Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/02/2025, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe
Resource
win10v2004-20250207-en
General
-
Target
9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe
-
Size
618KB
-
MD5
fc6644242e58080f167d46d04cdb71e1
-
SHA1
9880ec5e986863a70b3c67a202d192823dde3ffc
-
SHA256
9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53
-
SHA512
799d56eb3a06e95b043f11e8389a88fbeb2f2e2a125839985d87938cc50df7388b07ff88a93af3eee91c3bf05dbed509355aced73f14fa1917b2c07dec7ef2b4
-
SSDEEP
12288:00nyfXuIBDtfuEQYu2G3S4ivrAhiUdNIHlYOG0Qqdn:Bny/f9uEQYFG3S4snyMbpvn
Malware Config
Extracted
darkcomet
Noob
qwezzkomet.ddns.net:1604
DC_MUTEX-QLSEJBG
-
InstallPath
IME\en-US\winint.exe
-
gencode
iE1Pc1blaQlU
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
NT Kernel & System
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\IME\\en-US\\winint.exe" svchost.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" winint.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winint.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" winint.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1500 attrib.exe 1204 attrib.exe -
Executes dropped EXE 5 IoCs
pid Process 2888 Start.exe 2536 Core.exe 2352 svchost.exe 2116 DEL.EXE 1664 winint.exe -
Loads dropped DLL 14 IoCs
pid Process 2084 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe 2084 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe 2084 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe 2084 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe 3004 cmd.exe 2536 Core.exe 2536 Core.exe 2536 Core.exe 2536 Core.exe 2536 Core.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\NT Kernel & System = "C:\\Windows\\IME\\en-US\\winint.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\NT Kernel & System = "C:\\Windows\\IME\\en-US\\winint.exe" winint.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\IME\en-US\Core\Start.exe 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe File created C:\Windows\IME\en-US\__tmp_rar_sfx_access_check_259451986 Core.exe File created C:\Windows\IME\en-US\Core\__tmp_rar_sfx_access_check_259451471 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe File opened for modification C:\Windows\IME\en-US\Core\Core.exe 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe File created C:\Windows\IME\en-US\Core\Start.exe 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe File opened for modification C:\Windows\IME\en-US attrib.exe File opened for modification C:\Windows\IME\en-US\Core 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe File created C:\Windows\IME\en-US\Core\Core.exe 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe File created C:\Windows\IME\en-US\svchost.exe Core.exe File opened for modification C:\Windows\IME\en-US\winint.exe svchost.exe File opened for modification C:\Windows\IME\en-US\ svchost.exe File opened for modification C:\Windows\IME\en-US\svchost.exe attrib.exe File opened for modification C:\Windows\IME\en-US\svchost.exe Core.exe File created C:\Windows\IME\en-US\winint.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Start.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Core.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2352 svchost.exe Token: SeSecurityPrivilege 2352 svchost.exe Token: SeTakeOwnershipPrivilege 2352 svchost.exe Token: SeLoadDriverPrivilege 2352 svchost.exe Token: SeSystemProfilePrivilege 2352 svchost.exe Token: SeSystemtimePrivilege 2352 svchost.exe Token: SeProfSingleProcessPrivilege 2352 svchost.exe Token: SeIncBasePriorityPrivilege 2352 svchost.exe Token: SeCreatePagefilePrivilege 2352 svchost.exe Token: SeBackupPrivilege 2352 svchost.exe Token: SeRestorePrivilege 2352 svchost.exe Token: SeShutdownPrivilege 2352 svchost.exe Token: SeDebugPrivilege 2352 svchost.exe Token: SeSystemEnvironmentPrivilege 2352 svchost.exe Token: SeChangeNotifyPrivilege 2352 svchost.exe Token: SeRemoteShutdownPrivilege 2352 svchost.exe Token: SeUndockPrivilege 2352 svchost.exe Token: SeManageVolumePrivilege 2352 svchost.exe Token: SeImpersonatePrivilege 2352 svchost.exe Token: SeCreateGlobalPrivilege 2352 svchost.exe Token: 33 2352 svchost.exe Token: 34 2352 svchost.exe Token: 35 2352 svchost.exe Token: SeIncreaseQuotaPrivilege 1664 winint.exe Token: SeSecurityPrivilege 1664 winint.exe Token: SeTakeOwnershipPrivilege 1664 winint.exe Token: SeLoadDriverPrivilege 1664 winint.exe Token: SeSystemProfilePrivilege 1664 winint.exe Token: SeSystemtimePrivilege 1664 winint.exe Token: SeProfSingleProcessPrivilege 1664 winint.exe Token: SeIncBasePriorityPrivilege 1664 winint.exe Token: SeCreatePagefilePrivilege 1664 winint.exe Token: SeBackupPrivilege 1664 winint.exe Token: SeRestorePrivilege 1664 winint.exe Token: SeShutdownPrivilege 1664 winint.exe Token: SeDebugPrivilege 1664 winint.exe Token: SeSystemEnvironmentPrivilege 1664 winint.exe Token: SeChangeNotifyPrivilege 1664 winint.exe Token: SeRemoteShutdownPrivilege 1664 winint.exe Token: SeUndockPrivilege 1664 winint.exe Token: SeManageVolumePrivilege 1664 winint.exe Token: SeImpersonatePrivilege 1664 winint.exe Token: SeCreateGlobalPrivilege 1664 winint.exe Token: 33 1664 winint.exe Token: 34 1664 winint.exe Token: 35 1664 winint.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1664 winint.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2888 2084 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe 31 PID 2084 wrote to memory of 2888 2084 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe 31 PID 2084 wrote to memory of 2888 2084 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe 31 PID 2084 wrote to memory of 2888 2084 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe 31 PID 2084 wrote to memory of 2888 2084 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe 31 PID 2084 wrote to memory of 2888 2084 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe 31 PID 2084 wrote to memory of 2888 2084 9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe 31 PID 2888 wrote to memory of 3004 2888 Start.exe 32 PID 2888 wrote to memory of 3004 2888 Start.exe 32 PID 2888 wrote to memory of 3004 2888 Start.exe 32 PID 2888 wrote to memory of 3004 2888 Start.exe 32 PID 2888 wrote to memory of 3004 2888 Start.exe 32 PID 2888 wrote to memory of 3004 2888 Start.exe 32 PID 2888 wrote to memory of 3004 2888 Start.exe 32 PID 3004 wrote to memory of 2536 3004 cmd.exe 34 PID 3004 wrote to memory of 2536 3004 cmd.exe 34 PID 3004 wrote to memory of 2536 3004 cmd.exe 34 PID 3004 wrote to memory of 2536 3004 cmd.exe 34 PID 3004 wrote to memory of 2536 3004 cmd.exe 34 PID 3004 wrote to memory of 2536 3004 cmd.exe 34 PID 3004 wrote to memory of 2536 3004 cmd.exe 34 PID 2536 wrote to memory of 2352 2536 Core.exe 35 PID 2536 wrote to memory of 2352 2536 Core.exe 35 PID 2536 wrote to memory of 2352 2536 Core.exe 35 PID 2536 wrote to memory of 2352 2536 Core.exe 35 PID 2536 wrote to memory of 2352 2536 Core.exe 35 PID 2536 wrote to memory of 2352 2536 Core.exe 35 PID 2536 wrote to memory of 2352 2536 Core.exe 35 PID 2352 wrote to memory of 2476 2352 svchost.exe 36 PID 2352 wrote to memory of 2476 2352 svchost.exe 36 PID 2352 wrote to memory of 2476 2352 svchost.exe 36 PID 2352 wrote to memory of 2476 2352 svchost.exe 36 PID 2352 wrote to memory of 2476 2352 svchost.exe 36 PID 2352 wrote to memory of 2476 2352 svchost.exe 36 PID 2352 wrote to memory of 2476 2352 svchost.exe 36 PID 2352 wrote to memory of 2636 2352 svchost.exe 37 PID 2352 wrote to memory of 2636 2352 svchost.exe 37 PID 2352 wrote to memory of 2636 2352 svchost.exe 37 PID 2352 wrote to memory of 2636 2352 svchost.exe 37 PID 2352 wrote to memory of 2636 2352 svchost.exe 37 PID 2352 wrote to memory of 2636 2352 svchost.exe 37 PID 2352 wrote to memory of 2636 2352 svchost.exe 37 PID 2352 wrote to memory of 2116 2352 svchost.exe 40 PID 2352 wrote to memory of 2116 2352 svchost.exe 40 PID 2352 wrote to memory of 2116 2352 svchost.exe 40 PID 2352 wrote to memory of 2116 2352 svchost.exe 40 PID 2352 wrote to memory of 2116 2352 svchost.exe 40 PID 2352 wrote to memory of 2116 2352 svchost.exe 40 PID 2352 wrote to memory of 2116 2352 svchost.exe 40 PID 2476 wrote to memory of 1500 2476 cmd.exe 41 PID 2476 wrote to memory of 1500 2476 cmd.exe 41 PID 2476 wrote to memory of 1500 2476 cmd.exe 41 PID 2476 wrote to memory of 1500 2476 cmd.exe 41 PID 2476 wrote to memory of 1500 2476 cmd.exe 41 PID 2476 wrote to memory of 1500 2476 cmd.exe 41 PID 2476 wrote to memory of 1500 2476 cmd.exe 41 PID 2636 wrote to memory of 1204 2636 cmd.exe 42 PID 2636 wrote to memory of 1204 2636 cmd.exe 42 PID 2636 wrote to memory of 1204 2636 cmd.exe 42 PID 2636 wrote to memory of 1204 2636 cmd.exe 42 PID 2636 wrote to memory of 1204 2636 cmd.exe 42 PID 2636 wrote to memory of 1204 2636 cmd.exe 42 PID 2636 wrote to memory of 1204 2636 cmd.exe 42 PID 2116 wrote to memory of 584 2116 DEL.EXE 43 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1500 attrib.exe 1204 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe"C:\Users\Admin\AppData\Local\Temp\9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\IME\en-US\Core\Start.exe"C:\Windows\IME\en-US\Core\Start.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EADC.tmp\Start.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\IME\en-US\Core\Core.exeCore.exe -p34533f5353fh443gi45g3hgio4h4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\IME\en-US\svchost.exe"C:\Windows\IME\en-US\svchost.exe"5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\IME\en-US\svchost.exe" +s +h6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\IME\en-US\svchost.exe" +s +h7⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1500
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\IME\en-US" +s +h6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\IME\en-US" +s +h7⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1204
-
-
-
C:\Users\Admin\AppData\Local\Temp\DEL.EXE"C:\Users\Admin\AppData\Local\Temp\DEL.EXE"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5EA.tmp\Del.bat" "7⤵
- System Location Discovery: System Language Discovery
PID:584
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad6⤵
- System Location Discovery: System Language Discovery
PID:1372
-
-
C:\Windows\IME\en-US\winint.exe"C:\Windows\IME\en-US\winint.exe"6⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1664 -
C:\Windows\SysWOW64\notepad.exenotepad7⤵
- System Location Discovery: System Language Discovery
PID:1992
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD50dd7be343d4c404c956c220e2d595a00
SHA168ce8c2be7e17d449bee35b8cd257ccac0892c72
SHA256149ee28a3041b49aec3f259a2060aa0e8f6791f42163e0cc22a57c3377a55795
SHA5129d58f3e3963c9296353ec92993964333580c6fc1fbdd9c8506871422f2ed17b5128c09900804414121c20d138c5e1f0acd69022b8af7c62177f464888a6d6fd9
-
Filesize
24KB
MD5e8d073b16af601c459cf0a2fe6273cde
SHA193ddddfd1f1b98ea37d9faa9af34c7552f079d11
SHA2567f3edd352c0e933867ef0511347087013fff8defc6afdfffcb422eb9cd0c1f18
SHA5129cca8c056b2019c31177c7ebad6e1b2ef873d364da7878e2e9004170cc3ede506ada4fcda69cc753a2a40a4b854a1eaa1d5d708818617db73c4f5314d118fcd4
-
Filesize
38B
MD587d911d7e2a82e8c4ef5553240009a1c
SHA1e1418a471c277148376a3ba32baf5cb0248ad62a
SHA256463369daa69218c1b91b025bd59696e68096f612df75d45a69c6331183fa20bc
SHA512d9af43381cd4e06f105b6fe212d42e7187d538a405d38fbf76dcaa3e7b35b67fe11788983c3864db939323ad10d05d3767479058cac977794ced7358b8bb7e86
-
Filesize
492KB
MD51e3e929e3322895842b017ec1388e0d5
SHA1df4a8eb2a3e49aa67edc018759dbdec602ab4852
SHA25631275bd110dc0013ab7c510b77a2eb3b4a14adc41f3ccb0ef8a455810a37f45d
SHA512bdc2e226dde7bed4c8a64a734a10ceaa3b353ca29cf89a13017816541b391bf45053b3698398d3fb6e7c112d21e05b76d0898085d965847e09668d1f952bbba5
-
Filesize
24KB
MD5aea720b21fa014a1dbeb6880fca9db3c
SHA17431f43fefc4ee84d740146e85ad8d91c851449f
SHA2562c09a12c001c082c60cf43f984af4bd627987810bfcc735d5fe5e91f0423b4e3
SHA512e9a332063573218c7bf34cc73289e3841e6d98f1adaba83477c470867cb6fa1387a0d1298610cbd73d6f14afd6d979e9f0a69e3eed60dd876aacf46d8680fbe7
-
Filesize
683KB
MD52d3ff8b3115e8822031a345ae5be8a70
SHA15a5930fd44b1ae87116fa6217ebe4204f0798f13
SHA256a8b6ac32953856542c656a18d28e177b3f32472e5ba43a618e9bf25ed5e23ab6
SHA51275207a079e07d974ad219b544af366e3dc588a1e8ee0926ab4c94e7fa5f90351592ed6ad611a50ff91db6b319824f81e1de2036e4bd4181584ce083b31048ae7