Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 02:21
Behavioral task
behavioral1
Sample
c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe
Resource
win7-20240903-en
General
-
Target
c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe
-
Size
559KB
-
MD5
db86ff7953f88e27c9deba1a7604d890
-
SHA1
1d750e3931966e8d569322a6cfba6d80dd045c72
-
SHA256
c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585
-
SHA512
e447c0cbdac96961f0f93a4349c27783b1cb920c785e5f6897965ea0a9caa1d19dce41a62128117262103258e0f15e8e41ec540999208c5fb6b1ecdb8fceee20
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoS3:COEzCFaCpAYJbwzOqPUlvOsmi9c8SlN
Malware Config
Signatures
-
Darkcomet family
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate mcsft.exe -
Executes dropped EXE 2 IoCs
pid Process 1336 mcsft.exe 1516 mcsft.exe -
Loads dropped DLL 6 IoCs
pid Process 1876 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 1876 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 1876 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 1876 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 1876 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 1336 mcsft.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mcrosoft = "C:\\Users\\Admin\\AppData\\Roaming\\mcsft.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1336 set thread context of 1516 1336 mcsft.exe 34 -
resource yara_rule behavioral1/memory/1876-0-0x0000000000400000-0x00000000007C8000-memory.dmp upx behavioral1/files/0x00080000000193d9-27.dat upx behavioral1/memory/1336-46-0x0000000000400000-0x00000000007C8000-memory.dmp upx behavioral1/memory/1876-48-0x0000000000400000-0x00000000007C8000-memory.dmp upx behavioral1/memory/1516-54-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1516-57-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1336-59-0x0000000000400000-0x00000000007C8000-memory.dmp upx behavioral1/memory/1516-56-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1516-60-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1516-62-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1516-61-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1516-63-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1516-66-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1516-65-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1516-64-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1516-67-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1516-70-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1516-72-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1516-74-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1516-76-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1516-78-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcsft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcsft.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mcsft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mcsft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mcsft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier mcsft.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier mcsft.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1516 mcsft.exe Token: SeSecurityPrivilege 1516 mcsft.exe Token: SeTakeOwnershipPrivilege 1516 mcsft.exe Token: SeLoadDriverPrivilege 1516 mcsft.exe Token: SeSystemProfilePrivilege 1516 mcsft.exe Token: SeSystemtimePrivilege 1516 mcsft.exe Token: SeProfSingleProcessPrivilege 1516 mcsft.exe Token: SeIncBasePriorityPrivilege 1516 mcsft.exe Token: SeCreatePagefilePrivilege 1516 mcsft.exe Token: SeBackupPrivilege 1516 mcsft.exe Token: SeRestorePrivilege 1516 mcsft.exe Token: SeShutdownPrivilege 1516 mcsft.exe Token: SeDebugPrivilege 1516 mcsft.exe Token: SeSystemEnvironmentPrivilege 1516 mcsft.exe Token: SeChangeNotifyPrivilege 1516 mcsft.exe Token: SeRemoteShutdownPrivilege 1516 mcsft.exe Token: SeUndockPrivilege 1516 mcsft.exe Token: SeManageVolumePrivilege 1516 mcsft.exe Token: SeImpersonatePrivilege 1516 mcsft.exe Token: SeCreateGlobalPrivilege 1516 mcsft.exe Token: 33 1516 mcsft.exe Token: 34 1516 mcsft.exe Token: 35 1516 mcsft.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1876 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 1336 mcsft.exe 1516 mcsft.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2676 1876 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 30 PID 1876 wrote to memory of 2676 1876 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 30 PID 1876 wrote to memory of 2676 1876 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 30 PID 1876 wrote to memory of 2676 1876 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 30 PID 2676 wrote to memory of 2580 2676 cmd.exe 32 PID 2676 wrote to memory of 2580 2676 cmd.exe 32 PID 2676 wrote to memory of 2580 2676 cmd.exe 32 PID 2676 wrote to memory of 2580 2676 cmd.exe 32 PID 1876 wrote to memory of 1336 1876 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 33 PID 1876 wrote to memory of 1336 1876 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 33 PID 1876 wrote to memory of 1336 1876 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 33 PID 1876 wrote to memory of 1336 1876 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 33 PID 1336 wrote to memory of 1516 1336 mcsft.exe 34 PID 1336 wrote to memory of 1516 1336 mcsft.exe 34 PID 1336 wrote to memory of 1516 1336 mcsft.exe 34 PID 1336 wrote to memory of 1516 1336 mcsft.exe 34 PID 1336 wrote to memory of 1516 1336 mcsft.exe 34 PID 1336 wrote to memory of 1516 1336 mcsft.exe 34 PID 1336 wrote to memory of 1516 1336 mcsft.exe 34 PID 1336 wrote to memory of 1516 1336 mcsft.exe 34 PID 1336 wrote to memory of 1516 1336 mcsft.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe"C:\Users\Admin\AppData\Local\Temp\c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OxgYD.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Mcrosoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\mcsft.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2580
-
-
-
C:\Users\Admin\AppData\Roaming\mcsft.exe"C:\Users\Admin\AppData\Roaming\mcsft.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Roaming\mcsft.exeC:\Users\Admin\AppData\Roaming\mcsft.exe3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1516
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135B
MD5a5feca573884d76f559b996d45e8ad9a
SHA10e81a993f3af4e31d60653dc2513186f0495f1c8
SHA256c98e20d46d6465febb5d29cfab51241521ea5d6cd621f5e18b9b7d6fbfac3f0f
SHA512a9239648b5f15eac4d4151b6e1bdc81065eeaeb101404c2a0126f03bc87f1e6a57206bfa07a44379e9d3bba889e4497a9991ff41fb109099b01512df3dc3cbda
-
Filesize
559KB
MD5264491415cd0e56bd2d9147ee9b93a2d
SHA198a1836834aae47b5ebf9c26c1e38cd9ab3323d7
SHA2565fd3339a2769dc1c4a71a6f66fab39a02710e4da30bd40392cefb7e0eba3ba4e
SHA5121af85fc686cf6933bf10de9358333a0995b554958e663e3950be895c32d1d344278eea8ab5b8b0815a7477ee868ef21eb82e61394a9c31a0dc424bb08aa9b9b5