Analysis
-
max time kernel
47s -
max time network
23s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 13:07
Static task
static1
Behavioral task
behavioral1
Sample
d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe
Resource
win7-20241010-en
General
-
Target
d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe
-
Size
520KB
-
MD5
8aa060a42822fb2f56e0dc00689cdf00
-
SHA1
22ea29f7f24c591e62d3a74f07f859a17fbb9e0f
-
SHA256
d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425b
-
SHA512
056eed58046e1b387cbe85e105d8269b7cb96fd4ae61663e50e36079a4c0a0f4dd499bed86724a04f7d11bc1b1306c12d25c78117434755aa1d1b26fb8ad25be
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbb:f9fC3hh29Ya77A90aFtDfT5IMbb
Malware Config
Extracted
darkcomet
PrivateEye
ratblackshades.no-ip.biz:1604
DC_MUTEX-ACC1R98
-
gencode
8GG5LVVGljSF
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 2932 winupd.exe 2500 winupd.exe 3052 winupd.exe -
Loads dropped DLL 4 IoCs
pid Process 2564 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 2564 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 2932 winupd.exe 2932 winupd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\winupd.exe -notray" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2064 set thread context of 2564 2064 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 31 PID 2932 set thread context of 2500 2932 winupd.exe 33 PID 2932 set thread context of 3052 2932 winupd.exe 34 -
resource yara_rule behavioral1/memory/3052-61-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3052-65-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3052-66-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3052-58-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3052-53-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3052-51-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3052-74-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3052-78-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3052-77-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3052-71-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3052-70-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3052-83-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3052-84-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3052-85-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3052-86-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3052-87-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3052-88-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1204-89-0x0000000140000000-0x00000001405E8000-memory.dmp upx behavioral1/memory/3052-91-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3052-94-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2720 ipconfig.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1300 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1204 taskmgr.exe 1204 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3052 winupd.exe Token: SeSecurityPrivilege 3052 winupd.exe Token: SeTakeOwnershipPrivilege 3052 winupd.exe Token: SeLoadDriverPrivilege 3052 winupd.exe Token: SeSystemProfilePrivilege 3052 winupd.exe Token: SeSystemtimePrivilege 3052 winupd.exe Token: SeProfSingleProcessPrivilege 3052 winupd.exe Token: SeIncBasePriorityPrivilege 3052 winupd.exe Token: SeCreatePagefilePrivilege 3052 winupd.exe Token: SeBackupPrivilege 3052 winupd.exe Token: SeRestorePrivilege 3052 winupd.exe Token: SeShutdownPrivilege 3052 winupd.exe Token: SeDebugPrivilege 3052 winupd.exe Token: SeSystemEnvironmentPrivilege 3052 winupd.exe Token: SeChangeNotifyPrivilege 3052 winupd.exe Token: SeRemoteShutdownPrivilege 3052 winupd.exe Token: SeUndockPrivilege 3052 winupd.exe Token: SeManageVolumePrivilege 3052 winupd.exe Token: SeImpersonatePrivilege 3052 winupd.exe Token: SeCreateGlobalPrivilege 3052 winupd.exe Token: 33 3052 winupd.exe Token: 34 3052 winupd.exe Token: 35 3052 winupd.exe Token: SeDebugPrivilege 1204 taskmgr.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2064 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 2564 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 2932 winupd.exe 2500 winupd.exe 3052 winupd.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2564 2064 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 31 PID 2064 wrote to memory of 2564 2064 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 31 PID 2064 wrote to memory of 2564 2064 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 31 PID 2064 wrote to memory of 2564 2064 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 31 PID 2064 wrote to memory of 2564 2064 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 31 PID 2064 wrote to memory of 2564 2064 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 31 PID 2064 wrote to memory of 2564 2064 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 31 PID 2064 wrote to memory of 2564 2064 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 31 PID 2064 wrote to memory of 2564 2064 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 31 PID 2564 wrote to memory of 2932 2564 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 32 PID 2564 wrote to memory of 2932 2564 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 32 PID 2564 wrote to memory of 2932 2564 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 32 PID 2564 wrote to memory of 2932 2564 d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe 32 PID 2932 wrote to memory of 2500 2932 winupd.exe 33 PID 2932 wrote to memory of 2500 2932 winupd.exe 33 PID 2932 wrote to memory of 2500 2932 winupd.exe 33 PID 2932 wrote to memory of 2500 2932 winupd.exe 33 PID 2932 wrote to memory of 2500 2932 winupd.exe 33 PID 2932 wrote to memory of 2500 2932 winupd.exe 33 PID 2932 wrote to memory of 2500 2932 winupd.exe 33 PID 2932 wrote to memory of 2500 2932 winupd.exe 33 PID 2932 wrote to memory of 2500 2932 winupd.exe 33 PID 2932 wrote to memory of 3052 2932 winupd.exe 34 PID 2932 wrote to memory of 3052 2932 winupd.exe 34 PID 2932 wrote to memory of 3052 2932 winupd.exe 34 PID 2932 wrote to memory of 3052 2932 winupd.exe 34 PID 2932 wrote to memory of 3052 2932 winupd.exe 34 PID 2932 wrote to memory of 3052 2932 winupd.exe 34 PID 2932 wrote to memory of 3052 2932 winupd.exe 34 PID 2932 wrote to memory of 3052 2932 winupd.exe 34 PID 2500 wrote to memory of 2720 2500 winupd.exe 35 PID 2500 wrote to memory of 2720 2500 winupd.exe 35 PID 2500 wrote to memory of 2720 2500 winupd.exe 35 PID 2500 wrote to memory of 2720 2500 winupd.exe 35 PID 2500 wrote to memory of 2720 2500 winupd.exe 35 PID 2500 wrote to memory of 2720 2500 winupd.exe 35 PID 2720 wrote to memory of 2752 2720 ipconfig.exe 37 PID 2720 wrote to memory of 2752 2720 ipconfig.exe 37 PID 2720 wrote to memory of 2752 2720 ipconfig.exe 37 PID 2720 wrote to memory of 2752 2720 ipconfig.exe 37 PID 2752 wrote to memory of 1300 2752 cmd.exe 39 PID 2752 wrote to memory of 1300 2752 cmd.exe 39 PID 2752 wrote to memory of 1300 2752 cmd.exe 39 PID 2752 wrote to memory of 1300 2752 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe"C:\Users\Admin\AppData\Local\Temp\d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe"C:\Users\Admin\AppData\Local\Temp\d172679e08b720d86c0bf850612d5b6c3c85f41b3605701e2e19d2b6e5a8425bN.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exeC:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LDTCKUAQ.bat" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v WinUpdate /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1300
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3052
-
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2612
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5cac890d00365d07b9ca89def17cc3a36
SHA16fa99679ede791c16b5d3e6d243a98e8bbdb7eab
SHA2564f98ddee89760080a5c8a93666d2f5c97be52b741265ef4d1ce9aaebf05f12da
SHA512124dc0b18e13425bde43bcbbe2a99005928e398bffcb458d498aac9e754bc5b92b703270667800876c60b0801343f2de8c6b9a1eebafd80bb4f6d5dc295dd9f1
-
Filesize
520KB
MD57e91449de36e23bc115cc87be502fdf1
SHA1a203a1c1f903e7a40e9c0c7d2408b0bbf7c26a5e
SHA256b6e5ebf4f81f225ada7704c2ae27c4b52d385102cd58ace3ae85982000b0e0c7
SHA512e2482aaed48fc75f04b2d8879a4363749414b300246c6b96c930f5e50b11c19374d22150aba481f7478f89884f7c4002be0ad689a93591355c7759cbf7b3aba1