Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 20:11
Static task
static1
Behavioral task
behavioral1
Sample
Steam Game ADDER.exe
Resource
win7-20240729-en
General
-
Target
Steam Game ADDER.exe
-
Size
1006KB
-
MD5
4e815593f9386328e40ac7e7cc15c345
-
SHA1
21912cfdce6013d90efd54e5e90929d00df5a701
-
SHA256
174f2e1b5cace1731f1d8ac0e991e340498f4ad68dbc7b16a4ceb7ce7b2ead9e
-
SHA512
3eae72b62108f75a8b9a82d81463323482218726bf658412ecdab5e4334be44142001824b7cf6b10618147c33af9d8e1dbb1fa483e1e6116c7438a5bab496d39
-
SSDEEP
12288:utPhthkJeWix0eaQzQK6yNwFeX+Gsp2NoAkjJuDh3WUdrAVNQDJ/tt2:cQeWR6NwEXA2NoAkahdrAVNQt/tE
Malware Config
Extracted
darkcomet
Guest16
achlys.serveblog.net:9431
DC_MUTEX-2968FX2
-
gencode
jWVVRsyYt9LN
-
install
false
-
offline_keylogger
true
-
password
ajejas
-
persistence
false
Signatures
-
Darkcomet family
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbc = "C:\\Users\\Admin\\AppData\\Roaming\\vbc.exe" Steam Game ADDER.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2188 set thread context of 2376 2188 Steam Game ADDER.exe 30 -
resource yara_rule behavioral1/memory/2376-9-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-13-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-6-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-4-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-10-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-16-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-15-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-14-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-18-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-19-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-20-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-21-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-22-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-23-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-24-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-25-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-26-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-27-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-28-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-29-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-30-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-31-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-32-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-33-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-34-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-35-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-36-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2376-37-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Steam Game ADDER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2376 vbc.exe Token: SeSecurityPrivilege 2376 vbc.exe Token: SeTakeOwnershipPrivilege 2376 vbc.exe Token: SeLoadDriverPrivilege 2376 vbc.exe Token: SeSystemProfilePrivilege 2376 vbc.exe Token: SeSystemtimePrivilege 2376 vbc.exe Token: SeProfSingleProcessPrivilege 2376 vbc.exe Token: SeIncBasePriorityPrivilege 2376 vbc.exe Token: SeCreatePagefilePrivilege 2376 vbc.exe Token: SeBackupPrivilege 2376 vbc.exe Token: SeRestorePrivilege 2376 vbc.exe Token: SeShutdownPrivilege 2376 vbc.exe Token: SeDebugPrivilege 2376 vbc.exe Token: SeSystemEnvironmentPrivilege 2376 vbc.exe Token: SeChangeNotifyPrivilege 2376 vbc.exe Token: SeRemoteShutdownPrivilege 2376 vbc.exe Token: SeUndockPrivilege 2376 vbc.exe Token: SeManageVolumePrivilege 2376 vbc.exe Token: SeImpersonatePrivilege 2376 vbc.exe Token: SeCreateGlobalPrivilege 2376 vbc.exe Token: 33 2376 vbc.exe Token: 34 2376 vbc.exe Token: 35 2376 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2376 vbc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2376 2188 Steam Game ADDER.exe 30 PID 2188 wrote to memory of 2376 2188 Steam Game ADDER.exe 30 PID 2188 wrote to memory of 2376 2188 Steam Game ADDER.exe 30 PID 2188 wrote to memory of 2376 2188 Steam Game ADDER.exe 30 PID 2188 wrote to memory of 2376 2188 Steam Game ADDER.exe 30 PID 2188 wrote to memory of 2376 2188 Steam Game ADDER.exe 30 PID 2188 wrote to memory of 2376 2188 Steam Game ADDER.exe 30 PID 2188 wrote to memory of 2376 2188 Steam Game ADDER.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Steam Game ADDER.exe"C:\Users\Admin\AppData\Local\Temp\Steam Game ADDER.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2376
-