Analysis
-
max time kernel
111s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 03:24
Static task
static1
Behavioral task
behavioral1
Sample
1b9e0310ae9b74f532576fd72477ea5b57dc3df05b2929e0e253d75bc2c9e7c7N.exe
Resource
win7-20241010-en
General
-
Target
1b9e0310ae9b74f532576fd72477ea5b57dc3df05b2929e0e253d75bc2c9e7c7N.exe
-
Size
574KB
-
MD5
266e4f27db05b73cb4e2ef9730960120
-
SHA1
094441f06a00b1c898e29087712268a96cfbbf49
-
SHA256
1b9e0310ae9b74f532576fd72477ea5b57dc3df05b2929e0e253d75bc2c9e7c7
-
SHA512
c5cd84f6c14390394c662b3a53bb014424e4b3c1fc6eda8cc915555a77ec07392998cfdcdbd864b4fba747355e66e4dc99cd204ba3ae0ab1db1a291fb1afaa9e
-
SSDEEP
12288:zCyEHAWAdljmJqkC3xMX85FSR2f9A08NIX+Vjwd4G/3z1ET4m3Hdsub/:zFhWAfn22m0eD1GPz8HdxT
Malware Config
Signatures
-
Darkcomet family
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Soundcrd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 1b9e0310ae9b74f532576fd72477ea5b57dc3df05b2929e0e253d75bc2c9e7c7N.exe -
Executes dropped EXE 3 IoCs
pid Process 4160 Soundcrd.exe 1704 Soundcrd.exe 1188 Soundcrd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mcrosoftt = "C:\\Users\\Admin\\AppData\\Roaming\\Soundcrd.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4160 set thread context of 1704 4160 Soundcrd.exe 88 PID 4160 set thread context of 1188 4160 Soundcrd.exe 89 -
resource yara_rule behavioral2/memory/1704-33-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1704-36-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1704-37-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1188-38-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1188-41-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1704-45-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1188-44-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1704-51-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1704-50-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1704-49-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1704-43-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1704-53-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1188-54-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1704-59-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1704-63-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1704-67-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1704-71-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1704-75-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b9e0310ae9b74f532576fd72477ea5b57dc3df05b2929e0e253d75bc2c9e7c7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Soundcrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Soundcrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Soundcrd.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Soundcrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Soundcrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Soundcrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Soundcrd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Soundcrd.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 1188 Soundcrd.exe Token: SeIncreaseQuotaPrivilege 1704 Soundcrd.exe Token: SeSecurityPrivilege 1704 Soundcrd.exe Token: SeTakeOwnershipPrivilege 1704 Soundcrd.exe Token: SeLoadDriverPrivilege 1704 Soundcrd.exe Token: SeSystemProfilePrivilege 1704 Soundcrd.exe Token: SeSystemtimePrivilege 1704 Soundcrd.exe Token: SeProfSingleProcessPrivilege 1704 Soundcrd.exe Token: SeIncBasePriorityPrivilege 1704 Soundcrd.exe Token: SeCreatePagefilePrivilege 1704 Soundcrd.exe Token: SeBackupPrivilege 1704 Soundcrd.exe Token: SeRestorePrivilege 1704 Soundcrd.exe Token: SeShutdownPrivilege 1704 Soundcrd.exe Token: SeDebugPrivilege 1704 Soundcrd.exe Token: SeSystemEnvironmentPrivilege 1704 Soundcrd.exe Token: SeChangeNotifyPrivilege 1704 Soundcrd.exe Token: SeRemoteShutdownPrivilege 1704 Soundcrd.exe Token: SeUndockPrivilege 1704 Soundcrd.exe Token: SeManageVolumePrivilege 1704 Soundcrd.exe Token: SeImpersonatePrivilege 1704 Soundcrd.exe Token: SeCreateGlobalPrivilege 1704 Soundcrd.exe Token: 33 1704 Soundcrd.exe Token: 34 1704 Soundcrd.exe Token: 35 1704 Soundcrd.exe Token: 36 1704 Soundcrd.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2244 1b9e0310ae9b74f532576fd72477ea5b57dc3df05b2929e0e253d75bc2c9e7c7N.exe 4160 Soundcrd.exe 1188 Soundcrd.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2244 wrote to memory of 4592 2244 1b9e0310ae9b74f532576fd72477ea5b57dc3df05b2929e0e253d75bc2c9e7c7N.exe 83 PID 2244 wrote to memory of 4592 2244 1b9e0310ae9b74f532576fd72477ea5b57dc3df05b2929e0e253d75bc2c9e7c7N.exe 83 PID 2244 wrote to memory of 4592 2244 1b9e0310ae9b74f532576fd72477ea5b57dc3df05b2929e0e253d75bc2c9e7c7N.exe 83 PID 4592 wrote to memory of 2084 4592 cmd.exe 86 PID 4592 wrote to memory of 2084 4592 cmd.exe 86 PID 4592 wrote to memory of 2084 4592 cmd.exe 86 PID 2244 wrote to memory of 4160 2244 1b9e0310ae9b74f532576fd72477ea5b57dc3df05b2929e0e253d75bc2c9e7c7N.exe 87 PID 2244 wrote to memory of 4160 2244 1b9e0310ae9b74f532576fd72477ea5b57dc3df05b2929e0e253d75bc2c9e7c7N.exe 87 PID 2244 wrote to memory of 4160 2244 1b9e0310ae9b74f532576fd72477ea5b57dc3df05b2929e0e253d75bc2c9e7c7N.exe 87 PID 4160 wrote to memory of 1704 4160 Soundcrd.exe 88 PID 4160 wrote to memory of 1704 4160 Soundcrd.exe 88 PID 4160 wrote to memory of 1704 4160 Soundcrd.exe 88 PID 4160 wrote to memory of 1704 4160 Soundcrd.exe 88 PID 4160 wrote to memory of 1704 4160 Soundcrd.exe 88 PID 4160 wrote to memory of 1704 4160 Soundcrd.exe 88 PID 4160 wrote to memory of 1704 4160 Soundcrd.exe 88 PID 4160 wrote to memory of 1704 4160 Soundcrd.exe 88 PID 4160 wrote to memory of 1188 4160 Soundcrd.exe 89 PID 4160 wrote to memory of 1188 4160 Soundcrd.exe 89 PID 4160 wrote to memory of 1188 4160 Soundcrd.exe 89 PID 4160 wrote to memory of 1188 4160 Soundcrd.exe 89 PID 4160 wrote to memory of 1188 4160 Soundcrd.exe 89 PID 4160 wrote to memory of 1188 4160 Soundcrd.exe 89 PID 4160 wrote to memory of 1188 4160 Soundcrd.exe 89 PID 4160 wrote to memory of 1188 4160 Soundcrd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b9e0310ae9b74f532576fd72477ea5b57dc3df05b2929e0e253d75bc2c9e7c7N.exe"C:\Users\Admin\AppData\Local\Temp\1b9e0310ae9b74f532576fd72477ea5b57dc3df05b2929e0e253d75bc2c9e7c7N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SNedB.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Mcrosoftt" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Soundcrd.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2084
-
-
-
C:\Users\Admin\AppData\Roaming\Soundcrd.exe"C:\Users\Admin\AppData\Roaming\Soundcrd.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Roaming\Soundcrd.exeC:\Users\Admin\AppData\Roaming\Soundcrd.exe3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Users\Admin\AppData\Roaming\Soundcrd.exeC:\Users\Admin\AppData\Roaming\Soundcrd.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1188
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD5173bcce4810d4901872d0ef4f0bfea4e
SHA1561b03fdfe68b6419fddf57f32e1aab9a6126a2f
SHA25610ea37eceabbe80fe9814280b66b957636951dbeeed18a9b4d50a1d24a6f1d1d
SHA5122401e0a5e3f7bf590a0767449da2249d09717e8c1cb71a7475e81d9615580001cfc38705cd1a5b4edc33f7df043bf195e28e4a5442a32bc879dffc6473bd545e
-
Filesize
574KB
MD5d063a93691eb545a864ba003c053bbe9
SHA148eecaf3ea6434ea0ac2746f25afe12a61df5b92
SHA256180d1652656df3b4415b75be6a80f591755ea5118a16104e4eef7e335e0f8a73
SHA51224b60994bdeffe9ee7ff903ce950a9770ccd351dcf6cc8bb0bc01adb18df6764646bc02b4632830f49376b07613833e7f09be84ac4a8777e9ff8dacd4af67627