Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 00:41
Static task
static1
Behavioral task
behavioral1
Sample
Updater v6.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Updater v6.exe
Resource
win10v2004-20241007-en
General
-
Target
Updater v6.exe
-
Size
1.2MB
-
MD5
526417d194e22959c24294801abb2e33
-
SHA1
9a6fbf14d67c8abf76cf44912aecb29d39210a8e
-
SHA256
ac8efb58fe4930bbc25f1b33810a645d6801734de0fa35459f536e0ca3be4121
-
SHA512
db5598e271f47ad7e53565ef919a7644423fc665a70aa1d15ea08907ffc57d638e8dd8b011ab1616d0179e8ce35ea93701a6a3a83b48cb5c0099c0733acb61db
-
SSDEEP
12288:3Vkjh4MhQE2b+MI4VTsdwWsHKawV2Heh8V0qTvOoAz+vNWsIYdXZbWXeSAQdprQF:ymMiE2ylsLw+zNGoxEAXZbWvR2Y8
Malware Config
Extracted
darkcomet
Deception <3
Client.zapto.org:4755
DC_MUTEX-VKQUW4X
-
InstallPath
SystemFiles\Service.exe
-
gencode
dbUxqdHQGGGz
-
install
true
-
offline_keylogger
true
-
password
xt8JMnrDfXuD55K4
-
persistence
false
-
reg_key
Service
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\SystemFiles\\Service.exe" Service.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts Service.exe -
Executes dropped EXE 2 IoCs
pid Process 2860 Service.exe 2996 Service.exe -
Loads dropped DLL 2 IoCs
pid Process 2860 Service.exe 2860 Service.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service = "C:\\Windows\\system32\\SystemFiles\\Service.exe" Service.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\SystemFiles\Service.exe Service.exe File opened for modification C:\Windows\SysWOW64\SystemFiles\Service.exe Service.exe File opened for modification C:\Windows\SysWOW64\SystemFiles\ Service.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2860 Service.exe Token: SeSecurityPrivilege 2860 Service.exe Token: SeTakeOwnershipPrivilege 2860 Service.exe Token: SeLoadDriverPrivilege 2860 Service.exe Token: SeSystemProfilePrivilege 2860 Service.exe Token: SeSystemtimePrivilege 2860 Service.exe Token: SeProfSingleProcessPrivilege 2860 Service.exe Token: SeIncBasePriorityPrivilege 2860 Service.exe Token: SeCreatePagefilePrivilege 2860 Service.exe Token: SeBackupPrivilege 2860 Service.exe Token: SeRestorePrivilege 2860 Service.exe Token: SeShutdownPrivilege 2860 Service.exe Token: SeDebugPrivilege 2860 Service.exe Token: SeSystemEnvironmentPrivilege 2860 Service.exe Token: SeChangeNotifyPrivilege 2860 Service.exe Token: SeRemoteShutdownPrivilege 2860 Service.exe Token: SeUndockPrivilege 2860 Service.exe Token: SeManageVolumePrivilege 2860 Service.exe Token: SeImpersonatePrivilege 2860 Service.exe Token: SeCreateGlobalPrivilege 2860 Service.exe Token: 33 2860 Service.exe Token: 34 2860 Service.exe Token: 35 2860 Service.exe Token: SeIncreaseQuotaPrivilege 2996 Service.exe Token: SeSecurityPrivilege 2996 Service.exe Token: SeTakeOwnershipPrivilege 2996 Service.exe Token: SeLoadDriverPrivilege 2996 Service.exe Token: SeSystemProfilePrivilege 2996 Service.exe Token: SeSystemtimePrivilege 2996 Service.exe Token: SeProfSingleProcessPrivilege 2996 Service.exe Token: SeIncBasePriorityPrivilege 2996 Service.exe Token: SeCreatePagefilePrivilege 2996 Service.exe Token: SeBackupPrivilege 2996 Service.exe Token: SeRestorePrivilege 2996 Service.exe Token: SeShutdownPrivilege 2996 Service.exe Token: SeDebugPrivilege 2996 Service.exe Token: SeSystemEnvironmentPrivilege 2996 Service.exe Token: SeChangeNotifyPrivilege 2996 Service.exe Token: SeRemoteShutdownPrivilege 2996 Service.exe Token: SeUndockPrivilege 2996 Service.exe Token: SeManageVolumePrivilege 2996 Service.exe Token: SeImpersonatePrivilege 2996 Service.exe Token: SeCreateGlobalPrivilege 2996 Service.exe Token: 33 2996 Service.exe Token: 34 2996 Service.exe Token: 35 2996 Service.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2996 Service.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2860 2800 Updater v6.exe 31 PID 2800 wrote to memory of 2860 2800 Updater v6.exe 31 PID 2800 wrote to memory of 2860 2800 Updater v6.exe 31 PID 2800 wrote to memory of 2860 2800 Updater v6.exe 31 PID 2860 wrote to memory of 2996 2860 Service.exe 32 PID 2860 wrote to memory of 2996 2860 Service.exe 32 PID 2860 wrote to memory of 2996 2860 Service.exe 32 PID 2860 wrote to memory of 2996 2860 Service.exe 32 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33 PID 2996 wrote to memory of 2656 2996 Service.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Updater v6.exe"C:\Users\Admin\AppData\Local\Temp\Updater v6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\Service.exeC:\Users\Admin\AppData\Local\Temp\Service.exe2⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\SystemFiles\Service.exe"C:\Windows\system32\SystemFiles\Service.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\notepad.exenotepad4⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
659KB
MD512e42a6705abed7a4c58616f2d6db299
SHA1e6f13cf121a8c94ff58052f7a9e1d025acf1d2ff
SHA2563a8568d93c7d5d0ec3e5dcb267ce6b18209fb1eb0e4892a76f9860ddcda7521c
SHA512c885a7687af1c0be4584fbf050db20bae8f6b03aab3ccf56b77f6c7a1978253ff381861352b3fb89ae4aa336dabddbc529b865a3676142d00c1e94cdf1cd1f68