Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
25/03/2025, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe
Resource
win7-20250207-en
General
-
Target
22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe
-
Size
642KB
-
MD5
ca6c591a7ae42873de9f0f512107e693
-
SHA1
e572562e39c39154b46821df84d4750034f61a81
-
SHA256
22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4
-
SHA512
76e46e04b0489aefd11ccfa7e263c56ace00bb1b139de64f878cc8e0e75b3096be0715028ae888fe0896378238e31d6d71c8757aeba5caa625924acd191f51c0
-
SSDEEP
12288:XwLf1o3E5LNco0u9nrFXAjqOKl0aDcoOvB2tdGH4sm+omaeZ:XQdo0g3utujqpXDcoOmdGH4sm1ma
Malware Config
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Extracted
darkcomet
Guest16
ariesdevil2.no-ip.org:1604
DC_MUTEX-2ZKGCGV
-
gencode
gePxyhGT8qXk
-
install
false
-
offline_keylogger
true
-
password
0123456789
-
persistence
false
Signatures
-
Darkcomet family
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\windows updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nJVmSUns.exe" 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\windows updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nJVmSUns.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1996 set thread context of 2388 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2388 vbc.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe Token: SeIncreaseQuotaPrivilege 2388 vbc.exe Token: SeSecurityPrivilege 2388 vbc.exe Token: SeTakeOwnershipPrivilege 2388 vbc.exe Token: SeLoadDriverPrivilege 2388 vbc.exe Token: SeSystemProfilePrivilege 2388 vbc.exe Token: SeSystemtimePrivilege 2388 vbc.exe Token: SeProfSingleProcessPrivilege 2388 vbc.exe Token: SeIncBasePriorityPrivilege 2388 vbc.exe Token: SeCreatePagefilePrivilege 2388 vbc.exe Token: SeBackupPrivilege 2388 vbc.exe Token: SeRestorePrivilege 2388 vbc.exe Token: SeShutdownPrivilege 2388 vbc.exe Token: SeDebugPrivilege 2388 vbc.exe Token: SeSystemEnvironmentPrivilege 2388 vbc.exe Token: SeChangeNotifyPrivilege 2388 vbc.exe Token: SeRemoteShutdownPrivilege 2388 vbc.exe Token: SeUndockPrivilege 2388 vbc.exe Token: SeManageVolumePrivilege 2388 vbc.exe Token: SeImpersonatePrivilege 2388 vbc.exe Token: SeCreateGlobalPrivilege 2388 vbc.exe Token: 33 2388 vbc.exe Token: 34 2388 vbc.exe Token: 35 2388 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 DllHost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2388 vbc.exe 2088 DllHost.exe 2088 DllHost.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2388 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 1996 wrote to memory of 2388 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 1996 wrote to memory of 2388 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 1996 wrote to memory of 2388 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 1996 wrote to memory of 2388 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 1996 wrote to memory of 2388 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 1996 wrote to memory of 2388 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 1996 wrote to memory of 2388 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 1996 wrote to memory of 2388 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 1996 wrote to memory of 2388 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 1996 wrote to memory of 2388 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 1996 wrote to memory of 2388 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 1996 wrote to memory of 2388 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 2388 wrote to memory of 2932 2388 vbc.exe 32 PID 1996 wrote to memory of 2744 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 33 PID 1996 wrote to memory of 2744 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 33 PID 1996 wrote to memory of 2744 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 33 PID 1996 wrote to memory of 2744 1996 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 33 PID 2744 wrote to memory of 2236 2744 cmd.exe 35 PID 2744 wrote to memory of 2236 2744 cmd.exe 35 PID 2744 wrote to memory of 2236 2744 cmd.exe 35 PID 2744 wrote to memory of 2236 2744 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe"C:\Users\Admin\AppData\Local\Temp\22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵
- System Location Discovery: System Language Discovery
PID:2932
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "windows updater" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\nJVmSUns.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "windows updater" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\nJVmSUns.exe3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2236
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD538f1f24cae2fdf2f70035c6b994631aa
SHA1cd19d0aaad291afd731e0fde703582eb863b03ca
SHA2566b923685591aebc60352bd526f6fcfd835084fff40a4b246c7492eb1a0113fa7
SHA512e365e5698528f96260c84f84fb7fac0f4be5bdf0a33cd7407971ac93643a1ad8b452c650ec3a2865009832457fadc2fef53fc1c275ac643317b18d9d85f6d048