Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 14:30
Behavioral task
behavioral1
Sample
d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe
Resource
win10v2004-20241007-en
General
-
Target
d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe
-
Size
1.9MB
-
MD5
11f5bd6f572e54c86b340457c3047e70
-
SHA1
f5adc7acd43fa20539f255067ea98dd0b5ef7004
-
SHA256
d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d
-
SHA512
fa43cce43a1ad9cbb10d0457ed4f9d3cdc3b910cc28734608566016c5b921368e11337e9fafcc31c7356bf33b4de8bde5b49b0cdc3e507404bef09ec76738105
-
SSDEEP
49152:E91DSeK3K1ovWnZ5Yw9NMZ6Pkew933XyrCCC0x:MNSeb1n5YEi0Pm93yF
Malware Config
Extracted
darkcomet
EGO
harry223.hopto.org:1604
harry223.ddns.net:1604
DC_MUTEX-49BTG5Z
-
gencode
5SgVzYUMC7K7
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral2/files/0x0009000000023c0b-16.dat revengerat -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe WipeShadow.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "svchost.exe" WipeShadow.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe -
Executes dropped EXE 2 IoCs
pid Process 1700 WipeShadow.exe 3936 WipeShadow.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum WipeShadow.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 WipeShadow.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1700 set thread context of 3936 1700 WipeShadow.exe 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WipeShadow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WipeShadow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5068 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1700 WipeShadow.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe Token: SeDebugPrivilege 1700 WipeShadow.exe Token: SeIncreaseQuotaPrivilege 3936 WipeShadow.exe Token: SeSecurityPrivilege 3936 WipeShadow.exe Token: SeTakeOwnershipPrivilege 3936 WipeShadow.exe Token: SeLoadDriverPrivilege 3936 WipeShadow.exe Token: SeSystemProfilePrivilege 3936 WipeShadow.exe Token: SeSystemtimePrivilege 3936 WipeShadow.exe Token: SeProfSingleProcessPrivilege 3936 WipeShadow.exe Token: SeIncBasePriorityPrivilege 3936 WipeShadow.exe Token: SeCreatePagefilePrivilege 3936 WipeShadow.exe Token: SeBackupPrivilege 3936 WipeShadow.exe Token: SeRestorePrivilege 3936 WipeShadow.exe Token: SeShutdownPrivilege 3936 WipeShadow.exe Token: SeDebugPrivilege 3936 WipeShadow.exe Token: SeSystemEnvironmentPrivilege 3936 WipeShadow.exe Token: SeChangeNotifyPrivilege 3936 WipeShadow.exe Token: SeRemoteShutdownPrivilege 3936 WipeShadow.exe Token: SeUndockPrivilege 3936 WipeShadow.exe Token: SeManageVolumePrivilege 3936 WipeShadow.exe Token: SeImpersonatePrivilege 3936 WipeShadow.exe Token: SeCreateGlobalPrivilege 3936 WipeShadow.exe Token: 33 3936 WipeShadow.exe Token: 34 3936 WipeShadow.exe Token: 35 3936 WipeShadow.exe Token: 36 3936 WipeShadow.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3936 WipeShadow.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4676 wrote to memory of 60 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 99 PID 4676 wrote to memory of 60 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 99 PID 4676 wrote to memory of 60 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 99 PID 4676 wrote to memory of 5068 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 101 PID 4676 wrote to memory of 5068 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 101 PID 4676 wrote to memory of 5068 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 101 PID 4676 wrote to memory of 3772 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 103 PID 4676 wrote to memory of 3772 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 103 PID 4676 wrote to memory of 3772 4676 d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe 103 PID 3772 wrote to memory of 1700 3772 cmd.exe 105 PID 3772 wrote to memory of 1700 3772 cmd.exe 105 PID 3772 wrote to memory of 1700 3772 cmd.exe 105 PID 1700 wrote to memory of 3936 1700 WipeShadow.exe 106 PID 1700 wrote to memory of 3936 1700 WipeShadow.exe 106 PID 1700 wrote to memory of 3936 1700 WipeShadow.exe 106 PID 1700 wrote to memory of 3936 1700 WipeShadow.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe"C:\Users\Admin\AppData\Local\Temp\d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Delete /TN "Update\dcba3215-9a85-40cf-9198-e7887aed0f54" /F2⤵
- System Location Discovery: System Language Discovery
PID:60
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Update\dcba3215-9a85-40cf-9198-e7887aed0f54" /XML "C:\Users\Admin\AppData\Local\Temp\tmp403678369.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5068
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /K "C:\ProgramData\WipeShadow.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\ProgramData\WipeShadow.exeC:\ProgramData\WipeShadow.exe3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\ProgramData\WipeShadow.exeC:\ProgramData\WipeShadow.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3936
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD511f5bd6f572e54c86b340457c3047e70
SHA1f5adc7acd43fa20539f255067ea98dd0b5ef7004
SHA256d025f97d1f87756e37c92fa36aae1223a4975abb515689a63bdb6f4dff25fa9d
SHA512fa43cce43a1ad9cbb10d0457ed4f9d3cdc3b910cc28734608566016c5b921368e11337e9fafcc31c7356bf33b4de8bde5b49b0cdc3e507404bef09ec76738105
-
Filesize
1KB
MD5ccc9677f4e55929b46cb878937f0377e
SHA175544fc6401ee99624050419e4a37707a481a413
SHA25632b0a0e44feff6662105d079192964ea99fd9310ae8fb7837dcceab770dcd0fc
SHA51205de30fab81507e38aed4cc46d78f20fa1895020f9bbf6df1eae4366276b032b8f84948e736070cec9dc00ca473eb08a7f1b6d9aad2fce740d7fb924e7a62db9