Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe
Resource
win7-20240903-en
General
-
Target
9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe
-
Size
7.3MB
-
MD5
7002220c99ce292ae1e868630955d252
-
SHA1
6a30dac7b111d836df034b61b0e1e75193685005
-
SHA256
9f17acc43acf52f99f6c858e14da84b6b4c67381687f8fedfd9b6a21b2ab37b4
-
SHA512
6e71732cc363e3277e42e7a06626dd0909bad6eca065d4f8278bd8c048bc56ec3de533ec2e83efda396d904cda39b4e955ed3ff0d33dd765b8864a3a018b7eee
-
SSDEEP
196608:BtonkRNZFa4GEQkyuU3ydnUOjYyO92A2U9:yeOhkpOydPXOb9
Malware Config
Extracted
darkcomet
WEDTHINGS
cosrem.ddns.net:2301
cosrem.ddnsgeek.com:2301
cosrem.dyndns.org:2301
DC_MUTEX-B22SA3T
-
gencode
0TFfD5Hg0VlW
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 4 IoCs
pid Process 1712 imageranger.exe 2192 dllhost.exe 2788 dllhost.exe 320 dllhost.exe -
Loads dropped DLL 5 IoCs
pid Process 3000 9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe 3000 9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe 3000 9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe 3000 9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe 3000 9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2192 set thread context of 320 2192 dllhost.exe 36 -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\XtSense GmbH\ImageRanger Pro\imageranger.exe 9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe File opened for modification C:\Program Files (x86)\XtSense GmbH\ImageRanger Pro\Uninstall.exe 9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe File created C:\Program Files (x86)\XtSense GmbH\ImageRanger Pro\Uninstall.ini 9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 304 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2192 dllhost.exe 2192 dllhost.exe 2192 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2192 dllhost.exe Token: SeIncreaseQuotaPrivilege 320 dllhost.exe Token: SeSecurityPrivilege 320 dllhost.exe Token: SeTakeOwnershipPrivilege 320 dllhost.exe Token: SeLoadDriverPrivilege 320 dllhost.exe Token: SeSystemProfilePrivilege 320 dllhost.exe Token: SeSystemtimePrivilege 320 dllhost.exe Token: SeProfSingleProcessPrivilege 320 dllhost.exe Token: SeIncBasePriorityPrivilege 320 dllhost.exe Token: SeCreatePagefilePrivilege 320 dllhost.exe Token: SeBackupPrivilege 320 dllhost.exe Token: SeRestorePrivilege 320 dllhost.exe Token: SeShutdownPrivilege 320 dllhost.exe Token: SeDebugPrivilege 320 dllhost.exe Token: SeSystemEnvironmentPrivilege 320 dllhost.exe Token: SeChangeNotifyPrivilege 320 dllhost.exe Token: SeRemoteShutdownPrivilege 320 dllhost.exe Token: SeUndockPrivilege 320 dllhost.exe Token: SeManageVolumePrivilege 320 dllhost.exe Token: SeImpersonatePrivilege 320 dllhost.exe Token: SeCreateGlobalPrivilege 320 dllhost.exe Token: 33 320 dllhost.exe Token: 34 320 dllhost.exe Token: 35 320 dllhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 320 dllhost.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3000 wrote to memory of 1712 3000 9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe 30 PID 3000 wrote to memory of 1712 3000 9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe 30 PID 3000 wrote to memory of 1712 3000 9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe 30 PID 3000 wrote to memory of 1712 3000 9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe 30 PID 3000 wrote to memory of 2192 3000 9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe 31 PID 3000 wrote to memory of 2192 3000 9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe 31 PID 3000 wrote to memory of 2192 3000 9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe 31 PID 3000 wrote to memory of 2192 3000 9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe 31 PID 2192 wrote to memory of 304 2192 dllhost.exe 33 PID 2192 wrote to memory of 304 2192 dllhost.exe 33 PID 2192 wrote to memory of 304 2192 dllhost.exe 33 PID 2192 wrote to memory of 304 2192 dllhost.exe 33 PID 2192 wrote to memory of 2788 2192 dllhost.exe 35 PID 2192 wrote to memory of 2788 2192 dllhost.exe 35 PID 2192 wrote to memory of 2788 2192 dllhost.exe 35 PID 2192 wrote to memory of 2788 2192 dllhost.exe 35 PID 2192 wrote to memory of 320 2192 dllhost.exe 36 PID 2192 wrote to memory of 320 2192 dllhost.exe 36 PID 2192 wrote to memory of 320 2192 dllhost.exe 36 PID 2192 wrote to memory of 320 2192 dllhost.exe 36 PID 2192 wrote to memory of 320 2192 dllhost.exe 36 PID 2192 wrote to memory of 320 2192 dllhost.exe 36 PID 2192 wrote to memory of 320 2192 dllhost.exe 36 PID 2192 wrote to memory of 320 2192 dllhost.exe 36 PID 2192 wrote to memory of 320 2192 dllhost.exe 36 PID 2192 wrote to memory of 320 2192 dllhost.exe 36 PID 2192 wrote to memory of 320 2192 dllhost.exe 36 PID 2192 wrote to memory of 320 2192 dllhost.exe 36 PID 2192 wrote to memory of 320 2192 dllhost.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe"C:\Users\Admin\AppData\Local\Temp\9F17ACC43ACF52F99F6C858E14DA84B6B4C67381687F8FEDFD9B6A21B2AB37B4.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\XtSense GmbH\ImageRanger Pro\imageranger.exe"C:\Program Files (x86)\XtSense GmbH\ImageRanger Pro\imageranger.exe"2⤵
- Executes dropped EXE
PID:1712
-
-
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wpGwXkn" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8871.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:304
-
-
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"3⤵
- Executes dropped EXE
PID:2788
-
-
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:320
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.8MB
MD5f9371edfc29bcee9903c72c134b98eb8
SHA14456a1ee1a4778e25c4b979bd893040580dbee5f
SHA256d195557ca5e46f0db1be687df1a9a9ea76449a2b5a8203deeccf4222b9adf0ff
SHA5122703fe461349f570282b1b7cd269096e362036b7379414e6ccb8788ef7f6b44523d40ee4c54926c93168df918495645026f6d0566ee2eb381d3cd8bfae2c8068
-
Filesize
1KB
MD56f4b00e2bdef8f0f1b364ac4b3396a99
SHA168358e82e289de1d73b13d5ac6736897a86775b5
SHA256fb484c72b1aa88b50821857c3afba312a45a0d8a4a7b21a10bc7491e665dcdc3
SHA51254f78694ab235d654bef7b7232f544801100e5a4012e8be381c366f4a3b3f7a0750d07e837bcfe482dc4fda0296cdf1ca3c7d0b606a5d01545f3f57cc7e38ce9
-
Filesize
1.4MB
MD5de7df715cb2ec41376586f4ddc70c5cf
SHA11d22d3d3ed5f961778c03f0ce6c5ad59161c5d2f
SHA2560e677f2ed4b7c5cd7e47d6738d645310635250271b6cade8ce4589bbde1e82bb
SHA512d78428bc7ac819d3b569a8f12c6e0f790530b889447368e6966537a102a595f0d3ca2dc2c1ef08b0b1f3a7c165f4f5ca164c159e554c86f30d0ec1819fa7c966