Analysis
-
max time kernel
112s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 02:21
Behavioral task
behavioral1
Sample
c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe
Resource
win7-20240903-en
General
-
Target
c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe
-
Size
559KB
-
MD5
db86ff7953f88e27c9deba1a7604d890
-
SHA1
1d750e3931966e8d569322a6cfba6d80dd045c72
-
SHA256
c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585
-
SHA512
e447c0cbdac96961f0f93a4349c27783b1cb920c785e5f6897965ea0a9caa1d19dce41a62128117262103258e0f15e8e41ec540999208c5fb6b1ecdb8fceee20
-
SSDEEP
12288:x+xOrozCCYaCphtIYJb6lzOqPpFOblme0pLLsbii9cWDeO7HtoNmKzoS3:COEzCFaCpAYJbwzOqPUlvOsmi9c8SlN
Malware Config
Signatures
-
Darkcomet family
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate mcsft.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe -
Executes dropped EXE 2 IoCs
pid Process 1548 mcsft.exe 5016 mcsft.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mcrosoft = "C:\\Users\\Admin\\AppData\\Roaming\\mcsft.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1548 set thread context of 5016 1548 mcsft.exe 88 -
resource yara_rule behavioral2/memory/3692-0-0x0000000000400000-0x00000000007C8000-memory.dmp upx behavioral2/files/0x0008000000023c72-16.dat upx behavioral2/memory/1548-28-0x0000000000400000-0x00000000007C8000-memory.dmp upx behavioral2/memory/3692-30-0x0000000000400000-0x00000000007C8000-memory.dmp upx behavioral2/memory/5016-33-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5016-35-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5016-37-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5016-40-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1548-38-0x0000000000400000-0x00000000007C8000-memory.dmp upx behavioral2/memory/5016-42-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5016-41-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5016-43-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5016-46-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5016-45-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5016-44-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5016-47-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5016-49-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5016-51-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5016-53-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5016-55-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5016-57-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcsft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcsft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mcsft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mcsft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mcsft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier mcsft.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier mcsft.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 5016 mcsft.exe Token: SeSecurityPrivilege 5016 mcsft.exe Token: SeTakeOwnershipPrivilege 5016 mcsft.exe Token: SeLoadDriverPrivilege 5016 mcsft.exe Token: SeSystemProfilePrivilege 5016 mcsft.exe Token: SeSystemtimePrivilege 5016 mcsft.exe Token: SeProfSingleProcessPrivilege 5016 mcsft.exe Token: SeIncBasePriorityPrivilege 5016 mcsft.exe Token: SeCreatePagefilePrivilege 5016 mcsft.exe Token: SeBackupPrivilege 5016 mcsft.exe Token: SeRestorePrivilege 5016 mcsft.exe Token: SeShutdownPrivilege 5016 mcsft.exe Token: SeDebugPrivilege 5016 mcsft.exe Token: SeSystemEnvironmentPrivilege 5016 mcsft.exe Token: SeChangeNotifyPrivilege 5016 mcsft.exe Token: SeRemoteShutdownPrivilege 5016 mcsft.exe Token: SeUndockPrivilege 5016 mcsft.exe Token: SeManageVolumePrivilege 5016 mcsft.exe Token: SeImpersonatePrivilege 5016 mcsft.exe Token: SeCreateGlobalPrivilege 5016 mcsft.exe Token: 33 5016 mcsft.exe Token: 34 5016 mcsft.exe Token: 35 5016 mcsft.exe Token: 36 5016 mcsft.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3692 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 1548 mcsft.exe 5016 mcsft.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3692 wrote to memory of 3160 3692 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 83 PID 3692 wrote to memory of 3160 3692 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 83 PID 3692 wrote to memory of 3160 3692 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 83 PID 3160 wrote to memory of 2788 3160 cmd.exe 86 PID 3160 wrote to memory of 2788 3160 cmd.exe 86 PID 3160 wrote to memory of 2788 3160 cmd.exe 86 PID 3692 wrote to memory of 1548 3692 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 87 PID 3692 wrote to memory of 1548 3692 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 87 PID 3692 wrote to memory of 1548 3692 c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe 87 PID 1548 wrote to memory of 5016 1548 mcsft.exe 88 PID 1548 wrote to memory of 5016 1548 mcsft.exe 88 PID 1548 wrote to memory of 5016 1548 mcsft.exe 88 PID 1548 wrote to memory of 5016 1548 mcsft.exe 88 PID 1548 wrote to memory of 5016 1548 mcsft.exe 88 PID 1548 wrote to memory of 5016 1548 mcsft.exe 88 PID 1548 wrote to memory of 5016 1548 mcsft.exe 88 PID 1548 wrote to memory of 5016 1548 mcsft.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe"C:\Users\Admin\AppData\Local\Temp\c71e309ec991818efbf96b8087a9554ce01ce1bc72f7f775ef880e2b37ca3585N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yqgTS.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Mcrosoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\mcsft.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2788
-
-
-
C:\Users\Admin\AppData\Roaming\mcsft.exe"C:\Users\Admin\AppData\Roaming\mcsft.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Roaming\mcsft.exeC:\Users\Admin\AppData\Roaming\mcsft.exe3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135B
MD5a5feca573884d76f559b996d45e8ad9a
SHA10e81a993f3af4e31d60653dc2513186f0495f1c8
SHA256c98e20d46d6465febb5d29cfab51241521ea5d6cd621f5e18b9b7d6fbfac3f0f
SHA512a9239648b5f15eac4d4151b6e1bdc81065eeaeb101404c2a0126f03bc87f1e6a57206bfa07a44379e9d3bba889e4497a9991ff41fb109099b01512df3dc3cbda
-
Filesize
559KB
MD542e17b45b2594a9a80a0958127cc1e42
SHA1ffaaac45739ca8d739f4667c74a939ccd9cb6c39
SHA25669bbfc65a7dff4547e6e82dacea56c58ee86a81d04134c3695e844ad99b7257a
SHA5126c08bc92b420d73381e552f006eb10fafb729e32afaf0f9540b2a4395f1462c8703a5724416e8382bc4a84ab0da8ca411b331ed43b2e6eab17c2542be86ac137