Analysis
-
max time kernel
92s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 16:43
Static task
static1
Behavioral task
behavioral1
Sample
fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe
Resource
win10v2004-20241007-en
General
-
Target
fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe
-
Size
500KB
-
MD5
7b0efc4e44f8bb612a1506db5ab5aa0e
-
SHA1
b71347881754796387238c3741b480f1e8c92b5e
-
SHA256
fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c
-
SHA512
2a00bb9541af1a1b22e8b4c55ba7ace3a64e2a27c052b7d78b55a1d1104fc046021784f079379bcf82947285bb5465f03d3b71f7546d61f156aac488bf3e4742
-
SSDEEP
12288:XHSqctaCAAEZOu8so1G51zlU1wM+AQYMyR00Z:XHSDa7JZOu8sbzU1IA7L+0Z
Malware Config
Signatures
-
Darkcomet family
-
Uses the VBS compiler for execution 1 TTPs
-
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\svchost.exe:ZONE.identifier cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\svchost.exe:ZONE.identifier cmd.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2696 2876 fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe 30 PID 2876 wrote to memory of 2696 2876 fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe 30 PID 2876 wrote to memory of 2696 2876 fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe 30 PID 2876 wrote to memory of 2696 2876 fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe 30 PID 2876 wrote to memory of 2784 2876 fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe 32 PID 2876 wrote to memory of 2784 2876 fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe 32 PID 2876 wrote to memory of 2784 2876 fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe 32 PID 2876 wrote to memory of 2860 2876 fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe 34 PID 2876 wrote to memory of 2860 2876 fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe 34 PID 2876 wrote to memory of 2860 2876 fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe 34 PID 2876 wrote to memory of 2860 2876 fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe"C:\Users\Admin\AppData\Local\Temp\fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
C:\Windows\system32\cmd.exe"cmd"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:2784
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- System Location Discovery: System Language Discovery
PID:2860
-