Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/02/2025, 20:49
Static task
static1
Behavioral task
behavioral1
Sample
ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df.exe
Resource
win10v2004-20250207-en
General
-
Target
ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df.exe
-
Size
546KB
-
MD5
bd64270ddd4665196a13698621e445ea
-
SHA1
c7321df1931694529559cd4b358a221e27b6034f
-
SHA256
ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df
-
SHA512
f00a0e6fbe4733a5346d6cf2e1e6a3c3ffd3ef3e9fd3fc0e1a382c16bb88d199d2d71c9a39b915cc0057f434d0eb77cc21492bb35e1e9ed31d280ac89343ad9c
-
SSDEEP
6144:+TbDkbqcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37kGbrKhYcR7tjAeCXTTzm:EbYecW7KEZlPzCy37kGnKhV5qJXTnk1H
Malware Config
Extracted
darkcomet
Y.S.M
microsft.redirectme.net:1603
DC_MUTEX-UF59SW5
-
InstallPath
MSDCSC\NvidiaaStrreamer.exe
-
gencode
CSknSw2UGJAw
-
install
true
-
offline_keylogger
true
-
password
01061660256
-
persistence
true
-
reg_key
nvdiaxnd
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\NvidiaaStrreamer.exe" TempPrivateY.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" NvidiaaStrreamer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile NvidiaaStrreamer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" NvidiaaStrreamer.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" NvidiaaStrreamer.exe -
Windows security bypass 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" NvidiaaStrreamer.exe -
Executes dropped EXE 3 IoCs
pid Process 2348 TempYP.exe 2056 TempPrivateY.exe 2900 NvidiaaStrreamer.exe -
Loads dropped DLL 5 IoCs
pid Process 2492 ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df.exe 2348 TempYP.exe 2348 TempYP.exe 2056 TempPrivateY.exe 2056 TempPrivateY.exe -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" NvidiaaStrreamer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\nvdiaxnd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\NvidiaaStrreamer.exe" TempPrivateY.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\nvdiaxnd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\NvidiaaStrreamer.exe" NvidiaaStrreamer.exe -
resource yara_rule behavioral1/files/0x00060000000186c8-23.dat upx behavioral1/memory/2056-26-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2900-43-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2056-85-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2900-86-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2900-87-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2900-88-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2900-89-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2900-90-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2900-91-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2900-92-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2900-93-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2900-94-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2900-95-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2900-96-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2900-97-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempYP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempPrivateY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NvidiaaStrreamer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2900 NvidiaaStrreamer.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2056 TempPrivateY.exe Token: SeSecurityPrivilege 2056 TempPrivateY.exe Token: SeTakeOwnershipPrivilege 2056 TempPrivateY.exe Token: SeLoadDriverPrivilege 2056 TempPrivateY.exe Token: SeSystemProfilePrivilege 2056 TempPrivateY.exe Token: SeSystemtimePrivilege 2056 TempPrivateY.exe Token: SeProfSingleProcessPrivilege 2056 TempPrivateY.exe Token: SeIncBasePriorityPrivilege 2056 TempPrivateY.exe Token: SeCreatePagefilePrivilege 2056 TempPrivateY.exe Token: SeBackupPrivilege 2056 TempPrivateY.exe Token: SeRestorePrivilege 2056 TempPrivateY.exe Token: SeShutdownPrivilege 2056 TempPrivateY.exe Token: SeDebugPrivilege 2056 TempPrivateY.exe Token: SeSystemEnvironmentPrivilege 2056 TempPrivateY.exe Token: SeChangeNotifyPrivilege 2056 TempPrivateY.exe Token: SeRemoteShutdownPrivilege 2056 TempPrivateY.exe Token: SeUndockPrivilege 2056 TempPrivateY.exe Token: SeManageVolumePrivilege 2056 TempPrivateY.exe Token: SeImpersonatePrivilege 2056 TempPrivateY.exe Token: SeCreateGlobalPrivilege 2056 TempPrivateY.exe Token: 33 2056 TempPrivateY.exe Token: 34 2056 TempPrivateY.exe Token: 35 2056 TempPrivateY.exe Token: SeIncreaseQuotaPrivilege 2900 NvidiaaStrreamer.exe Token: SeSecurityPrivilege 2900 NvidiaaStrreamer.exe Token: SeTakeOwnershipPrivilege 2900 NvidiaaStrreamer.exe Token: SeLoadDriverPrivilege 2900 NvidiaaStrreamer.exe Token: SeSystemProfilePrivilege 2900 NvidiaaStrreamer.exe Token: SeSystemtimePrivilege 2900 NvidiaaStrreamer.exe Token: SeProfSingleProcessPrivilege 2900 NvidiaaStrreamer.exe Token: SeIncBasePriorityPrivilege 2900 NvidiaaStrreamer.exe Token: SeCreatePagefilePrivilege 2900 NvidiaaStrreamer.exe Token: SeBackupPrivilege 2900 NvidiaaStrreamer.exe Token: SeRestorePrivilege 2900 NvidiaaStrreamer.exe Token: SeShutdownPrivilege 2900 NvidiaaStrreamer.exe Token: SeDebugPrivilege 2900 NvidiaaStrreamer.exe Token: SeSystemEnvironmentPrivilege 2900 NvidiaaStrreamer.exe Token: SeChangeNotifyPrivilege 2900 NvidiaaStrreamer.exe Token: SeRemoteShutdownPrivilege 2900 NvidiaaStrreamer.exe Token: SeUndockPrivilege 2900 NvidiaaStrreamer.exe Token: SeManageVolumePrivilege 2900 NvidiaaStrreamer.exe Token: SeImpersonatePrivilege 2900 NvidiaaStrreamer.exe Token: SeCreateGlobalPrivilege 2900 NvidiaaStrreamer.exe Token: 33 2900 NvidiaaStrreamer.exe Token: 34 2900 NvidiaaStrreamer.exe Token: 35 2900 NvidiaaStrreamer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2900 NvidiaaStrreamer.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2348 2492 ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df.exe 30 PID 2492 wrote to memory of 2348 2492 ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df.exe 30 PID 2492 wrote to memory of 2348 2492 ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df.exe 30 PID 2492 wrote to memory of 2348 2492 ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df.exe 30 PID 2348 wrote to memory of 2056 2348 TempYP.exe 31 PID 2348 wrote to memory of 2056 2348 TempYP.exe 31 PID 2348 wrote to memory of 2056 2348 TempYP.exe 31 PID 2348 wrote to memory of 2056 2348 TempYP.exe 31 PID 2056 wrote to memory of 2900 2056 TempPrivateY.exe 32 PID 2056 wrote to memory of 2900 2056 TempPrivateY.exe 32 PID 2056 wrote to memory of 2900 2056 TempPrivateY.exe 32 PID 2056 wrote to memory of 2900 2056 TempPrivateY.exe 32 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33 PID 2900 wrote to memory of 2740 2900 NvidiaaStrreamer.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df.exe"C:\Users\Admin\AppData\Local\Temp\ee36ebfcb37f36c0f9f285132adefa64feebc0212b8f0930f0c2b2017bb931df.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\TempYP.exe"C:\Users\Admin\AppData\Local\TempYP.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\TempPrivateY.exe"C:\Users\Admin\AppData\Local\TempPrivateY.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\MSDCSC\NvidiaaStrreamer.exe"C:\Users\Admin\AppData\Local\Temp\MSDCSC\NvidiaaStrreamer.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\notepad.exenotepad5⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5f662fd5fcfecb7a8760845a3a2d7009c
SHA15b66cc9ae4cccdb16395c5fd5f4a5489a6243191
SHA256f536393b307a1c6ed2f83bcffafd024473d0398d026815fdd169786b0fa06619
SHA51211666a075b197590a9d7118b7fb3c669d9e8cda7b394e0c094dc6fa41eaed66905821b5ab279b1f8fbf5cc550d3385a4ea6e693429a185ad1f84f5ed18b83827
-
Filesize
501KB
MD5e2ff4b23c1ed9f8235aed9bac00ada99
SHA14effd801928ccc3e1dd152e6bc3d6e7573ccaff0
SHA256e2525421f00cd946d6cf552b1919f47ca880cc5962533aaa58efc40b0c112029
SHA512ac1425907e69547d90ad27a2239ccc32478359fa66b4e893330858f1d7d3772c61482ec4be472ad6f0d7753010c66af865d298bc6302553a9d5d78433ea21078