Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/02/2025, 01:10
Static task
static1
Behavioral task
behavioral1
Sample
7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe
Resource
win7-20240903-en
General
-
Target
7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe
-
Size
520KB
-
MD5
aa1b641a968b36cd5cd0f1cce072625a
-
SHA1
3527e53e431d93beb612e14a489ef3970fc26efd
-
SHA256
7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae
-
SHA512
54b5860229440d3ffd627197760a2ada4941d492a3b679872a6036f39b2d308b9e79e29a8726abffc04f3855d20d3510a83310fd90d200a7b7285e65d37f4fc5
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbI:f9fC3hh29Ya77A90aFtDfT5IMbI
Malware Config
Extracted
darkcomet
PrivateEye
ratblackshades.no-ip.biz:1604
DC_MUTEX-ACC1R98
-
gencode
8GG5LVVGljSF
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 2252 winupd.exe 2696 winupd.exe 2716 winupd.exe -
Loads dropped DLL 2 IoCs
pid Process 2416 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe 2416 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\winupd.exe -notray" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1048 set thread context of 2416 1048 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe 28 PID 2252 set thread context of 2696 2252 winupd.exe 30 PID 2252 set thread context of 2716 2252 winupd.exe 31 -
resource yara_rule behavioral1/memory/2716-61-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-57-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-52-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-50-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-59-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-70-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-72-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-73-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-71-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-74-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-75-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-80-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-81-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-82-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-83-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-84-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-85-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-86-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-87-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-88-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-89-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-90-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-91-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-92-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-93-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-94-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2716-95-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2300 ipconfig.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2324 reg.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2716 winupd.exe Token: SeSecurityPrivilege 2716 winupd.exe Token: SeTakeOwnershipPrivilege 2716 winupd.exe Token: SeLoadDriverPrivilege 2716 winupd.exe Token: SeSystemProfilePrivilege 2716 winupd.exe Token: SeSystemtimePrivilege 2716 winupd.exe Token: SeProfSingleProcessPrivilege 2716 winupd.exe Token: SeIncBasePriorityPrivilege 2716 winupd.exe Token: SeCreatePagefilePrivilege 2716 winupd.exe Token: SeBackupPrivilege 2716 winupd.exe Token: SeRestorePrivilege 2716 winupd.exe Token: SeShutdownPrivilege 2716 winupd.exe Token: SeDebugPrivilege 2716 winupd.exe Token: SeSystemEnvironmentPrivilege 2716 winupd.exe Token: SeChangeNotifyPrivilege 2716 winupd.exe Token: SeRemoteShutdownPrivilege 2716 winupd.exe Token: SeUndockPrivilege 2716 winupd.exe Token: SeManageVolumePrivilege 2716 winupd.exe Token: SeImpersonatePrivilege 2716 winupd.exe Token: SeCreateGlobalPrivilege 2716 winupd.exe Token: 33 2716 winupd.exe Token: 34 2716 winupd.exe Token: 35 2716 winupd.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1048 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe 2416 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe 2252 winupd.exe 2696 winupd.exe 2716 winupd.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2416 1048 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe 28 PID 1048 wrote to memory of 2416 1048 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe 28 PID 1048 wrote to memory of 2416 1048 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe 28 PID 1048 wrote to memory of 2416 1048 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe 28 PID 1048 wrote to memory of 2416 1048 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe 28 PID 1048 wrote to memory of 2416 1048 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe 28 PID 1048 wrote to memory of 2416 1048 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe 28 PID 1048 wrote to memory of 2416 1048 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe 28 PID 1048 wrote to memory of 2416 1048 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe 28 PID 2416 wrote to memory of 2252 2416 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe 29 PID 2416 wrote to memory of 2252 2416 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe 29 PID 2416 wrote to memory of 2252 2416 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe 29 PID 2416 wrote to memory of 2252 2416 7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe 29 PID 2252 wrote to memory of 2696 2252 winupd.exe 30 PID 2252 wrote to memory of 2696 2252 winupd.exe 30 PID 2252 wrote to memory of 2696 2252 winupd.exe 30 PID 2252 wrote to memory of 2696 2252 winupd.exe 30 PID 2252 wrote to memory of 2696 2252 winupd.exe 30 PID 2252 wrote to memory of 2696 2252 winupd.exe 30 PID 2252 wrote to memory of 2696 2252 winupd.exe 30 PID 2252 wrote to memory of 2696 2252 winupd.exe 30 PID 2252 wrote to memory of 2696 2252 winupd.exe 30 PID 2252 wrote to memory of 2716 2252 winupd.exe 31 PID 2252 wrote to memory of 2716 2252 winupd.exe 31 PID 2252 wrote to memory of 2716 2252 winupd.exe 31 PID 2252 wrote to memory of 2716 2252 winupd.exe 31 PID 2252 wrote to memory of 2716 2252 winupd.exe 31 PID 2252 wrote to memory of 2716 2252 winupd.exe 31 PID 2252 wrote to memory of 2716 2252 winupd.exe 31 PID 2252 wrote to memory of 2716 2252 winupd.exe 31 PID 2696 wrote to memory of 2300 2696 winupd.exe 32 PID 2696 wrote to memory of 2300 2696 winupd.exe 32 PID 2696 wrote to memory of 2300 2696 winupd.exe 32 PID 2696 wrote to memory of 2300 2696 winupd.exe 32 PID 2696 wrote to memory of 2300 2696 winupd.exe 32 PID 2696 wrote to memory of 2300 2696 winupd.exe 32 PID 2300 wrote to memory of 2996 2300 ipconfig.exe 34 PID 2300 wrote to memory of 2996 2300 ipconfig.exe 34 PID 2300 wrote to memory of 2996 2300 ipconfig.exe 34 PID 2300 wrote to memory of 2996 2300 ipconfig.exe 34 PID 2996 wrote to memory of 2324 2996 cmd.exe 36 PID 2996 wrote to memory of 2324 2996 cmd.exe 36 PID 2996 wrote to memory of 2324 2996 cmd.exe 36 PID 2996 wrote to memory of 2324 2996 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe"C:\Users\Admin\AppData\Local\Temp\7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe"C:\Users\Admin\AppData\Local\Temp\7762ea69ae765c6c305dba7b2517a11db2f5f0434338537e792fc28ae3ed3bae.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exeC:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HKWWAXSQ.bat" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v WinUpdate /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2324
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5cac890d00365d07b9ca89def17cc3a36
SHA16fa99679ede791c16b5d3e6d243a98e8bbdb7eab
SHA2564f98ddee89760080a5c8a93666d2f5c97be52b741265ef4d1ce9aaebf05f12da
SHA512124dc0b18e13425bde43bcbbe2a99005928e398bffcb458d498aac9e754bc5b92b703270667800876c60b0801343f2de8c6b9a1eebafd80bb4f6d5dc295dd9f1
-
Filesize
520KB
MD5d94337995db61bb9010a708602009fa6
SHA19ce4757682b2f0303ddcda5bb8a342dd0702d9f2
SHA256b5627a3f89361bc93c577787fa64c733f55d3024067a6687b6a20359f8d99f40
SHA51218437635da68947e961d887d1876ef38e9e336e9e40b566fd8f3e117ae1ebc868d979949f5c4d99a7f16e767e03a8deb6baff7465fce217840215f9ef1c43f92