Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 08:11
Static task
static1
Behavioral task
behavioral1
Sample
b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe
Resource
win7-20240903-en
General
-
Target
b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe
-
Size
520KB
-
MD5
3ff9c73f165440d7017a076dd9498f00
-
SHA1
b0ac814458edecb71785e05a20eac1df1b23ad26
-
SHA256
b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007
-
SHA512
6f32bd847f46db1dee28b11841d8de7743e4dfe858bc0844da9285d0acdd10ecf8c54d8c73f66c4c309e3ab8206b9885f4b68b334d2f6c4eca225f26a2ec4bf9
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbm:f9fC3hh29Ya77A90aFtDfT5IMbm
Malware Config
Extracted
darkcomet
PrivateEye
ratblackshades.no-ip.biz:1604
DC_MUTEX-ACC1R98
-
gencode
8GG5LVVGljSF
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 2024 winupd.exe 2196 winupd.exe 2720 winupd.exe -
Loads dropped DLL 2 IoCs
pid Process 1324 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe 1324 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\winupd.exe -notray" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2372 set thread context of 1324 2372 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe 30 PID 2024 set thread context of 2196 2024 winupd.exe 32 PID 2024 set thread context of 2720 2024 winupd.exe 33 -
resource yara_rule behavioral1/memory/2720-68-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-67-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-66-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-64-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-75-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-55-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-71-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-69-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-53-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-76-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-81-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-82-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-83-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-84-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-85-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-86-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-87-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-88-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-89-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-90-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-91-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2720-92-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2804 ipconfig.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2592 reg.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2720 winupd.exe Token: SeSecurityPrivilege 2720 winupd.exe Token: SeTakeOwnershipPrivilege 2720 winupd.exe Token: SeLoadDriverPrivilege 2720 winupd.exe Token: SeSystemProfilePrivilege 2720 winupd.exe Token: SeSystemtimePrivilege 2720 winupd.exe Token: SeProfSingleProcessPrivilege 2720 winupd.exe Token: SeIncBasePriorityPrivilege 2720 winupd.exe Token: SeCreatePagefilePrivilege 2720 winupd.exe Token: SeBackupPrivilege 2720 winupd.exe Token: SeRestorePrivilege 2720 winupd.exe Token: SeShutdownPrivilege 2720 winupd.exe Token: SeDebugPrivilege 2720 winupd.exe Token: SeSystemEnvironmentPrivilege 2720 winupd.exe Token: SeChangeNotifyPrivilege 2720 winupd.exe Token: SeRemoteShutdownPrivilege 2720 winupd.exe Token: SeUndockPrivilege 2720 winupd.exe Token: SeManageVolumePrivilege 2720 winupd.exe Token: SeImpersonatePrivilege 2720 winupd.exe Token: SeCreateGlobalPrivilege 2720 winupd.exe Token: 33 2720 winupd.exe Token: 34 2720 winupd.exe Token: 35 2720 winupd.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2372 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe 1324 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe 2024 winupd.exe 2196 winupd.exe 2720 winupd.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1324 2372 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe 30 PID 2372 wrote to memory of 1324 2372 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe 30 PID 2372 wrote to memory of 1324 2372 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe 30 PID 2372 wrote to memory of 1324 2372 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe 30 PID 2372 wrote to memory of 1324 2372 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe 30 PID 2372 wrote to memory of 1324 2372 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe 30 PID 2372 wrote to memory of 1324 2372 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe 30 PID 2372 wrote to memory of 1324 2372 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe 30 PID 2372 wrote to memory of 1324 2372 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe 30 PID 1324 wrote to memory of 2024 1324 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe 31 PID 1324 wrote to memory of 2024 1324 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe 31 PID 1324 wrote to memory of 2024 1324 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe 31 PID 1324 wrote to memory of 2024 1324 b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe 31 PID 2024 wrote to memory of 2196 2024 winupd.exe 32 PID 2024 wrote to memory of 2196 2024 winupd.exe 32 PID 2024 wrote to memory of 2196 2024 winupd.exe 32 PID 2024 wrote to memory of 2196 2024 winupd.exe 32 PID 2024 wrote to memory of 2196 2024 winupd.exe 32 PID 2024 wrote to memory of 2196 2024 winupd.exe 32 PID 2024 wrote to memory of 2196 2024 winupd.exe 32 PID 2024 wrote to memory of 2196 2024 winupd.exe 32 PID 2024 wrote to memory of 2196 2024 winupd.exe 32 PID 2024 wrote to memory of 2720 2024 winupd.exe 33 PID 2024 wrote to memory of 2720 2024 winupd.exe 33 PID 2024 wrote to memory of 2720 2024 winupd.exe 33 PID 2024 wrote to memory of 2720 2024 winupd.exe 33 PID 2024 wrote to memory of 2720 2024 winupd.exe 33 PID 2024 wrote to memory of 2720 2024 winupd.exe 33 PID 2196 wrote to memory of 2804 2196 winupd.exe 34 PID 2196 wrote to memory of 2804 2196 winupd.exe 34 PID 2196 wrote to memory of 2804 2196 winupd.exe 34 PID 2196 wrote to memory of 2804 2196 winupd.exe 34 PID 2196 wrote to memory of 2804 2196 winupd.exe 34 PID 2196 wrote to memory of 2804 2196 winupd.exe 34 PID 2024 wrote to memory of 2720 2024 winupd.exe 33 PID 2024 wrote to memory of 2720 2024 winupd.exe 33 PID 2804 wrote to memory of 2620 2804 ipconfig.exe 36 PID 2804 wrote to memory of 2620 2804 ipconfig.exe 36 PID 2804 wrote to memory of 2620 2804 ipconfig.exe 36 PID 2804 wrote to memory of 2620 2804 ipconfig.exe 36 PID 2620 wrote to memory of 2592 2620 cmd.exe 38 PID 2620 wrote to memory of 2592 2620 cmd.exe 38 PID 2620 wrote to memory of 2592 2620 cmd.exe 38 PID 2620 wrote to memory of 2592 2620 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe"C:\Users\Admin\AppData\Local\Temp\b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe"C:\Users\Admin\AppData\Local\Temp\b3fdd38a2a2283e52257a15180117f5fb6160992069cf14d72da61215ee5c007N.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exeC:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LHVTKUNM.bat" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v WinUpdate /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2592
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5cac890d00365d07b9ca89def17cc3a36
SHA16fa99679ede791c16b5d3e6d243a98e8bbdb7eab
SHA2564f98ddee89760080a5c8a93666d2f5c97be52b741265ef4d1ce9aaebf05f12da
SHA512124dc0b18e13425bde43bcbbe2a99005928e398bffcb458d498aac9e754bc5b92b703270667800876c60b0801343f2de8c6b9a1eebafd80bb4f6d5dc295dd9f1
-
Filesize
520KB
MD51f6162c22d790a27cb2b7009ecbb20d0
SHA15d248084467c93d37a71e63611f4d086ef27a3b6
SHA2563bf11e1e005a146fe80b92b772b945cff9ab9fbdf37e44839353ed499ffff5cb
SHA5124bce69c7d57eeda706fb2e8510b24a1b509b45b62395bb9aa2e85ec7c02c867ac4514f812600d4e79b6b91cc8cb77682b4a61ecd77185eb46fdf6dd388f8c91f