Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 23:50
Static task
static1
Behavioral task
behavioral1
Sample
354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe
Resource
win7-20241010-en
General
-
Target
354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe
-
Size
520KB
-
MD5
e18ab3843fa32dd1daf0575f3831fb17
-
SHA1
115854eaa8e45adcd9e3a863bd9872349cfe90d3
-
SHA256
354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d
-
SHA512
66f809581db6ee5cdfad8c32391e330e29b72ea51ec47dab0fc978b999ab5b918c63dea58f11e0be11400191e87e939257893bcdffc4f9e22e7b99ff561932e4
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMb4:f9fC3hh29Ya77A90aFtDfT5IMb4
Malware Config
Extracted
darkcomet
PrivateEye
ratblackshades.no-ip.biz:1604
DC_MUTEX-ACC1R98
-
gencode
8GG5LVVGljSF
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 1892 winupd.exe 2316 winupd.exe 4964 winupd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3996 set thread context of 3112 3996 354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe 89 PID 1892 set thread context of 2316 1892 winupd.exe 93 PID 1892 set thread context of 4964 1892 winupd.exe 94 -
resource yara_rule behavioral2/memory/4964-33-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-37-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-38-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-39-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-41-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-40-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-29-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-44-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-45-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-46-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-47-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-48-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-49-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-50-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-51-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-52-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-53-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-54-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-55-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4964-56-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1760 4288 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4288 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4964 winupd.exe Token: SeSecurityPrivilege 4964 winupd.exe Token: SeTakeOwnershipPrivilege 4964 winupd.exe Token: SeLoadDriverPrivilege 4964 winupd.exe Token: SeSystemProfilePrivilege 4964 winupd.exe Token: SeSystemtimePrivilege 4964 winupd.exe Token: SeProfSingleProcessPrivilege 4964 winupd.exe Token: SeIncBasePriorityPrivilege 4964 winupd.exe Token: SeCreatePagefilePrivilege 4964 winupd.exe Token: SeBackupPrivilege 4964 winupd.exe Token: SeRestorePrivilege 4964 winupd.exe Token: SeShutdownPrivilege 4964 winupd.exe Token: SeDebugPrivilege 4964 winupd.exe Token: SeSystemEnvironmentPrivilege 4964 winupd.exe Token: SeChangeNotifyPrivilege 4964 winupd.exe Token: SeRemoteShutdownPrivilege 4964 winupd.exe Token: SeUndockPrivilege 4964 winupd.exe Token: SeManageVolumePrivilege 4964 winupd.exe Token: SeImpersonatePrivilege 4964 winupd.exe Token: SeCreateGlobalPrivilege 4964 winupd.exe Token: 33 4964 winupd.exe Token: 34 4964 winupd.exe Token: 35 4964 winupd.exe Token: 36 4964 winupd.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3996 354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe 3112 354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe 1892 winupd.exe 2316 winupd.exe 4964 winupd.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 3996 wrote to memory of 3112 3996 354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe 89 PID 3996 wrote to memory of 3112 3996 354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe 89 PID 3996 wrote to memory of 3112 3996 354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe 89 PID 3996 wrote to memory of 3112 3996 354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe 89 PID 3996 wrote to memory of 3112 3996 354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe 89 PID 3996 wrote to memory of 3112 3996 354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe 89 PID 3996 wrote to memory of 3112 3996 354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe 89 PID 3996 wrote to memory of 3112 3996 354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe 89 PID 3112 wrote to memory of 1892 3112 354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe 90 PID 3112 wrote to memory of 1892 3112 354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe 90 PID 3112 wrote to memory of 1892 3112 354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe 90 PID 1892 wrote to memory of 2316 1892 winupd.exe 93 PID 1892 wrote to memory of 2316 1892 winupd.exe 93 PID 1892 wrote to memory of 2316 1892 winupd.exe 93 PID 1892 wrote to memory of 2316 1892 winupd.exe 93 PID 1892 wrote to memory of 2316 1892 winupd.exe 93 PID 1892 wrote to memory of 2316 1892 winupd.exe 93 PID 1892 wrote to memory of 2316 1892 winupd.exe 93 PID 1892 wrote to memory of 2316 1892 winupd.exe 93 PID 1892 wrote to memory of 4964 1892 winupd.exe 94 PID 1892 wrote to memory of 4964 1892 winupd.exe 94 PID 1892 wrote to memory of 4964 1892 winupd.exe 94 PID 1892 wrote to memory of 4964 1892 winupd.exe 94 PID 1892 wrote to memory of 4964 1892 winupd.exe 94 PID 1892 wrote to memory of 4964 1892 winupd.exe 94 PID 1892 wrote to memory of 4964 1892 winupd.exe 94 PID 1892 wrote to memory of 4964 1892 winupd.exe 94 PID 2316 wrote to memory of 4288 2316 winupd.exe 95 PID 2316 wrote to memory of 4288 2316 winupd.exe 95 PID 2316 wrote to memory of 4288 2316 winupd.exe 95 PID 2316 wrote to memory of 4288 2316 winupd.exe 95 PID 2316 wrote to memory of 4288 2316 winupd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe"C:\Users\Admin\AppData\Local\Temp\354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe"C:\Users\Admin\AppData\Local\Temp\354e7c77e46144d71b496b4ff182fdc6c55a993a7de7a9f42448754299afc40d.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exeC:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- Gathers network information
PID:4288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 2726⤵
- Program crash
PID:1760
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4964
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4288 -ip 42881⤵PID:2104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD5ddd59a508ba8faf9c76966e2696f54ea
SHA191f01ea44488e8e0e0d8b213b2b931e169814533
SHA2569616dd4156c7a3b44ee942b7a3f45364688f2b623bfd920d8e4b7c4c77bab86b
SHA512f17669d681b3d9a3a275e89135f1a622186834ba924f247bebad4179b69bc087173391ba072166b0351fd551224cad783a52829fb6affa6797b1872689a629f3