Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 13:04
Static task
static1
Behavioral task
behavioral1
Sample
pokerhackV2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
pokerhackV2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
pokerhackdataV2.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
pokerhackdataV2.dll
Resource
win10v2004-20241007-en
General
-
Target
pokerhackV2.exe
-
Size
1.2MB
-
MD5
10088b6ff3ee1aafb4a541cc8782719e
-
SHA1
961bfdba4072ef020046f2f8d12140946632ec1d
-
SHA256
e3c92b8dc88f341dc0c891935455ab602383c7fdd1fadf6cdad7bbc1940f0eac
-
SHA512
f22058d920c671b24c17a7072f018b242cd847aeab34816ae087dade4d4c3c42183658ba5b54ab2b632f22608a4112c0c656f38cc6f56cdfc5df148bc252e0bb
-
SSDEEP
24576:+OXundQ410NuvNb0TSQoPHZEWyGVUeu7t0e2dA1tfVsjKecr9yiHaLwa:3X2510NEaM5GTf7VHiw
Malware Config
Extracted
darkcomet
Guest16
h4ck3d.no-ip.biz:1604
DC_MUTEX-U7QW2L5
-
gencode
ZEXXhn2CQy5v
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run pokerhackV2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run pokerhackV2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\TaskMgr = "C:\\Users\\Admin\\AppData\\Local\\TaskMgr.exe" pokerhackV2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\TaskMgr = "C:\\Users\\Admin\\AppData\\Local\\TaskMgr.exe" pokerhackV2.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TaskMgr = "C:\\Users\\Admin\\AppData\\Roaming\\TaskMgr.exe" pokerhackV2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\TaskMgr = "C:\\Users\\Admin\\AppData\\Roaming\\TaskMgr.exe" pokerhackV2.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2940 set thread context of 2880 2940 pokerhackV2.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pokerhackV2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2940 pokerhackV2.exe 2940 pokerhackV2.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2940 pokerhackV2.exe Token: SeIncreaseQuotaPrivilege 2880 vbc.exe Token: SeSecurityPrivilege 2880 vbc.exe Token: SeTakeOwnershipPrivilege 2880 vbc.exe Token: SeLoadDriverPrivilege 2880 vbc.exe Token: SeSystemProfilePrivilege 2880 vbc.exe Token: SeSystemtimePrivilege 2880 vbc.exe Token: SeProfSingleProcessPrivilege 2880 vbc.exe Token: SeIncBasePriorityPrivilege 2880 vbc.exe Token: SeCreatePagefilePrivilege 2880 vbc.exe Token: SeBackupPrivilege 2880 vbc.exe Token: SeRestorePrivilege 2880 vbc.exe Token: SeShutdownPrivilege 2880 vbc.exe Token: SeDebugPrivilege 2880 vbc.exe Token: SeSystemEnvironmentPrivilege 2880 vbc.exe Token: SeChangeNotifyPrivilege 2880 vbc.exe Token: SeRemoteShutdownPrivilege 2880 vbc.exe Token: SeUndockPrivilege 2880 vbc.exe Token: SeManageVolumePrivilege 2880 vbc.exe Token: SeImpersonatePrivilege 2880 vbc.exe Token: SeCreateGlobalPrivilege 2880 vbc.exe Token: 33 2880 vbc.exe Token: 34 2880 vbc.exe Token: 35 2880 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2880 vbc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2880 2940 pokerhackV2.exe 30 PID 2940 wrote to memory of 2880 2940 pokerhackV2.exe 30 PID 2940 wrote to memory of 2880 2940 pokerhackV2.exe 30 PID 2940 wrote to memory of 2880 2940 pokerhackV2.exe 30 PID 2940 wrote to memory of 2880 2940 pokerhackV2.exe 30 PID 2940 wrote to memory of 2880 2940 pokerhackV2.exe 30 PID 2940 wrote to memory of 2880 2940 pokerhackV2.exe 30 PID 2940 wrote to memory of 2880 2940 pokerhackV2.exe 30 PID 2940 wrote to memory of 2880 2940 pokerhackV2.exe 30 PID 2940 wrote to memory of 2880 2940 pokerhackV2.exe 30 PID 2940 wrote to memory of 2880 2940 pokerhackV2.exe 30 PID 2940 wrote to memory of 2880 2940 pokerhackV2.exe 30 PID 2940 wrote to memory of 2880 2940 pokerhackV2.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\pokerhackV2.exe"C:\Users\Admin\AppData\Local\Temp\pokerhackV2.exe"1⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2880
-