Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 14:30
Behavioral task
behavioral1
Sample
d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe
Resource
win10v2004-20241007-en
General
-
Target
d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe
-
Size
1.9MB
-
MD5
11f5bd6f572e54c86b340457c3047e70
-
SHA1
f5adc7acd43fa20539f255067ea98dd0b5ef7004
-
SHA256
d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d
-
SHA512
fa43cce43a1ad9cbb10d0457ed4f9d3cdc3b910cc28734608566016c5b921368e11337e9fafcc31c7356bf33b4de8bde5b49b0cdc3e507404bef09ec76738105
-
SSDEEP
49152:E91DSeK3K1ovWnZ5Yw9NMZ6Pkew933XyrCCC0x:MNSeb1n5YEi0Pm93yF
Malware Config
Extracted
darkcomet
EGO
harry223.hopto.org:1604
harry223.ddns.net:1604
DC_MUTEX-49BTG5Z
-
gencode
5SgVzYUMC7K7
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/files/0x00390000000173a9-14.dat revengerat -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe WipeShadow.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "svchost.exe" WipeShadow.exe -
Executes dropped EXE 2 IoCs
pid Process 2640 WipeShadow.exe 768 WipeShadow.exe -
Loads dropped DLL 2 IoCs
pid Process 2568 cmd.exe 2640 WipeShadow.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum WipeShadow.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 WipeShadow.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2640 set thread context of 768 2640 WipeShadow.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WipeShadow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WipeShadow.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2736 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2640 WipeShadow.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe Token: SeDebugPrivilege 2640 WipeShadow.exe Token: SeIncreaseQuotaPrivilege 768 WipeShadow.exe Token: SeSecurityPrivilege 768 WipeShadow.exe Token: SeTakeOwnershipPrivilege 768 WipeShadow.exe Token: SeLoadDriverPrivilege 768 WipeShadow.exe Token: SeSystemProfilePrivilege 768 WipeShadow.exe Token: SeSystemtimePrivilege 768 WipeShadow.exe Token: SeProfSingleProcessPrivilege 768 WipeShadow.exe Token: SeIncBasePriorityPrivilege 768 WipeShadow.exe Token: SeCreatePagefilePrivilege 768 WipeShadow.exe Token: SeBackupPrivilege 768 WipeShadow.exe Token: SeRestorePrivilege 768 WipeShadow.exe Token: SeShutdownPrivilege 768 WipeShadow.exe Token: SeDebugPrivilege 768 WipeShadow.exe Token: SeSystemEnvironmentPrivilege 768 WipeShadow.exe Token: SeChangeNotifyPrivilege 768 WipeShadow.exe Token: SeRemoteShutdownPrivilege 768 WipeShadow.exe Token: SeUndockPrivilege 768 WipeShadow.exe Token: SeManageVolumePrivilege 768 WipeShadow.exe Token: SeImpersonatePrivilege 768 WipeShadow.exe Token: SeCreateGlobalPrivilege 768 WipeShadow.exe Token: 33 768 WipeShadow.exe Token: 34 768 WipeShadow.exe Token: 35 768 WipeShadow.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 768 WipeShadow.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2076 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 31 PID 2420 wrote to memory of 2076 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 31 PID 2420 wrote to memory of 2076 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 31 PID 2420 wrote to memory of 2076 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 31 PID 2420 wrote to memory of 2736 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 33 PID 2420 wrote to memory of 2736 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 33 PID 2420 wrote to memory of 2736 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 33 PID 2420 wrote to memory of 2736 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 33 PID 2420 wrote to memory of 2568 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 35 PID 2420 wrote to memory of 2568 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 35 PID 2420 wrote to memory of 2568 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 35 PID 2420 wrote to memory of 2568 2420 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 35 PID 2568 wrote to memory of 2640 2568 cmd.exe 37 PID 2568 wrote to memory of 2640 2568 cmd.exe 37 PID 2568 wrote to memory of 2640 2568 cmd.exe 37 PID 2568 wrote to memory of 2640 2568 cmd.exe 37 PID 2568 wrote to memory of 2640 2568 cmd.exe 37 PID 2568 wrote to memory of 2640 2568 cmd.exe 37 PID 2568 wrote to memory of 2640 2568 cmd.exe 37 PID 2640 wrote to memory of 768 2640 WipeShadow.exe 38 PID 2640 wrote to memory of 768 2640 WipeShadow.exe 38 PID 2640 wrote to memory of 768 2640 WipeShadow.exe 38 PID 2640 wrote to memory of 768 2640 WipeShadow.exe 38 PID 2640 wrote to memory of 768 2640 WipeShadow.exe 38 PID 2640 wrote to memory of 768 2640 WipeShadow.exe 38 PID 2640 wrote to memory of 768 2640 WipeShadow.exe 38 PID 2640 wrote to memory of 768 2640 WipeShadow.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe"C:\Users\Admin\AppData\Local\Temp\d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe"1⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Delete /TN "Update\dcba3215-9a85-40cf-9198-e7887aed0f54" /F2⤵
- System Location Discovery: System Language Discovery
PID:2076
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Update\dcba3215-9a85-40cf-9198-e7887aed0f54" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1147005998.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2736
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /K "C:\ProgramData\WipeShadow.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\ProgramData\WipeShadow.exeC:\ProgramData\WipeShadow.exe3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\ProgramData\WipeShadow.exeC:\ProgramData\WipeShadow.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:768
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD511f5bd6f572e54c86b340457c3047e70
SHA1f5adc7acd43fa20539f255067ea98dd0b5ef7004
SHA256d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d
SHA512fa43cce43a1ad9cbb10d0457ed4f9d3cdc3b910cc28734608566016c5b921368e11337e9fafcc31c7356bf33b4de8bde5b49b0cdc3e507404bef09ec76738105
-
Filesize
1KB
MD5ab47d7eda323ce8013f508f9f1c897c4
SHA1260cafea942ffa68cc56e1089881c6920c16cfbd
SHA256007eae15edcec24069decb35314178e9c389af86857ee5729ac23299053c9188
SHA5128cb44bd79b2e2df8ee96867dfb203eac88491a1565adce7e2cac745170f0aaab278302b89a01ccafba2f96980ab15034282eee3f35637cce9cec4d84e136586d