Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2025, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
81d4ae23ba6fda401f23dcd6fe0e5ab0d074cabc55da653c21443df29efed2c1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
81d4ae23ba6fda401f23dcd6fe0e5ab0d074cabc55da653c21443df29efed2c1.exe
Resource
win10v2004-20250129-en
General
-
Target
81d4ae23ba6fda401f23dcd6fe0e5ab0d074cabc55da653c21443df29efed2c1.exe
-
Size
304KB
-
MD5
90e6a2469d871d04bee95fca6c9e9c55
-
SHA1
a2defc9af6b677b5940362f7f496ac54eedc58e9
-
SHA256
81d4ae23ba6fda401f23dcd6fe0e5ab0d074cabc55da653c21443df29efed2c1
-
SHA512
922b7dee8e9f574a82cc0e96c6dd141315e0a9b32f9ce677bc2e4860c2c8296617d3ab6c79010a35fb42564ebeb1bafb0f04c1a6e6dc4826cb51221a21e57005
-
SSDEEP
6144:XsBlY9Z0moB/jMIzk+AUygl+faCEmV34FIYxboEbo:zLAQ+A3gpmNYxboMo
Malware Config
Signatures
-
Darkcomet family
-
Windows security bypass 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" explorer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\Control Panel\International\Geo\Nation 81d4ae23ba6fda401f23dcd6fe0e5ab0d074cabc55da653c21443df29efed2c1.exe -
Executes dropped EXE 1 IoCs
pid Process 4712 explorer.exe -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4712 set thread context of 3448 4712 explorer.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2360 81d4ae23ba6fda401f23dcd6fe0e5ab0d074cabc55da653c21443df29efed2c1.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 2360 81d4ae23ba6fda401f23dcd6fe0e5ab0d074cabc55da653c21443df29efed2c1.exe Token: SeIncreaseQuotaPrivilege 4712 explorer.exe Token: SeSecurityPrivilege 4712 explorer.exe Token: SeTakeOwnershipPrivilege 4712 explorer.exe Token: SeLoadDriverPrivilege 4712 explorer.exe Token: SeSystemProfilePrivilege 4712 explorer.exe Token: SeSystemtimePrivilege 4712 explorer.exe Token: SeProfSingleProcessPrivilege 4712 explorer.exe Token: SeIncBasePriorityPrivilege 4712 explorer.exe Token: SeCreatePagefilePrivilege 4712 explorer.exe Token: SeBackupPrivilege 4712 explorer.exe Token: SeRestorePrivilege 4712 explorer.exe Token: SeShutdownPrivilege 4712 explorer.exe Token: SeDebugPrivilege 4712 explorer.exe Token: SeSystemEnvironmentPrivilege 4712 explorer.exe Token: SeChangeNotifyPrivilege 4712 explorer.exe Token: SeRemoteShutdownPrivilege 4712 explorer.exe Token: SeUndockPrivilege 4712 explorer.exe Token: SeManageVolumePrivilege 4712 explorer.exe Token: SeImpersonatePrivilege 4712 explorer.exe Token: SeCreateGlobalPrivilege 4712 explorer.exe Token: 33 4712 explorer.exe Token: 34 4712 explorer.exe Token: 35 4712 explorer.exe Token: 36 4712 explorer.exe Token: SeIncreaseQuotaPrivilege 3448 explorer.exe Token: SeSecurityPrivilege 3448 explorer.exe Token: SeTakeOwnershipPrivilege 3448 explorer.exe Token: SeLoadDriverPrivilege 3448 explorer.exe Token: SeSystemProfilePrivilege 3448 explorer.exe Token: SeSystemtimePrivilege 3448 explorer.exe Token: SeProfSingleProcessPrivilege 3448 explorer.exe Token: SeIncBasePriorityPrivilege 3448 explorer.exe Token: SeCreatePagefilePrivilege 3448 explorer.exe Token: SeBackupPrivilege 3448 explorer.exe Token: SeRestorePrivilege 3448 explorer.exe Token: SeShutdownPrivilege 3448 explorer.exe Token: SeDebugPrivilege 3448 explorer.exe Token: SeSystemEnvironmentPrivilege 3448 explorer.exe Token: SeChangeNotifyPrivilege 3448 explorer.exe Token: SeRemoteShutdownPrivilege 3448 explorer.exe Token: SeUndockPrivilege 3448 explorer.exe Token: SeManageVolumePrivilege 3448 explorer.exe Token: SeImpersonatePrivilege 3448 explorer.exe Token: SeCreateGlobalPrivilege 3448 explorer.exe Token: 33 3448 explorer.exe Token: 34 3448 explorer.exe Token: 35 3448 explorer.exe Token: 36 3448 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3448 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2360 wrote to memory of 4712 2360 81d4ae23ba6fda401f23dcd6fe0e5ab0d074cabc55da653c21443df29efed2c1.exe 88 PID 2360 wrote to memory of 4712 2360 81d4ae23ba6fda401f23dcd6fe0e5ab0d074cabc55da653c21443df29efed2c1.exe 88 PID 2360 wrote to memory of 4712 2360 81d4ae23ba6fda401f23dcd6fe0e5ab0d074cabc55da653c21443df29efed2c1.exe 88 PID 4712 wrote to memory of 3448 4712 explorer.exe 95 PID 4712 wrote to memory of 3448 4712 explorer.exe 95 PID 4712 wrote to memory of 3448 4712 explorer.exe 95 PID 4712 wrote to memory of 3448 4712 explorer.exe 95 PID 4712 wrote to memory of 3448 4712 explorer.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\81d4ae23ba6fda401f23dcd6fe0e5ab0d074cabc55da653c21443df29efed2c1.exe"C:\Users\Admin\AppData\Local\Temp\81d4ae23ba6fda401f23dcd6fe0e5ab0d074cabc55da653c21443df29efed2c1.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Roaming\explorer.exe"C:\Users\Admin\AppData\Roaming\explorer.exe"2⤵
- Windows security bypass
- Checks BIOS information in registry
- Executes dropped EXE
- Windows security modification
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Windows security bypass
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3448
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5813c33b6cbd5ab4c3f7511649a20cef5
SHA13b694fc0c4eef1495bde4e704c3272213d52bbf9
SHA256c6f22a2868f89e29b6ee5acc9f82aab9a9d6f1a8b2f9527418ee53b2222132e7
SHA512e3af68d8c4c0a851fb80d172a225921cdfee50712c14f9bda5f11a4d8f9fcac23241deef6a8e8dd14091bdc65e498c95cc1de03b543f422e3929ccc36cf99803