Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
FakeWebcam6.2.exe
Resource
win7-20240729-en
General
-
Target
FakeWebcam6.2.exe
-
Size
632KB
-
MD5
85ea1c7e59b63c1731d642e576b8d5bd
-
SHA1
44ffbcbe5bed1be774c97f24a60a70186e525510
-
SHA256
8d18c9599f3f743b6f3abb2d20887ab1f4178e53cd2948cd226d2f189dd65804
-
SHA512
1ce0cfd5ee9eaa2b272eb240a06c01ae79e6a5650646c73dff2c7bc4227ca4fbad623afccd521dab8d97f4cdb5fd47ff671cfe6f386a46964491f20cf867d96b
-
SSDEEP
12288:6Gfkwc4ybTNaaaqvE9mJknkSD9MfsTXbsO4uaFNHRLIEvXU195:NMwVW2kHxw
Malware Config
Extracted
darkcomet
Hacked
kingkingofhacker.no-ip.biz:1604
DC_MUTEX-XYZSRMS
-
InstallPath
FakeWebcam.exe
-
gencode
DNUieDl1NhPQ
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\FakeWebcam.exe" FakeWebcam6.2.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation FakeWebcam6.2.exe -
Executes dropped EXE 2 IoCs
pid Process 928 FakeWebcam.exe 2172 FakeWebcam.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\FakeWebcam.exe" FakeWebcam6.2.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1392 set thread context of 4632 1392 FakeWebcam6.2.exe 83 PID 928 set thread context of 2172 928 FakeWebcam.exe 87 -
resource yara_rule behavioral2/memory/4632-2-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4632-4-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4632-5-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4632-7-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4632-6-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4632-8-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-25-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-27-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-28-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-26-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4632-29-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-31-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-32-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-33-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-34-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-35-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-36-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-37-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-38-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-39-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-40-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-41-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-42-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-43-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-44-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-45-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-46-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/2172-47-0x0000000000400000-0x00000000004E8000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FakeWebcam6.2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FakeWebcam6.2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FakeWebcam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FakeWebcam.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4632 FakeWebcam6.2.exe Token: SeSecurityPrivilege 4632 FakeWebcam6.2.exe Token: SeTakeOwnershipPrivilege 4632 FakeWebcam6.2.exe Token: SeLoadDriverPrivilege 4632 FakeWebcam6.2.exe Token: SeSystemProfilePrivilege 4632 FakeWebcam6.2.exe Token: SeSystemtimePrivilege 4632 FakeWebcam6.2.exe Token: SeProfSingleProcessPrivilege 4632 FakeWebcam6.2.exe Token: SeIncBasePriorityPrivilege 4632 FakeWebcam6.2.exe Token: SeCreatePagefilePrivilege 4632 FakeWebcam6.2.exe Token: SeBackupPrivilege 4632 FakeWebcam6.2.exe Token: SeRestorePrivilege 4632 FakeWebcam6.2.exe Token: SeShutdownPrivilege 4632 FakeWebcam6.2.exe Token: SeDebugPrivilege 4632 FakeWebcam6.2.exe Token: SeSystemEnvironmentPrivilege 4632 FakeWebcam6.2.exe Token: SeChangeNotifyPrivilege 4632 FakeWebcam6.2.exe Token: SeRemoteShutdownPrivilege 4632 FakeWebcam6.2.exe Token: SeUndockPrivilege 4632 FakeWebcam6.2.exe Token: SeManageVolumePrivilege 4632 FakeWebcam6.2.exe Token: SeImpersonatePrivilege 4632 FakeWebcam6.2.exe Token: SeCreateGlobalPrivilege 4632 FakeWebcam6.2.exe Token: 33 4632 FakeWebcam6.2.exe Token: 34 4632 FakeWebcam6.2.exe Token: 35 4632 FakeWebcam6.2.exe Token: 36 4632 FakeWebcam6.2.exe Token: SeIncreaseQuotaPrivilege 2172 FakeWebcam.exe Token: SeSecurityPrivilege 2172 FakeWebcam.exe Token: SeTakeOwnershipPrivilege 2172 FakeWebcam.exe Token: SeLoadDriverPrivilege 2172 FakeWebcam.exe Token: SeSystemProfilePrivilege 2172 FakeWebcam.exe Token: SeSystemtimePrivilege 2172 FakeWebcam.exe Token: SeProfSingleProcessPrivilege 2172 FakeWebcam.exe Token: SeIncBasePriorityPrivilege 2172 FakeWebcam.exe Token: SeCreatePagefilePrivilege 2172 FakeWebcam.exe Token: SeBackupPrivilege 2172 FakeWebcam.exe Token: SeRestorePrivilege 2172 FakeWebcam.exe Token: SeShutdownPrivilege 2172 FakeWebcam.exe Token: SeDebugPrivilege 2172 FakeWebcam.exe Token: SeSystemEnvironmentPrivilege 2172 FakeWebcam.exe Token: SeChangeNotifyPrivilege 2172 FakeWebcam.exe Token: SeRemoteShutdownPrivilege 2172 FakeWebcam.exe Token: SeUndockPrivilege 2172 FakeWebcam.exe Token: SeManageVolumePrivilege 2172 FakeWebcam.exe Token: SeImpersonatePrivilege 2172 FakeWebcam.exe Token: SeCreateGlobalPrivilege 2172 FakeWebcam.exe Token: 33 2172 FakeWebcam.exe Token: 34 2172 FakeWebcam.exe Token: 35 2172 FakeWebcam.exe Token: 36 2172 FakeWebcam.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2172 FakeWebcam.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1392 wrote to memory of 4632 1392 FakeWebcam6.2.exe 83 PID 1392 wrote to memory of 4632 1392 FakeWebcam6.2.exe 83 PID 1392 wrote to memory of 4632 1392 FakeWebcam6.2.exe 83 PID 1392 wrote to memory of 4632 1392 FakeWebcam6.2.exe 83 PID 1392 wrote to memory of 4632 1392 FakeWebcam6.2.exe 83 PID 1392 wrote to memory of 4632 1392 FakeWebcam6.2.exe 83 PID 1392 wrote to memory of 4632 1392 FakeWebcam6.2.exe 83 PID 1392 wrote to memory of 4632 1392 FakeWebcam6.2.exe 83 PID 4632 wrote to memory of 928 4632 FakeWebcam6.2.exe 86 PID 4632 wrote to memory of 928 4632 FakeWebcam6.2.exe 86 PID 4632 wrote to memory of 928 4632 FakeWebcam6.2.exe 86 PID 928 wrote to memory of 2172 928 FakeWebcam.exe 87 PID 928 wrote to memory of 2172 928 FakeWebcam.exe 87 PID 928 wrote to memory of 2172 928 FakeWebcam.exe 87 PID 928 wrote to memory of 2172 928 FakeWebcam.exe 87 PID 928 wrote to memory of 2172 928 FakeWebcam.exe 87 PID 928 wrote to memory of 2172 928 FakeWebcam.exe 87 PID 928 wrote to memory of 2172 928 FakeWebcam.exe 87 PID 928 wrote to memory of 2172 928 FakeWebcam.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\FakeWebcam6.2.exe"C:\Users\Admin\AppData\Local\Temp\FakeWebcam6.2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\FakeWebcam6.2.exeC:\Users\Admin\AppData\Local\Temp\FakeWebcam6.2.exe2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\Documents\FakeWebcam.exe"C:\Users\Admin\Documents\FakeWebcam.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\Documents\FakeWebcam.exeC:\Users\Admin\Documents\FakeWebcam.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2172
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
632KB
MD585ea1c7e59b63c1731d642e576b8d5bd
SHA144ffbcbe5bed1be774c97f24a60a70186e525510
SHA2568d18c9599f3f743b6f3abb2d20887ab1f4178e53cd2948cd226d2f189dd65804
SHA5121ce0cfd5ee9eaa2b272eb240a06c01ae79e6a5650646c73dff2c7bc4227ca4fbad623afccd521dab8d97f4cdb5fd47ff671cfe6f386a46964491f20cf867d96b