Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 13:33
Static task
static1
Behavioral task
behavioral1
Sample
038531d52fb5fc61c11beabcc05b8ae3f0a988cddbfab0db2f1e99bcb3c6757d.exe
Resource
win7-20240903-en
General
-
Target
038531d52fb5fc61c11beabcc05b8ae3f0a988cddbfab0db2f1e99bcb3c6757d.exe
-
Size
4.5MB
-
MD5
ac9e4c837b4617a8f76b8f06f23d3c68
-
SHA1
d210f651d289a8e8b7b984735eb9b0df1b25278d
-
SHA256
038531d52fb5fc61c11beabcc05b8ae3f0a988cddbfab0db2f1e99bcb3c6757d
-
SHA512
45c3714e2b8f828e7b72bffc882801e3682f23bfb2abb5a8685550b710542cad31c1f902d906e32c0f9acb97e14e38da6cd93d171643925543a231adfe90b9b4
-
SSDEEP
49152:VNkIeCY8EHOEoYzTny4X6gO0DA4HlEzD4ft7:d4ft7
Malware Config
Extracted
darkcomet
crypter_t411
milanilou007.ddns.me:1604
DC_MUTEX-92C3TY1
-
gencode
KpEHFrlns92y
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
Processes:
installerfile.exeMINILYRICS02.EXEMINILYRICS02.EXEpid Process 2340 installerfile.exe 2456 MINILYRICS02.EXE 2868 MINILYRICS02.EXE -
Loads dropped DLL 15 IoCs
Processes:
installerfile.exeMINILYRICS02.EXEMINILYRICS02.EXEpid Process 2340 installerfile.exe 2340 installerfile.exe 2340 installerfile.exe 2340 installerfile.exe 2456 MINILYRICS02.EXE 2456 MINILYRICS02.EXE 2456 MINILYRICS02.EXE 2456 MINILYRICS02.EXE 2340 installerfile.exe 2868 MINILYRICS02.EXE 2868 MINILYRICS02.EXE 2868 MINILYRICS02.EXE 2868 MINILYRICS02.EXE 2456 MINILYRICS02.EXE 2868 MINILYRICS02.EXE -
Processes:
resource yara_rule behavioral1/files/0x0007000000012118-7.dat upx behavioral1/memory/2340-9-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/memory/2340-120-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/memory/2340-125-0x0000000000400000-0x0000000000613000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
installerfile.exeMINILYRICS02.EXEMINILYRICS02.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installerfile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MINILYRICS02.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MINILYRICS02.EXE -
NSIS installer 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x0009000000016d47-19.dat nsis_installer_1 -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
MINILYRICS02.EXEMINILYRICS02.EXEpid Process 2868 MINILYRICS02.EXE 2456 MINILYRICS02.EXE -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
038531d52fb5fc61c11beabcc05b8ae3f0a988cddbfab0db2f1e99bcb3c6757d.exeinstallerfile.exedescription pid Process Token: SeDebugPrivilege 2348 038531d52fb5fc61c11beabcc05b8ae3f0a988cddbfab0db2f1e99bcb3c6757d.exe Token: SeIncreaseQuotaPrivilege 2340 installerfile.exe Token: SeSecurityPrivilege 2340 installerfile.exe Token: SeTakeOwnershipPrivilege 2340 installerfile.exe Token: SeLoadDriverPrivilege 2340 installerfile.exe Token: SeSystemProfilePrivilege 2340 installerfile.exe Token: SeSystemtimePrivilege 2340 installerfile.exe Token: SeProfSingleProcessPrivilege 2340 installerfile.exe Token: SeIncBasePriorityPrivilege 2340 installerfile.exe Token: SeCreatePagefilePrivilege 2340 installerfile.exe Token: SeBackupPrivilege 2340 installerfile.exe Token: SeRestorePrivilege 2340 installerfile.exe Token: SeShutdownPrivilege 2340 installerfile.exe Token: SeDebugPrivilege 2340 installerfile.exe Token: SeSystemEnvironmentPrivilege 2340 installerfile.exe Token: SeChangeNotifyPrivilege 2340 installerfile.exe Token: SeRemoteShutdownPrivilege 2340 installerfile.exe Token: SeUndockPrivilege 2340 installerfile.exe Token: SeManageVolumePrivilege 2340 installerfile.exe Token: SeImpersonatePrivilege 2340 installerfile.exe Token: SeCreateGlobalPrivilege 2340 installerfile.exe Token: 33 2340 installerfile.exe Token: 34 2340 installerfile.exe Token: 35 2340 installerfile.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
installerfile.exepid Process 2340 installerfile.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
038531d52fb5fc61c11beabcc05b8ae3f0a988cddbfab0db2f1e99bcb3c6757d.exeinstallerfile.exedescription pid Process procid_target PID 2348 wrote to memory of 2340 2348 038531d52fb5fc61c11beabcc05b8ae3f0a988cddbfab0db2f1e99bcb3c6757d.exe 30 PID 2348 wrote to memory of 2340 2348 038531d52fb5fc61c11beabcc05b8ae3f0a988cddbfab0db2f1e99bcb3c6757d.exe 30 PID 2348 wrote to memory of 2340 2348 038531d52fb5fc61c11beabcc05b8ae3f0a988cddbfab0db2f1e99bcb3c6757d.exe 30 PID 2348 wrote to memory of 2340 2348 038531d52fb5fc61c11beabcc05b8ae3f0a988cddbfab0db2f1e99bcb3c6757d.exe 30 PID 2348 wrote to memory of 2340 2348 038531d52fb5fc61c11beabcc05b8ae3f0a988cddbfab0db2f1e99bcb3c6757d.exe 30 PID 2348 wrote to memory of 2340 2348 038531d52fb5fc61c11beabcc05b8ae3f0a988cddbfab0db2f1e99bcb3c6757d.exe 30 PID 2348 wrote to memory of 2340 2348 038531d52fb5fc61c11beabcc05b8ae3f0a988cddbfab0db2f1e99bcb3c6757d.exe 30 PID 2340 wrote to memory of 2456 2340 installerfile.exe 31 PID 2340 wrote to memory of 2456 2340 installerfile.exe 31 PID 2340 wrote to memory of 2456 2340 installerfile.exe 31 PID 2340 wrote to memory of 2456 2340 installerfile.exe 31 PID 2340 wrote to memory of 2456 2340 installerfile.exe 31 PID 2340 wrote to memory of 2456 2340 installerfile.exe 31 PID 2340 wrote to memory of 2456 2340 installerfile.exe 31 PID 2340 wrote to memory of 2868 2340 installerfile.exe 32 PID 2340 wrote to memory of 2868 2340 installerfile.exe 32 PID 2340 wrote to memory of 2868 2340 installerfile.exe 32 PID 2340 wrote to memory of 2868 2340 installerfile.exe 32 PID 2340 wrote to memory of 2868 2340 installerfile.exe 32 PID 2340 wrote to memory of 2868 2340 installerfile.exe 32 PID 2340 wrote to memory of 2868 2340 installerfile.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\038531d52fb5fc61c11beabcc05b8ae3f0a988cddbfab0db2f1e99bcb3c6757d.exe"C:\Users\Admin\AppData\Local\Temp\038531d52fb5fc61c11beabcc05b8ae3f0a988cddbfab0db2f1e99bcb3c6757d.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\installerfile.exe"C:\Users\Admin\AppData\Local\Temp\installerfile.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\MINILYRICS02.EXE"C:\Users\Admin\AppData\Local\Temp\MINILYRICS02.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\MINILYRICS02.EXE"C:\Users\Admin\AppData\Local\Temp\MINILYRICS02.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54a163c1e8faa4e78b56d25b2366aade5
SHA108a2acb90974547404ed68cbbd5f6670e3492503
SHA256733847379f65033335aefb8ee2ff26a97d2261dc1a7e32af764a879986909108
SHA512c644be8665dceddb987518feeb8af31e313e55003352a6e2525421fefa056670ab3d74fdab683ff2d977780200ccfe48268dedd76a080cce1d05147cfa7a11b7
-
Filesize
785B
MD56e56f023c89ea7930c869514c1c3df6e
SHA1ca80af91b6aea9d89a0ddfbf08f64d14203ecbdf
SHA2567bf32323012c92f989b24d2ad75153f256d0ab44009854fb989b9470ed81d84f
SHA51204b1b46a5506ca38f591b09dd53c384299dedddbbe636fb26c3226e21386a5e19ddb389123d0af7cf444881b7b07384d64dffed4513f4044b1afd79c01dda606
-
Filesize
1.2MB
MD5b300638f24c0673f9734585935fe5767
SHA1feef51aa5c64d785be87c9c1ac4fbbc476e86dee
SHA2568bdeb231f5a78e83ef8851ccbd76c530f8c0c88470da463953d03ed3acb8efea
SHA512a8339d0298685273e77ff0640dd49df3f3da616d744adcd529ca5953900452b1dfe4963b9c7215a2c05e711f90b82839adb44d17098eef17842f57e067c980ad
-
Filesize
27KB
MD5e920530682d8a447f5eff132ead4d869
SHA1d3336dd91694398f93434f4416247c01acb3b81d
SHA256d828c804bdd845d95292038c5d90413b51625378e9df83dec49af70a76880323
SHA5126b0b02fcad48d74be850e9fb3d18c7f3dd76e09e2fd024389a397d51cfaac8b65b2abd83b96b88d23f1a5fbae1b02641d0b947604841d1fbaa6adbb1dd00c03d
-
Filesize
5KB
MD5fbbf9da918557aba6fa6e166a95ee8dd
SHA1abbd02abae00172971a2e9cef62dab3b562f90c7
SHA256dc7daec6f47e63b5d001cd648d40d93c29be6f2c95fe8b212dbb4d94d31cb12d
SHA5120f877a9e5c6eb06374f0f19f92a6ea55b09998c42c67b16db680918e3e0c2023d511893173f76dde60a47ffe916b0d9af09b6255a158fa3e0743dc54d2a35a65