Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 14:57
Static task
static1
Behavioral task
behavioral1
Sample
57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe
Resource
win7-20240903-en
General
-
Target
57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe
-
Size
520KB
-
MD5
e8bca826a31021429c0a69228bd6d3a0
-
SHA1
cb7511bd838dc09a300fdac51e7be78da3bb9417
-
SHA256
57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476
-
SHA512
e0a6b38c11a65d225ced509756db7efd56f7eaff01b0225e6b21ccc8928cbd594f4301f4f09ebd18144deba1b729be5ac99c8a89eabacce2fe8d2b9ea61bc4aa
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbW:f9fC3hh29Ya77A90aFtDfT5IMbW
Malware Config
Extracted
darkcomet
PrivateEye
ratblackshades.no-ip.biz:1604
DC_MUTEX-ACC1R98
-
gencode
8GG5LVVGljSF
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 2084 winupd.exe 2196 winupd.exe 2824 winupd.exe -
Loads dropped DLL 4 IoCs
pid Process 1056 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 1056 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 2084 winupd.exe 2084 winupd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\winupd.exe -notray" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1732 set thread context of 1056 1732 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 30 PID 2084 set thread context of 2196 2084 winupd.exe 32 PID 2084 set thread context of 2824 2084 winupd.exe 33 -
resource yara_rule behavioral1/memory/2824-60-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-69-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-71-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-72-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-74-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-73-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-68-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-67-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-63-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-58-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-53-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-55-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-85-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-86-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-87-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-88-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-89-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-90-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-91-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-92-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-93-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-94-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-95-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-96-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-97-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2824-98-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2780 ipconfig.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1412 reg.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2824 winupd.exe Token: SeSecurityPrivilege 2824 winupd.exe Token: SeTakeOwnershipPrivilege 2824 winupd.exe Token: SeLoadDriverPrivilege 2824 winupd.exe Token: SeSystemProfilePrivilege 2824 winupd.exe Token: SeSystemtimePrivilege 2824 winupd.exe Token: SeProfSingleProcessPrivilege 2824 winupd.exe Token: SeIncBasePriorityPrivilege 2824 winupd.exe Token: SeCreatePagefilePrivilege 2824 winupd.exe Token: SeBackupPrivilege 2824 winupd.exe Token: SeRestorePrivilege 2824 winupd.exe Token: SeShutdownPrivilege 2824 winupd.exe Token: SeDebugPrivilege 2824 winupd.exe Token: SeSystemEnvironmentPrivilege 2824 winupd.exe Token: SeChangeNotifyPrivilege 2824 winupd.exe Token: SeRemoteShutdownPrivilege 2824 winupd.exe Token: SeUndockPrivilege 2824 winupd.exe Token: SeManageVolumePrivilege 2824 winupd.exe Token: SeImpersonatePrivilege 2824 winupd.exe Token: SeCreateGlobalPrivilege 2824 winupd.exe Token: 33 2824 winupd.exe Token: 34 2824 winupd.exe Token: 35 2824 winupd.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1732 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 1056 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 2084 winupd.exe 2824 winupd.exe 2196 winupd.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1056 1732 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 30 PID 1732 wrote to memory of 1056 1732 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 30 PID 1732 wrote to memory of 1056 1732 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 30 PID 1732 wrote to memory of 1056 1732 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 30 PID 1732 wrote to memory of 1056 1732 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 30 PID 1732 wrote to memory of 1056 1732 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 30 PID 1732 wrote to memory of 1056 1732 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 30 PID 1732 wrote to memory of 1056 1732 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 30 PID 1732 wrote to memory of 1056 1732 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 30 PID 1056 wrote to memory of 2084 1056 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 31 PID 1056 wrote to memory of 2084 1056 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 31 PID 1056 wrote to memory of 2084 1056 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 31 PID 1056 wrote to memory of 2084 1056 57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe 31 PID 2084 wrote to memory of 2196 2084 winupd.exe 32 PID 2084 wrote to memory of 2196 2084 winupd.exe 32 PID 2084 wrote to memory of 2196 2084 winupd.exe 32 PID 2084 wrote to memory of 2196 2084 winupd.exe 32 PID 2084 wrote to memory of 2196 2084 winupd.exe 32 PID 2084 wrote to memory of 2196 2084 winupd.exe 32 PID 2084 wrote to memory of 2196 2084 winupd.exe 32 PID 2084 wrote to memory of 2196 2084 winupd.exe 32 PID 2084 wrote to memory of 2196 2084 winupd.exe 32 PID 2084 wrote to memory of 2824 2084 winupd.exe 33 PID 2084 wrote to memory of 2824 2084 winupd.exe 33 PID 2084 wrote to memory of 2824 2084 winupd.exe 33 PID 2084 wrote to memory of 2824 2084 winupd.exe 33 PID 2084 wrote to memory of 2824 2084 winupd.exe 33 PID 2084 wrote to memory of 2824 2084 winupd.exe 33 PID 2084 wrote to memory of 2824 2084 winupd.exe 33 PID 2084 wrote to memory of 2824 2084 winupd.exe 33 PID 2196 wrote to memory of 2780 2196 winupd.exe 34 PID 2196 wrote to memory of 2780 2196 winupd.exe 34 PID 2196 wrote to memory of 2780 2196 winupd.exe 34 PID 2196 wrote to memory of 2780 2196 winupd.exe 34 PID 2196 wrote to memory of 2780 2196 winupd.exe 34 PID 2196 wrote to memory of 2780 2196 winupd.exe 34 PID 2780 wrote to memory of 2676 2780 ipconfig.exe 36 PID 2780 wrote to memory of 2676 2780 ipconfig.exe 36 PID 2780 wrote to memory of 2676 2780 ipconfig.exe 36 PID 2780 wrote to memory of 2676 2780 ipconfig.exe 36 PID 2676 wrote to memory of 1412 2676 cmd.exe 38 PID 2676 wrote to memory of 1412 2676 cmd.exe 38 PID 2676 wrote to memory of 1412 2676 cmd.exe 38 PID 2676 wrote to memory of 1412 2676 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe"C:\Users\Admin\AppData\Local\Temp\57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe"C:\Users\Admin\AppData\Local\Temp\57cd5a109c63dabf901fc0076c95138971246f80305dd20675fbee64c1b70476N.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exeC:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\UXMGFMVL.bat" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v WinUpdate /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1412
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5cac890d00365d07b9ca89def17cc3a36
SHA16fa99679ede791c16b5d3e6d243a98e8bbdb7eab
SHA2564f98ddee89760080a5c8a93666d2f5c97be52b741265ef4d1ce9aaebf05f12da
SHA512124dc0b18e13425bde43bcbbe2a99005928e398bffcb458d498aac9e754bc5b92b703270667800876c60b0801343f2de8c6b9a1eebafd80bb4f6d5dc295dd9f1
-
Filesize
520KB
MD577be0ca0c0751c7ecdff593a56601f69
SHA13ab3d4ea2f72c4120baefea5f2af69feaaa7ae57
SHA256c50161ec113b145996d18f7785871914f7c3108ca3997c24ec5fb345f1b84aa8
SHA5120861ec5070bcbb981894b894ac74ef0678d58d770545650a657a917885456b1e562644d489cccf6cbe01aeb3d52bd83f4fe2fd576efd96c5ce79f07361c71719