXE"C:\Users\Admin\AppData\Local\Temp\MINILYRICS02.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\MINILYRICS02.EXE"C:\Users\Admin\AppData\Local\Temp\MINILYRICS02.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54a163c1e8faa4e78b56d25b2366aade5
SHA108a2acb90974547404ed68cbbd5f6670e3492503
SHA256733847379f65033335aefb8ee2ff26a97d2261dc1a7e32af764a879986909108
SHA512c644be8665dceddb987518feeb8af31e313e55003352a6e2525421fefa056670ab3d74fdab683ff2d977780200ccfe48268dedd76a080cce1d05147cfa7a11b7
-
Filesize
785B
MD56e56f023c89ea7930c869514c1c3df6e
SHA1ca80af91b6aea9d89a0ddfbf08f64d14203ecbdf
SHA2567bf32323012c92f989b24d2ad75153f256d0ab44009854fb989b9470ed81d84f
SHA51204b1b46a5506ca38f591b09dd53c384299dedddbbe636fb26c3226e21386a5e19ddb389123d0af7cf444881b7b07384d64dffed4513f4044b1afd79c01dda606
-
Filesize
1.2MB
MD5b300638f24c0673f9734585935fe5767
SHA1feef51aa5c64d785be87c9c1ac4fbbc476e86dee
SHA2568bdeb231f5a78e83ef8851ccbd76c530f8c0c88470da463953d03ed3acb8efea
SHA512a8339d0298685273e77ff0640dd49df3f3da616d744adcd529ca5953900452b1dfe4963b9c7215a2c05e711f90b82839adb44d17098eef17842f57e067c980ad
-
Filesize
5KB
MD5fbbf9da918557aba6fa6e166a95ee8dd
SHA1abbd02abae00172971a2e9cef62dab3b562f90c7
SHA256dc7daec6f47e63b5d001cd648d40d93c29be6f2c95fe8b212dbb4d94d31cb12d
SHA5120f877a9e5c6eb06374f0f19f92a6ea55b09998c42c67b16db680918e3e0c2023d511893173f76dde60a47ffe916b0d9af09b6255a158fa3e0743dc54d2a35a65
-
Filesize
27KB
MD5e920530682d8a447f5eff132ead4d869
SHA1d3336dd91694398f93434f4416247c01acb3b81d
SHA256d828c804bdd845d95292038c5d90413b51625378e9df83dec49af70a76880323
SHA5126b0b02fcad48d74be850e9fb3d18c7f3dd76e09e2fd024389a397d51cfaac8b65b2abd83b96b88d23f1a5fbae1b02641d0b947604841d1fbaa6adbb1dd00c03d