Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2025, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
FacebookHacked/FacebookHackv2.2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FacebookHacked/FacebookHackv2.2.exe
Resource
win10v2004-20250129-en
General
-
Target
FacebookHacked/FacebookHackv2.2.exe
-
Size
4.1MB
-
MD5
4bca334a69c17d69c2aeb7d9cc633b7b
-
SHA1
cf6dfeed77cfef2cee73f32aa6f67a36182ee61c
-
SHA256
21b0d20a1d399102e301d31d8eee3ff7c3c21eb2e650358be715c40fbe595cd6
-
SHA512
ae03461bbccd013f6d71befbe83fea3206f66d0d5bb0877a484fdd810604791dc70040a8678efd28f22fd525128f26fd409f05f50667414bcdc975107563b29f
-
SSDEEP
24576:pvRq+x3lWY20zFni/Kep61glV93e0JeL+bxDaYZu9db43Iqs8pw2woGDsY7PB+2G:H1/FSp61+/esa4o9vi835KH
Malware Config
Extracted
darkcomet
Virus
administrator.redirectme.net:1604
DC_MUTEX-MTS8GLL
-
gencode
Ke3DAwXqc98j
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 24 IoCs
resource yara_rule behavioral2/memory/1312-3-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-4-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-6-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-7-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-10-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/files/0x0009000000023c5e-14.dat family_blackshades behavioral2/memory/1312-40-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-39-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-43-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-44-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-45-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-47-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-48-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-50-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-51-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-52-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-54-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-55-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-56-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-58-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-59-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-60-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-62-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades behavioral2/memory/1312-63-0x0000000000400000-0x00000000006A0000-memory.dmp family_blackshades -
Darkcomet family
-
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\7CVPP5QO9A.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7CVPP5QO9A.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\7CVPP5QO9A.exe = "C:\\Users\\Admin\\AppData\\Roaming\\7CVPP5QO9A.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe -
Executes dropped EXE 2 IoCs
pid Process 4284 7CVPP5QO9A.EXE 2136 FACEBOOKHACKV2.EXE -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4952 set thread context of 1312 4952 FacebookHackv2.2.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CVPP5QO9A.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FACEBOOKHACKV2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FacebookHackv2.2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2528 reg.exe 1216 reg.exe 3856 reg.exe 1308 reg.exe -
Suspicious use of AdjustPrivilegeToken 59 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1312 vbc.exe Token: SeSecurityPrivilege 1312 vbc.exe Token: SeTakeOwnershipPrivilege 1312 vbc.exe Token: SeLoadDriverPrivilege 1312 vbc.exe Token: SeSystemProfilePrivilege 1312 vbc.exe Token: SeSystemtimePrivilege 1312 vbc.exe Token: SeProfSingleProcessPrivilege 1312 vbc.exe Token: SeIncBasePriorityPrivilege 1312 vbc.exe Token: SeCreatePagefilePrivilege 1312 vbc.exe Token: SeBackupPrivilege 1312 vbc.exe Token: SeRestorePrivilege 1312 vbc.exe Token: SeShutdownPrivilege 1312 vbc.exe Token: SeDebugPrivilege 1312 vbc.exe Token: SeSystemEnvironmentPrivilege 1312 vbc.exe Token: SeChangeNotifyPrivilege 1312 vbc.exe Token: SeRemoteShutdownPrivilege 1312 vbc.exe Token: SeUndockPrivilege 1312 vbc.exe Token: SeManageVolumePrivilege 1312 vbc.exe Token: SeImpersonatePrivilege 1312 vbc.exe Token: SeCreateGlobalPrivilege 1312 vbc.exe Token: 33 1312 vbc.exe Token: 34 1312 vbc.exe Token: 35 1312 vbc.exe Token: 36 1312 vbc.exe Token: 1 4284 7CVPP5QO9A.EXE Token: SeCreateTokenPrivilege 4284 7CVPP5QO9A.EXE Token: SeAssignPrimaryTokenPrivilege 4284 7CVPP5QO9A.EXE Token: SeLockMemoryPrivilege 4284 7CVPP5QO9A.EXE Token: SeIncreaseQuotaPrivilege 4284 7CVPP5QO9A.EXE Token: SeMachineAccountPrivilege 4284 7CVPP5QO9A.EXE Token: SeTcbPrivilege 4284 7CVPP5QO9A.EXE Token: SeSecurityPrivilege 4284 7CVPP5QO9A.EXE Token: SeTakeOwnershipPrivilege 4284 7CVPP5QO9A.EXE Token: SeLoadDriverPrivilege 4284 7CVPP5QO9A.EXE Token: SeSystemProfilePrivilege 4284 7CVPP5QO9A.EXE Token: SeSystemtimePrivilege 4284 7CVPP5QO9A.EXE Token: SeProfSingleProcessPrivilege 4284 7CVPP5QO9A.EXE Token: SeIncBasePriorityPrivilege 4284 7CVPP5QO9A.EXE Token: SeCreatePagefilePrivilege 4284 7CVPP5QO9A.EXE Token: SeCreatePermanentPrivilege 4284 7CVPP5QO9A.EXE Token: SeBackupPrivilege 4284 7CVPP5QO9A.EXE Token: SeRestorePrivilege 4284 7CVPP5QO9A.EXE Token: SeShutdownPrivilege 4284 7CVPP5QO9A.EXE Token: SeDebugPrivilege 4284 7CVPP5QO9A.EXE Token: SeAuditPrivilege 4284 7CVPP5QO9A.EXE Token: SeSystemEnvironmentPrivilege 4284 7CVPP5QO9A.EXE Token: SeChangeNotifyPrivilege 4284 7CVPP5QO9A.EXE Token: SeRemoteShutdownPrivilege 4284 7CVPP5QO9A.EXE Token: SeUndockPrivilege 4284 7CVPP5QO9A.EXE Token: SeSyncAgentPrivilege 4284 7CVPP5QO9A.EXE Token: SeEnableDelegationPrivilege 4284 7CVPP5QO9A.EXE Token: SeManageVolumePrivilege 4284 7CVPP5QO9A.EXE Token: SeImpersonatePrivilege 4284 7CVPP5QO9A.EXE Token: SeCreateGlobalPrivilege 4284 7CVPP5QO9A.EXE Token: 31 4284 7CVPP5QO9A.EXE Token: 32 4284 7CVPP5QO9A.EXE Token: 33 4284 7CVPP5QO9A.EXE Token: 34 4284 7CVPP5QO9A.EXE Token: 35 4284 7CVPP5QO9A.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4284 7CVPP5QO9A.EXE 4284 7CVPP5QO9A.EXE 4284 7CVPP5QO9A.EXE 4284 7CVPP5QO9A.EXE 1312 vbc.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 4952 wrote to memory of 1312 4952 FacebookHackv2.2.exe 86 PID 4952 wrote to memory of 1312 4952 FacebookHackv2.2.exe 86 PID 4952 wrote to memory of 1312 4952 FacebookHackv2.2.exe 86 PID 4952 wrote to memory of 1312 4952 FacebookHackv2.2.exe 86 PID 4952 wrote to memory of 1312 4952 FacebookHackv2.2.exe 86 PID 4952 wrote to memory of 1312 4952 FacebookHackv2.2.exe 86 PID 4952 wrote to memory of 1312 4952 FacebookHackv2.2.exe 86 PID 4952 wrote to memory of 1312 4952 FacebookHackv2.2.exe 86 PID 4952 wrote to memory of 1312 4952 FacebookHackv2.2.exe 86 PID 4952 wrote to memory of 1312 4952 FacebookHackv2.2.exe 86 PID 4952 wrote to memory of 1312 4952 FacebookHackv2.2.exe 86 PID 4952 wrote to memory of 1312 4952 FacebookHackv2.2.exe 86 PID 4952 wrote to memory of 1312 4952 FacebookHackv2.2.exe 86 PID 4952 wrote to memory of 1312 4952 FacebookHackv2.2.exe 86 PID 1312 wrote to memory of 4284 1312 vbc.exe 88 PID 1312 wrote to memory of 4284 1312 vbc.exe 88 PID 1312 wrote to memory of 4284 1312 vbc.exe 88 PID 1312 wrote to memory of 2136 1312 vbc.exe 89 PID 1312 wrote to memory of 2136 1312 vbc.exe 89 PID 1312 wrote to memory of 2136 1312 vbc.exe 89 PID 4284 wrote to memory of 5064 4284 7CVPP5QO9A.EXE 90 PID 4284 wrote to memory of 5064 4284 7CVPP5QO9A.EXE 90 PID 4284 wrote to memory of 5064 4284 7CVPP5QO9A.EXE 90 PID 4284 wrote to memory of 1992 4284 7CVPP5QO9A.EXE 91 PID 4284 wrote to memory of 1992 4284 7CVPP5QO9A.EXE 91 PID 4284 wrote to memory of 1992 4284 7CVPP5QO9A.EXE 91 PID 4284 wrote to memory of 2192 4284 7CVPP5QO9A.EXE 92 PID 4284 wrote to memory of 2192 4284 7CVPP5QO9A.EXE 92 PID 4284 wrote to memory of 2192 4284 7CVPP5QO9A.EXE 92 PID 4284 wrote to memory of 5080 4284 7CVPP5QO9A.EXE 93 PID 4284 wrote to memory of 5080 4284 7CVPP5QO9A.EXE 93 PID 4284 wrote to memory of 5080 4284 7CVPP5QO9A.EXE 93 PID 5080 wrote to memory of 1308 5080 cmd.exe 98 PID 5080 wrote to memory of 1308 5080 cmd.exe 98 PID 5080 wrote to memory of 1308 5080 cmd.exe 98 PID 1992 wrote to memory of 2528 1992 cmd.exe 99 PID 1992 wrote to memory of 2528 1992 cmd.exe 99 PID 1992 wrote to memory of 2528 1992 cmd.exe 99 PID 5064 wrote to memory of 1216 5064 cmd.exe 100 PID 5064 wrote to memory of 1216 5064 cmd.exe 100 PID 5064 wrote to memory of 1216 5064 cmd.exe 100 PID 2192 wrote to memory of 3856 2192 cmd.exe 101 PID 2192 wrote to memory of 3856 2192 cmd.exe 101 PID 2192 wrote to memory of 3856 2192 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\FacebookHacked\FacebookHackv2.2.exe"C:\Users\Admin\AppData\Local\Temp\FacebookHacked\FacebookHackv2.2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\7CVPP5QO9A.EXE"C:\Users\Admin\AppData\Local\Temp\7CVPP5QO9A.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1216
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\7CVPP5QO9A.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7CVPP5QO9A.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\7CVPP5QO9A.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7CVPP5QO9A.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2528
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3856
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\7CVPP5QO9A.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7CVPP5QO9A.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\7CVPP5QO9A.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7CVPP5QO9A.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\FACEBOOKHACKV2.EXE"C:\Users\Admin\AppData\Local\Temp\FACEBOOKHACKV2.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2136
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD5a3024f35423851dd369ca51c7f299fff
SHA112c8399316c3663a23d33b3031a45c646598e03e
SHA25665b6381e8a4be0ed252d6e4ac37a691d43e225b7db777cde92d59de054a8682f
SHA5122ce463ee05f83cffe2389ff57c8129aac5783640a46cd580f37c91ff9be9321a41c5b469ec569a4751657f17d7c1b4b07f088203ba47959e0ef0d488b5897f5e
-
Filesize
1.5MB
MD520f87e338177f18e6a47c8be1934069c
SHA15116ef19273b49bcb3a9c67cb83128391cf2b9e4
SHA25670bc57942080488abe4a4cb1d2310e49a0ba6b52cd28ec7782375fe3dcad2753
SHA512e42a8d3d487b1b6bfaa00aee90b407c6bf8caef75288efd8079b7cc6bc6305eb56ff52252720829b1f74e04d3c143ae6501ce497150179a72d0bfb3df3bef60f