Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe
Resource
win7-20240903-en
General
-
Target
9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe
-
Size
1.8MB
-
MD5
7634e21993a82b8bf1906df9c83dcfb6
-
SHA1
3bff833bf7d77465194ed7759c455861d5e9ee75
-
SHA256
9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a
-
SHA512
b86a09b32aac425e601783fe38c45df2afe2c2564683e5bffbe3d051374260de675b6ac38ede9b469de511cc19b7e08425ebd7571c4a43ce400f058fb1663e89
-
SSDEEP
24576:ZPuNKEpMtcGnPblbg2CMumABe1vUmeuVF4pNq2cXsuzE6yRpxdOe0siOEC:FE9GzWk8epJeOFu01jyLDOediOx
Malware Config
Extracted
darkcomet
BMX
criticaljack.no-ip.org:1614
DC_MUTEX-ZU6CR1Y
-
InstallPath
WIN32\nginx.exe
-
gencode
pNqRHoH8DwAw
-
install
true
-
offline_keylogger
true
-
password
zimbaouais24
-
persistence
true
-
reg_key
Java Platform SE Auto Updater
Signatures
-
Darkcomet family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java Platform SE Auto Updater.vbs nginx.exe -
Executes dropped EXE 3 IoCs
pid Process 4840 MXNRGD.exe 4304 nginx.exe 3108 nginx.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Platform SE Auto Updater = "C:\\Users\\Admin\\AppData\\Roaming\\WIN32\\nginx.exe" nginx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4304 set thread context of 3108 4304 nginx.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MXNRGD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nginx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nginx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\WIN32\nginx.exe:ZoneIdentifier 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3568 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe 3568 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe 3568 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe 3568 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe 3568 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe 3568 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe 3568 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe 3568 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe 3568 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe 3568 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe 4304 nginx.exe 4304 nginx.exe 4304 nginx.exe 4304 nginx.exe 4304 nginx.exe 4304 nginx.exe 4304 nginx.exe 4304 nginx.exe 4304 nginx.exe 4304 nginx.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3108 nginx.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4304 nginx.exe 4304 nginx.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3108 nginx.exe Token: SeSecurityPrivilege 3108 nginx.exe Token: SeTakeOwnershipPrivilege 3108 nginx.exe Token: SeLoadDriverPrivilege 3108 nginx.exe Token: SeSystemProfilePrivilege 3108 nginx.exe Token: SeSystemtimePrivilege 3108 nginx.exe Token: SeProfSingleProcessPrivilege 3108 nginx.exe Token: SeIncBasePriorityPrivilege 3108 nginx.exe Token: SeCreatePagefilePrivilege 3108 nginx.exe Token: SeBackupPrivilege 3108 nginx.exe Token: SeRestorePrivilege 3108 nginx.exe Token: SeShutdownPrivilege 3108 nginx.exe Token: SeDebugPrivilege 3108 nginx.exe Token: SeSystemEnvironmentPrivilege 3108 nginx.exe Token: SeChangeNotifyPrivilege 3108 nginx.exe Token: SeRemoteShutdownPrivilege 3108 nginx.exe Token: SeUndockPrivilege 3108 nginx.exe Token: SeManageVolumePrivilege 3108 nginx.exe Token: SeImpersonatePrivilege 3108 nginx.exe Token: SeCreateGlobalPrivilege 3108 nginx.exe Token: 33 3108 nginx.exe Token: 34 3108 nginx.exe Token: 35 3108 nginx.exe Token: 36 3108 nginx.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3108 nginx.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 3568 wrote to memory of 4840 3568 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe 82 PID 3568 wrote to memory of 4840 3568 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe 82 PID 3568 wrote to memory of 4840 3568 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe 82 PID 3568 wrote to memory of 4304 3568 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe 83 PID 3568 wrote to memory of 4304 3568 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe 83 PID 3568 wrote to memory of 4304 3568 9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe 83 PID 4304 wrote to memory of 3108 4304 nginx.exe 84 PID 4304 wrote to memory of 3108 4304 nginx.exe 84 PID 4304 wrote to memory of 3108 4304 nginx.exe 84 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85 PID 3108 wrote to memory of 2980 3108 nginx.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe"C:\Users\Admin\AppData\Local\Temp\9054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\MXNRGD.exe"C:\Users\Admin\AppData\Local\Temp\MXNRGD.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4840
-
-
C:\Users\Admin\AppData\Roaming\WIN32\nginx.exe"C:\Users\Admin\AppData\Roaming\WIN32\nginx.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Roaming\WIN32\nginx.exe"C:\Users\Admin\AppData\Roaming\WIN32\nginx.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\notepad.exenotepad4⤵
- System Location Discovery: System Language Discovery
PID:2980
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD50af9a07c51deb2c2caa4ee642d7cebf4
SHA1ef0edbad0416053a777f829ca50172871a9a93b7
SHA25648219151ee425b54be4301f9fa57adc708c5aa66bd82e00356fa421a5a621fad
SHA5126c4ad23814b9498cac7c289d76b7f00d3c0381203e4e7729bf18ad3763be2fc7d4423f0f1a8c88d4b8df20f3dda99fdc513f57c0f9dea5534fa912194b375505
-
Filesize
1.8MB
MD57634e21993a82b8bf1906df9c83dcfb6
SHA13bff833bf7d77465194ed7759c455861d5e9ee75
SHA2569054fd07eff52349a740bc6202cc6957496d1a70cbe5cb006b40d72db0ba847a
SHA512b86a09b32aac425e601783fe38c45df2afe2c2564683e5bffbe3d051374260de675b6ac38ede9b469de511cc19b7e08425ebd7571c4a43ce400f058fb1663e89