Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 02:28
Static task
static1
Behavioral task
behavioral1
Sample
da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe
Resource
win7-20241010-en
General
-
Target
da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe
-
Size
520KB
-
MD5
a266f8d1087fdb7528c2c62a998be548
-
SHA1
e4e313389b5ab5b452f5d7cd7c67a5aade214f4d
-
SHA256
da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54
-
SHA512
9832baeeb05a537a9778681d22c7e2f897081510cdc94a2b1c96ae1fa4d6d7c89f22f92b86c4c43dd2d74de28cf9789f8caeafa15fdd9bf515e7beeb48bc7e65
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbJ:f9fC3hh29Ya77A90aFtDfT5IMbJ
Malware Config
Extracted
darkcomet
PrivateEye
ratblackshades.no-ip.biz:1604
DC_MUTEX-ACC1R98
-
gencode
8GG5LVVGljSF
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 3448 winupd.exe 4960 winupd.exe 4484 winupd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1100 set thread context of 4632 1100 da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe 89 PID 3448 set thread context of 4960 3448 winupd.exe 93 PID 3448 set thread context of 4484 3448 winupd.exe 94 -
resource yara_rule behavioral2/memory/4484-37-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4484-38-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4484-39-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4484-41-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4484-40-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4484-36-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4484-29-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4484-44-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4484-45-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4484-46-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4484-47-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4484-48-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4484-49-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4484-50-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4484-51-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5112 944 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 944 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4484 winupd.exe Token: SeSecurityPrivilege 4484 winupd.exe Token: SeTakeOwnershipPrivilege 4484 winupd.exe Token: SeLoadDriverPrivilege 4484 winupd.exe Token: SeSystemProfilePrivilege 4484 winupd.exe Token: SeSystemtimePrivilege 4484 winupd.exe Token: SeProfSingleProcessPrivilege 4484 winupd.exe Token: SeIncBasePriorityPrivilege 4484 winupd.exe Token: SeCreatePagefilePrivilege 4484 winupd.exe Token: SeBackupPrivilege 4484 winupd.exe Token: SeRestorePrivilege 4484 winupd.exe Token: SeShutdownPrivilege 4484 winupd.exe Token: SeDebugPrivilege 4484 winupd.exe Token: SeSystemEnvironmentPrivilege 4484 winupd.exe Token: SeChangeNotifyPrivilege 4484 winupd.exe Token: SeRemoteShutdownPrivilege 4484 winupd.exe Token: SeUndockPrivilege 4484 winupd.exe Token: SeManageVolumePrivilege 4484 winupd.exe Token: SeImpersonatePrivilege 4484 winupd.exe Token: SeCreateGlobalPrivilege 4484 winupd.exe Token: 33 4484 winupd.exe Token: 34 4484 winupd.exe Token: 35 4484 winupd.exe Token: 36 4484 winupd.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1100 da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe 4632 da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe 3448 winupd.exe 4960 winupd.exe 4484 winupd.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1100 wrote to memory of 4632 1100 da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe 89 PID 1100 wrote to memory of 4632 1100 da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe 89 PID 1100 wrote to memory of 4632 1100 da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe 89 PID 1100 wrote to memory of 4632 1100 da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe 89 PID 1100 wrote to memory of 4632 1100 da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe 89 PID 1100 wrote to memory of 4632 1100 da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe 89 PID 1100 wrote to memory of 4632 1100 da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe 89 PID 1100 wrote to memory of 4632 1100 da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe 89 PID 4632 wrote to memory of 3448 4632 da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe 90 PID 4632 wrote to memory of 3448 4632 da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe 90 PID 4632 wrote to memory of 3448 4632 da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe 90 PID 3448 wrote to memory of 4960 3448 winupd.exe 93 PID 3448 wrote to memory of 4960 3448 winupd.exe 93 PID 3448 wrote to memory of 4960 3448 winupd.exe 93 PID 3448 wrote to memory of 4960 3448 winupd.exe 93 PID 3448 wrote to memory of 4960 3448 winupd.exe 93 PID 3448 wrote to memory of 4960 3448 winupd.exe 93 PID 3448 wrote to memory of 4960 3448 winupd.exe 93 PID 3448 wrote to memory of 4960 3448 winupd.exe 93 PID 3448 wrote to memory of 4484 3448 winupd.exe 94 PID 3448 wrote to memory of 4484 3448 winupd.exe 94 PID 3448 wrote to memory of 4484 3448 winupd.exe 94 PID 3448 wrote to memory of 4484 3448 winupd.exe 94 PID 3448 wrote to memory of 4484 3448 winupd.exe 94 PID 3448 wrote to memory of 4484 3448 winupd.exe 94 PID 3448 wrote to memory of 4484 3448 winupd.exe 94 PID 3448 wrote to memory of 4484 3448 winupd.exe 94 PID 4960 wrote to memory of 944 4960 winupd.exe 95 PID 4960 wrote to memory of 944 4960 winupd.exe 95 PID 4960 wrote to memory of 944 4960 winupd.exe 95 PID 4960 wrote to memory of 944 4960 winupd.exe 95 PID 4960 wrote to memory of 944 4960 winupd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe"C:\Users\Admin\AppData\Local\Temp\da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe"C:\Users\Admin\AppData\Local\Temp\da8b7400c560ffa402c051d820c245fe60922a49a3edb6db52a2a99112d46e54.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exeC:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- Gathers network information
PID:944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 944 -s 2726⤵
- Program crash
PID:5112
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4484
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 944 -ip 9441⤵PID:1456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD5aee8d71d6dbc3cf071c2da4557556976
SHA130dd963a0bd98685af7d7a37335be94dca34e674
SHA2569cf0542bf3aeda3a942e0577408a6f7244eddb62f2b3fb94ca04b628be151f24
SHA5123d9964b5923909f3f35e3bd5b4270a4f0f47ba44687cc689c198229000eeed2ab837cffed607a1a990d7e41b8ca55a397c5a44b62d1da832accb9aff128c51d4