Resubmissions

26-12-2024 10:52

241226-myqcmatlhx 10

26-12-2024 10:39

241226-mp9pxatjfz 10

Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 10:39

General

  • Target

    Comet.exe

  • Size

    8.6MB

  • MD5

    1f5d19397b48172aba35885f39e318fa

  • SHA1

    df77020bffc62f386b5ce0ad0cde3d8f8b704b93

  • SHA256

    dd780875686be33910002f91aaeb8f8ec70a2f3972c41c707a59ef18cd900e74

  • SHA512

    4ccec7c602582d467a63e8f6e8fc222e73bb88a589256fac0577452b6ffaaec58adf2b5e216f8a27404c4717a74f239ce73226385133764b75baa775b25de4a0

  • SSDEEP

    196608:u9+8ZspGS5puzUZqVBU6NABaScfR3xeUDyzfS/FNgeLCtNP:u9+EEp5ZqPBOhcftAUDyzqNutNP

Score
10/10

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1320235014511792160/59qb1BvUIDJlYJZoQnnxe4CNf8Swi8--Nwm7q4BECFectFCCJWiM-H8Ng2tA4-dl6Vyb

Signatures

  • Skuld family
  • Skuld stealer

    An info stealer written in Go lang.

  • Executes dropped EXE 26 IoCs
  • Loads dropped DLL 64 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Comet.exe
    "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Users\Admin\AppData\Local\Temp\Comet.exe
      "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Users\Admin\AppData\Local\Temp\Comet.exe
        "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2796
        • C:\Users\Admin\AppData\Local\Temp\Comet.exe
          "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
          4⤵
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2204
          • C:\Users\Admin\AppData\Local\Temp\Comet.exe
            "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
            5⤵
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2912
            • C:\Users\Admin\AppData\Local\Temp\Comet.exe
              "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
              6⤵
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1648
              • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                7⤵
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2144
                • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                  "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                  8⤵
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1052
                  • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                    "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                    9⤵
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:828
                    • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                      "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                      10⤵
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:832
                      • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                        "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                        11⤵
                        • Loads dropped DLL
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1972
                        • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                          "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                          12⤵
                          • Loads dropped DLL
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2804
                          • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                            "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                            13⤵
                            • Loads dropped DLL
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2892
                            • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                              "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                              14⤵
                              • Loads dropped DLL
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2588
                              • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                                "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                                15⤵
                                • Loads dropped DLL
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2204
                                • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                                  "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                                  16⤵
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1904
                                  • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                                    17⤵
                                    • Loads dropped DLL
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2228
                                    • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                                      "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                                      18⤵
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:992
                                      • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                                        "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                                        19⤵
                                        • Loads dropped DLL
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1676
                                        • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                                          "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                                          20⤵
                                          • Loads dropped DLL
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2444
                                          • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                                            "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                                            21⤵
                                            • Loads dropped DLL
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3068
                                            • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                                              "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                                              22⤵
                                              • Loads dropped DLL
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2492
                                              • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                                                "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                                                23⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2060
                                                • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                                                  24⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1328
                                                  • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                                                    25⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2568
                                                    • C:\Users\Admin\AppData\Local\Temp\Comet.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\Comet.exe"
                                                      26⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:484
                                                    • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                                                      26⤵
                                                      • Executes dropped EXE
                                                      PID:924
                                                  • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                                                    25⤵
                                                    • Executes dropped EXE
                                                    PID:2664
                                                • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                                                  24⤵
                                                  • Executes dropped EXE
                                                  PID:2728
                                              • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                                                "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                                                23⤵
                                                • Executes dropped EXE
                                                PID:2392
                                            • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                                              "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                                              22⤵
                                              • Executes dropped EXE
                                              PID:2168
                                          • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                                            "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                                            21⤵
                                            • Executes dropped EXE
                                            PID:1604
                                        • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                                          "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                                          20⤵
                                          • Executes dropped EXE
                                          PID:884
                                      • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                                        "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                                        19⤵
                                        • Executes dropped EXE
                                        PID:2132
                                    • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                                      "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                                      18⤵
                                      • Executes dropped EXE
                                      PID:1376
                                  • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                                    "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    PID:2540
                                • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                                  "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                                  16⤵
                                  • Executes dropped EXE
                                  PID:2660
                              • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                                "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                                15⤵
                                • Executes dropped EXE
                                PID:2996
                            • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                              "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                              14⤵
                              • Executes dropped EXE
                              PID:2476
                          • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                            "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                            13⤵
                            • Executes dropped EXE
                            PID:2184
                        • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                          "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                          12⤵
                          • Executes dropped EXE
                          PID:1772
                      • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                        "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                        11⤵
                        • Executes dropped EXE
                        PID:2052
                    • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                      "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                      10⤵
                      • Executes dropped EXE
                      PID:2364
                  • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                    "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                    9⤵
                    • Executes dropped EXE
                    PID:1776
                • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                  "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                  8⤵
                  • Executes dropped EXE
                  PID:2264
              • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
                "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
                7⤵
                • Executes dropped EXE
                PID:572
            • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
              "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
              6⤵
              • Executes dropped EXE
              PID:348
          • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
            "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
            5⤵
            • Executes dropped EXE
            PID:1516
        • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
          "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
          4⤵
          • Executes dropped EXE
          PID:2880
      • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
        "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
        3⤵
        • Executes dropped EXE
        PID:2972
    • C:\Users\Admin\AppData\Local\Temp\deltadll.exe
      "C:\Users\Admin\AppData\Local\Temp\deltadll.exe"
      2⤵
      • Executes dropped EXE
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\deltadll.exe

    Filesize

    14.8MB

    MD5

    19c446f51d203d1fb7eb23210709417b

    SHA1

    6e33b8d13d1539630615e581e5ab03de371c0dc6

    SHA256

    b67cae29bac60920b3edc02081da697c4c6486411c1bc77f29b68cb1f23e3ffc

    SHA512

    9d8601a0c2e090cd5fc6315c1671d669cd6a6bf20d3ef24cb1a111e344464913fe809c9b27d32608b93b988a37e59c90086ccf68545ce385ef58f96365a439df

  • memory/620-0-0x000007FEF5403000-0x000007FEF5404000-memory.dmp

    Filesize

    4KB

  • memory/620-1-0x000000013F390000-0x000000013FC3A000-memory.dmp

    Filesize

    8.7MB

  • memory/620-2-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

    Filesize

    9.9MB

  • memory/620-13-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2248-3-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2248-23-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

    Filesize

    9.9MB