Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 02:07
Static task
static1
Behavioral task
behavioral1
Sample
b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe
Resource
win7-20240903-en
General
-
Target
b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe
-
Size
520KB
-
MD5
c67c2c9a29f3fa23769ac044b83a0b80
-
SHA1
4234fff35b88e9ebf5eea74133c56c4cdc112c70
-
SHA256
b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1
-
SHA512
b1ba2e9e95517c1c3dded027c4d8448655f8f2bfc757aff74435e89c3f5cd427fb231938dc27208c9b1fec760713ccbd5b1dd1905db37f59a2316392a00a8b62
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbb:f9fC3hh29Ya77A90aFtDfT5IMbb
Malware Config
Extracted
darkcomet
PrivateEye
ratblackshades.no-ip.biz:1604
DC_MUTEX-ACC1R98
-
gencode
8GG5LVVGljSF
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 2020 winupd.exe 2864 winupd.exe 2772 winupd.exe -
Loads dropped DLL 2 IoCs
pid Process 2212 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe 2212 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\winupd.exe -notray" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1268 set thread context of 2212 1268 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe 30 PID 2020 set thread context of 2864 2020 winupd.exe 32 PID 2020 set thread context of 2772 2020 winupd.exe 33 -
resource yara_rule behavioral1/memory/2772-69-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-71-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-70-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-66-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-61-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-76-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-77-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-67-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-54-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-56-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-81-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-82-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-83-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-84-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-85-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-86-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-87-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-88-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-89-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-90-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-91-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2772-92-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2848 ipconfig.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2636 reg.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2772 winupd.exe Token: SeSecurityPrivilege 2772 winupd.exe Token: SeTakeOwnershipPrivilege 2772 winupd.exe Token: SeLoadDriverPrivilege 2772 winupd.exe Token: SeSystemProfilePrivilege 2772 winupd.exe Token: SeSystemtimePrivilege 2772 winupd.exe Token: SeProfSingleProcessPrivilege 2772 winupd.exe Token: SeIncBasePriorityPrivilege 2772 winupd.exe Token: SeCreatePagefilePrivilege 2772 winupd.exe Token: SeBackupPrivilege 2772 winupd.exe Token: SeRestorePrivilege 2772 winupd.exe Token: SeShutdownPrivilege 2772 winupd.exe Token: SeDebugPrivilege 2772 winupd.exe Token: SeSystemEnvironmentPrivilege 2772 winupd.exe Token: SeChangeNotifyPrivilege 2772 winupd.exe Token: SeRemoteShutdownPrivilege 2772 winupd.exe Token: SeUndockPrivilege 2772 winupd.exe Token: SeManageVolumePrivilege 2772 winupd.exe Token: SeImpersonatePrivilege 2772 winupd.exe Token: SeCreateGlobalPrivilege 2772 winupd.exe Token: 33 2772 winupd.exe Token: 34 2772 winupd.exe Token: 35 2772 winupd.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1268 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe 2212 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe 2020 winupd.exe 2864 winupd.exe 2772 winupd.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2212 1268 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe 30 PID 1268 wrote to memory of 2212 1268 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe 30 PID 1268 wrote to memory of 2212 1268 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe 30 PID 1268 wrote to memory of 2212 1268 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe 30 PID 1268 wrote to memory of 2212 1268 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe 30 PID 1268 wrote to memory of 2212 1268 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe 30 PID 1268 wrote to memory of 2212 1268 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe 30 PID 1268 wrote to memory of 2212 1268 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe 30 PID 1268 wrote to memory of 2212 1268 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe 30 PID 2212 wrote to memory of 2020 2212 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe 31 PID 2212 wrote to memory of 2020 2212 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe 31 PID 2212 wrote to memory of 2020 2212 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe 31 PID 2212 wrote to memory of 2020 2212 b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe 31 PID 2020 wrote to memory of 2864 2020 winupd.exe 32 PID 2020 wrote to memory of 2864 2020 winupd.exe 32 PID 2020 wrote to memory of 2864 2020 winupd.exe 32 PID 2020 wrote to memory of 2864 2020 winupd.exe 32 PID 2020 wrote to memory of 2864 2020 winupd.exe 32 PID 2020 wrote to memory of 2864 2020 winupd.exe 32 PID 2020 wrote to memory of 2864 2020 winupd.exe 32 PID 2020 wrote to memory of 2864 2020 winupd.exe 32 PID 2020 wrote to memory of 2864 2020 winupd.exe 32 PID 2020 wrote to memory of 2772 2020 winupd.exe 33 PID 2020 wrote to memory of 2772 2020 winupd.exe 33 PID 2020 wrote to memory of 2772 2020 winupd.exe 33 PID 2020 wrote to memory of 2772 2020 winupd.exe 33 PID 2020 wrote to memory of 2772 2020 winupd.exe 33 PID 2020 wrote to memory of 2772 2020 winupd.exe 33 PID 2020 wrote to memory of 2772 2020 winupd.exe 33 PID 2020 wrote to memory of 2772 2020 winupd.exe 33 PID 2864 wrote to memory of 2848 2864 winupd.exe 34 PID 2864 wrote to memory of 2848 2864 winupd.exe 34 PID 2864 wrote to memory of 2848 2864 winupd.exe 34 PID 2864 wrote to memory of 2848 2864 winupd.exe 34 PID 2864 wrote to memory of 2848 2864 winupd.exe 34 PID 2864 wrote to memory of 2848 2864 winupd.exe 34 PID 2848 wrote to memory of 2744 2848 ipconfig.exe 36 PID 2848 wrote to memory of 2744 2848 ipconfig.exe 36 PID 2848 wrote to memory of 2744 2848 ipconfig.exe 36 PID 2848 wrote to memory of 2744 2848 ipconfig.exe 36 PID 2744 wrote to memory of 2636 2744 cmd.exe 38 PID 2744 wrote to memory of 2636 2744 cmd.exe 38 PID 2744 wrote to memory of 2636 2744 cmd.exe 38 PID 2744 wrote to memory of 2636 2744 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe"C:\Users\Admin\AppData\Local\Temp\b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe"C:\Users\Admin\AppData\Local\Temp\b79da754145337d758de451bca3553d3f91cbe9e109be1d22047eaec613d54f1N.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exeC:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\UXMGFMVL.bat" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v WinUpdate /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2636
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5cac890d00365d07b9ca89def17cc3a36
SHA16fa99679ede791c16b5d3e6d243a98e8bbdb7eab
SHA2564f98ddee89760080a5c8a93666d2f5c97be52b741265ef4d1ce9aaebf05f12da
SHA512124dc0b18e13425bde43bcbbe2a99005928e398bffcb458d498aac9e754bc5b92b703270667800876c60b0801343f2de8c6b9a1eebafd80bb4f6d5dc295dd9f1
-
Filesize
520KB
MD5c7c3c51c507af62ec8b0ad60bc87caf0
SHA18ab77bc62ae43153b96ff992380fb2e7e81605e7
SHA256df0f9f5e7d29178969304f004639de4299e283981605f97c3964a7d861b795de
SHA512a8de03dc5d8b3e510d9d48a79336a26e800aeccb6c4648666d68145b28458f0ba552538cb47c2712236288be93c075411a0795fe0af1975b15240742e60e69c6