Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2025, 22:40
Behavioral task
behavioral1
Sample
3ff1c7d87a0a6c981923823c4bc4fbb00c9812ea14c7dbd2439864121b9d718a.exe
Resource
win7-20241023-en
General
-
Target
3ff1c7d87a0a6c981923823c4bc4fbb00c9812ea14c7dbd2439864121b9d718a.exe
-
Size
589KB
-
MD5
9755c15f9f8af5a6fa8e38b4aaf43958
-
SHA1
d17b8d4431713bf3aa61753c12dd42ffa7a54f74
-
SHA256
3ff1c7d87a0a6c981923823c4bc4fbb00c9812ea14c7dbd2439864121b9d718a
-
SHA512
14e1d0708f8c0d4497a1c192592ff058e79f5126ad3722d1220947b913b98938db594da861ab159091b42b018a85841ac38b87824a1d59b6ae1e8c3c6f87f219
-
SSDEEP
12288:9ffLtEIQIu7k5sscLsD5iZqHyscNExmj1NT5BzYQR8NxOz8Y5oSQ:9fTOIQIu7k5DzvLxm5Bl8sA
Malware Config
Extracted
darkcomet
Botnet
letsgoboom.no-ip.info:1604
DC_MUTEX-JCT2X8G
-
gencode
k*q67FD+Sz0#
-
install
false
-
offline_keylogger
true
-
password
runescaped
-
persistence
false
Signatures
-
Darkcomet family
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate mcsft.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation 3ff1c7d87a0a6c981923823c4bc4fbb00c9812ea14c7dbd2439864121b9d718a.exe -
Executes dropped EXE 3 IoCs
pid Process 3660 mcsft.exe 460 mcsft.exe 4020 mcsft.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mcrosoft = "C:\\Users\\Admin\\AppData\\Roaming\\mcsft.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3660 set thread context of 460 3660 mcsft.exe 91 PID 3660 set thread context of 4020 3660 mcsft.exe 92 -
resource yara_rule behavioral2/memory/1372-0-0x0000000000400000-0x00000000007EA000-memory.dmp upx behavioral2/files/0x000d000000023bfd-15.dat upx behavioral2/memory/3660-28-0x0000000000400000-0x00000000007EA000-memory.dmp upx behavioral2/memory/1372-30-0x0000000000400000-0x00000000007EA000-memory.dmp upx behavioral2/memory/460-36-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-33-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-37-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/4020-38-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/4020-41-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/4020-43-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3660-46-0x0000000000400000-0x00000000007EA000-memory.dmp upx behavioral2/memory/460-48-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-49-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-52-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-51-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-50-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-47-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-53-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/4020-54-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/460-55-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-57-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-58-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-60-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-62-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-64-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-66-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-68-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-70-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-72-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-74-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-76-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-78-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-80-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/460-82-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcsft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcsft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ff1c7d87a0a6c981923823c4bc4fbb00c9812ea14c7dbd2439864121b9d718a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcsft.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mcsft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mcsft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mcsft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier mcsft.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier mcsft.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 4020 mcsft.exe Token: SeIncreaseQuotaPrivilege 460 mcsft.exe Token: SeSecurityPrivilege 460 mcsft.exe Token: SeTakeOwnershipPrivilege 460 mcsft.exe Token: SeLoadDriverPrivilege 460 mcsft.exe Token: SeSystemProfilePrivilege 460 mcsft.exe Token: SeSystemtimePrivilege 460 mcsft.exe Token: SeProfSingleProcessPrivilege 460 mcsft.exe Token: SeIncBasePriorityPrivilege 460 mcsft.exe Token: SeCreatePagefilePrivilege 460 mcsft.exe Token: SeBackupPrivilege 460 mcsft.exe Token: SeRestorePrivilege 460 mcsft.exe Token: SeShutdownPrivilege 460 mcsft.exe Token: SeDebugPrivilege 460 mcsft.exe Token: SeSystemEnvironmentPrivilege 460 mcsft.exe Token: SeChangeNotifyPrivilege 460 mcsft.exe Token: SeRemoteShutdownPrivilege 460 mcsft.exe Token: SeUndockPrivilege 460 mcsft.exe Token: SeManageVolumePrivilege 460 mcsft.exe Token: SeImpersonatePrivilege 460 mcsft.exe Token: SeCreateGlobalPrivilege 460 mcsft.exe Token: 33 460 mcsft.exe Token: 34 460 mcsft.exe Token: 35 460 mcsft.exe Token: 36 460 mcsft.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1372 3ff1c7d87a0a6c981923823c4bc4fbb00c9812ea14c7dbd2439864121b9d718a.exe 3660 mcsft.exe 4020 mcsft.exe 460 mcsft.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1372 wrote to memory of 2656 1372 3ff1c7d87a0a6c981923823c4bc4fbb00c9812ea14c7dbd2439864121b9d718a.exe 86 PID 1372 wrote to memory of 2656 1372 3ff1c7d87a0a6c981923823c4bc4fbb00c9812ea14c7dbd2439864121b9d718a.exe 86 PID 1372 wrote to memory of 2656 1372 3ff1c7d87a0a6c981923823c4bc4fbb00c9812ea14c7dbd2439864121b9d718a.exe 86 PID 2656 wrote to memory of 4036 2656 cmd.exe 89 PID 2656 wrote to memory of 4036 2656 cmd.exe 89 PID 2656 wrote to memory of 4036 2656 cmd.exe 89 PID 1372 wrote to memory of 3660 1372 3ff1c7d87a0a6c981923823c4bc4fbb00c9812ea14c7dbd2439864121b9d718a.exe 90 PID 1372 wrote to memory of 3660 1372 3ff1c7d87a0a6c981923823c4bc4fbb00c9812ea14c7dbd2439864121b9d718a.exe 90 PID 1372 wrote to memory of 3660 1372 3ff1c7d87a0a6c981923823c4bc4fbb00c9812ea14c7dbd2439864121b9d718a.exe 90 PID 3660 wrote to memory of 460 3660 mcsft.exe 91 PID 3660 wrote to memory of 460 3660 mcsft.exe 91 PID 3660 wrote to memory of 460 3660 mcsft.exe 91 PID 3660 wrote to memory of 460 3660 mcsft.exe 91 PID 3660 wrote to memory of 460 3660 mcsft.exe 91 PID 3660 wrote to memory of 460 3660 mcsft.exe 91 PID 3660 wrote to memory of 460 3660 mcsft.exe 91 PID 3660 wrote to memory of 460 3660 mcsft.exe 91 PID 3660 wrote to memory of 4020 3660 mcsft.exe 92 PID 3660 wrote to memory of 4020 3660 mcsft.exe 92 PID 3660 wrote to memory of 4020 3660 mcsft.exe 92 PID 3660 wrote to memory of 4020 3660 mcsft.exe 92 PID 3660 wrote to memory of 4020 3660 mcsft.exe 92 PID 3660 wrote to memory of 4020 3660 mcsft.exe 92 PID 3660 wrote to memory of 4020 3660 mcsft.exe 92 PID 3660 wrote to memory of 4020 3660 mcsft.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ff1c7d87a0a6c981923823c4bc4fbb00c9812ea14c7dbd2439864121b9d718a.exe"C:\Users\Admin\AppData\Local\Temp\3ff1c7d87a0a6c981923823c4bc4fbb00c9812ea14c7dbd2439864121b9d718a.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gTSNl.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Mcrosoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\mcsft.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4036
-
-
-
C:\Users\Admin\AppData\Roaming\mcsft.exe"C:\Users\Admin\AppData\Roaming\mcsft.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Roaming\mcsft.exeC:\Users\Admin\AppData\Roaming\mcsft.exe3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:460
-
-
C:\Users\Admin\AppData\Roaming\mcsft.exeC:\Users\Admin\AppData\Roaming\mcsft.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135B
MD5a5feca573884d76f559b996d45e8ad9a
SHA10e81a993f3af4e31d60653dc2513186f0495f1c8
SHA256c98e20d46d6465febb5d29cfab51241521ea5d6cd621f5e18b9b7d6fbfac3f0f
SHA512a9239648b5f15eac4d4151b6e1bdc81065eeaeb101404c2a0126f03bc87f1e6a57206bfa07a44379e9d3bba889e4497a9991ff41fb109099b01512df3dc3cbda
-
Filesize
589KB
MD572e702d095a5d694fb97b94e4b2998e1
SHA14911841201e70ddf2771ddc39cf0cb5afdee59a1
SHA25691e55ca120be8dd233b7682406e9d7b35986a87494449f24f46170d246131ca0
SHA5129533dbf81f4ea1c8858e2e870a5d80702c43c4dbc5c954cbfccdd210f56a6898a0593e14ed71cd59f645e141bba946023a5b46401981b305411e7795aed173d1