Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 01:50
Static task
static1
Behavioral task
behavioral1
Sample
91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe
Resource
win7-20240903-en
General
-
Target
91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe
-
Size
520KB
-
MD5
f5b01a29c59db1cc37d775818d620e00
-
SHA1
5599e81d4c8205e48e8edf26fda9cbe0679e842e
-
SHA256
91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37e
-
SHA512
7d9033145e8edaf751ae8201f34ee92bd51f466e6fb74de74001cd85295906809256ad48b730ef3f125863a5a676fcd1bd6e3b08a27a57eda0048782afe6b065
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbt:f9fC3hh29Ya77A90aFtDfT5IMbt
Malware Config
Extracted
darkcomet
PrivateEye
ratblackshades.no-ip.biz:1604
DC_MUTEX-ACC1R98
-
gencode
8GG5LVVGljSF
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 2332 winupd.exe 2812 winupd.exe 2036 winupd.exe -
Loads dropped DLL 4 IoCs
pid Process 1348 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 1348 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 2332 winupd.exe 2332 winupd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\winupd.exe -notray" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2504 set thread context of 1348 2504 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 30 PID 2332 set thread context of 2812 2332 winupd.exe 32 PID 2332 set thread context of 2036 2332 winupd.exe 33 -
resource yara_rule behavioral1/memory/2036-58-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-64-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-62-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-73-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-76-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-78-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-77-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-75-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-74-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-54-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-52-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-83-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-84-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-85-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-86-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-87-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-88-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-89-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-90-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-91-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-92-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-93-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-94-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2036-95-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1988 ipconfig.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 684 reg.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2036 winupd.exe Token: SeSecurityPrivilege 2036 winupd.exe Token: SeTakeOwnershipPrivilege 2036 winupd.exe Token: SeLoadDriverPrivilege 2036 winupd.exe Token: SeSystemProfilePrivilege 2036 winupd.exe Token: SeSystemtimePrivilege 2036 winupd.exe Token: SeProfSingleProcessPrivilege 2036 winupd.exe Token: SeIncBasePriorityPrivilege 2036 winupd.exe Token: SeCreatePagefilePrivilege 2036 winupd.exe Token: SeBackupPrivilege 2036 winupd.exe Token: SeRestorePrivilege 2036 winupd.exe Token: SeShutdownPrivilege 2036 winupd.exe Token: SeDebugPrivilege 2036 winupd.exe Token: SeSystemEnvironmentPrivilege 2036 winupd.exe Token: SeChangeNotifyPrivilege 2036 winupd.exe Token: SeRemoteShutdownPrivilege 2036 winupd.exe Token: SeUndockPrivilege 2036 winupd.exe Token: SeManageVolumePrivilege 2036 winupd.exe Token: SeImpersonatePrivilege 2036 winupd.exe Token: SeCreateGlobalPrivilege 2036 winupd.exe Token: 33 2036 winupd.exe Token: 34 2036 winupd.exe Token: 35 2036 winupd.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2504 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 1348 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 2332 winupd.exe 2812 winupd.exe 2036 winupd.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2504 wrote to memory of 1348 2504 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 30 PID 2504 wrote to memory of 1348 2504 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 30 PID 2504 wrote to memory of 1348 2504 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 30 PID 2504 wrote to memory of 1348 2504 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 30 PID 2504 wrote to memory of 1348 2504 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 30 PID 2504 wrote to memory of 1348 2504 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 30 PID 2504 wrote to memory of 1348 2504 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 30 PID 2504 wrote to memory of 1348 2504 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 30 PID 2504 wrote to memory of 1348 2504 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 30 PID 1348 wrote to memory of 2332 1348 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 31 PID 1348 wrote to memory of 2332 1348 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 31 PID 1348 wrote to memory of 2332 1348 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 31 PID 1348 wrote to memory of 2332 1348 91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe 31 PID 2332 wrote to memory of 2812 2332 winupd.exe 32 PID 2332 wrote to memory of 2812 2332 winupd.exe 32 PID 2332 wrote to memory of 2812 2332 winupd.exe 32 PID 2332 wrote to memory of 2812 2332 winupd.exe 32 PID 2332 wrote to memory of 2812 2332 winupd.exe 32 PID 2332 wrote to memory of 2812 2332 winupd.exe 32 PID 2332 wrote to memory of 2812 2332 winupd.exe 32 PID 2332 wrote to memory of 2812 2332 winupd.exe 32 PID 2332 wrote to memory of 2812 2332 winupd.exe 32 PID 2332 wrote to memory of 2036 2332 winupd.exe 33 PID 2332 wrote to memory of 2036 2332 winupd.exe 33 PID 2332 wrote to memory of 2036 2332 winupd.exe 33 PID 2332 wrote to memory of 2036 2332 winupd.exe 33 PID 2332 wrote to memory of 2036 2332 winupd.exe 33 PID 2332 wrote to memory of 2036 2332 winupd.exe 33 PID 2332 wrote to memory of 2036 2332 winupd.exe 33 PID 2332 wrote to memory of 2036 2332 winupd.exe 33 PID 2812 wrote to memory of 1988 2812 winupd.exe 34 PID 2812 wrote to memory of 1988 2812 winupd.exe 34 PID 2812 wrote to memory of 1988 2812 winupd.exe 34 PID 2812 wrote to memory of 1988 2812 winupd.exe 34 PID 2812 wrote to memory of 1988 2812 winupd.exe 34 PID 2812 wrote to memory of 1988 2812 winupd.exe 34 PID 1988 wrote to memory of 3024 1988 ipconfig.exe 36 PID 1988 wrote to memory of 3024 1988 ipconfig.exe 36 PID 1988 wrote to memory of 3024 1988 ipconfig.exe 36 PID 1988 wrote to memory of 3024 1988 ipconfig.exe 36 PID 3024 wrote to memory of 684 3024 cmd.exe 38 PID 3024 wrote to memory of 684 3024 cmd.exe 38 PID 3024 wrote to memory of 684 3024 cmd.exe 38 PID 3024 wrote to memory of 684 3024 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe"C:\Users\Admin\AppData\Local\Temp\91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe"C:\Users\Admin\AppData\Local\Temp\91e88bb385b5c2f85958df87943a1962b5b325f6f9083b5aaf42980e1980c37eN.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exeC:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\AJWSBVXL.bat" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v WinUpdate /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:684
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2036
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5cac890d00365d07b9ca89def17cc3a36
SHA16fa99679ede791c16b5d3e6d243a98e8bbdb7eab
SHA2564f98ddee89760080a5c8a93666d2f5c97be52b741265ef4d1ce9aaebf05f12da
SHA512124dc0b18e13425bde43bcbbe2a99005928e398bffcb458d498aac9e754bc5b92b703270667800876c60b0801343f2de8c6b9a1eebafd80bb4f6d5dc295dd9f1
-
Filesize
520KB
MD5679b647d18f9f6e8e35824f0d53d10c1
SHA1ba221f9d330a66f96a9f4d521aae340cd505c9cb
SHA2563bc92493e73e77074deb1df39a65ee3e76bc5e8e90c262a5fd12af8acb8c1e73
SHA51256cadbe19f1427943a93263df55be599f1a8abd3d46be86530a3bc3027a655ce8490d356cd7e26a4dd7d5fa942c1f1edab4ca19645227737ed091006f6963749