Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25/03/2025, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe
Resource
win7-20241010-en
General
-
Target
22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe
-
Size
642KB
-
MD5
ca6c591a7ae42873de9f0f512107e693
-
SHA1
e572562e39c39154b46821df84d4750034f61a81
-
SHA256
22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4
-
SHA512
76e46e04b0489aefd11ccfa7e263c56ace00bb1b139de64f878cc8e0e75b3096be0715028ae888fe0896378238e31d6d71c8757aeba5caa625924acd191f51c0
-
SSDEEP
12288:XwLf1o3E5LNco0u9nrFXAjqOKl0aDcoOvB2tdGH4sm+omaeZ:XQdo0g3utujqpXDcoOmdGH4sm1ma
Malware Config
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Extracted
darkcomet
Guest16
ariesdevil2.no-ip.org:1604
DC_MUTEX-2ZKGCGV
-
gencode
gePxyhGT8qXk
-
install
false
-
offline_keylogger
true
-
password
0123456789
-
persistence
false
Signatures
-
Darkcomet family
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\windows updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\FarCBAaz.exe" 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\windows updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\FarCBAaz.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3040 set thread context of 2844 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2844 vbc.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe Token: SeIncreaseQuotaPrivilege 2844 vbc.exe Token: SeSecurityPrivilege 2844 vbc.exe Token: SeTakeOwnershipPrivilege 2844 vbc.exe Token: SeLoadDriverPrivilege 2844 vbc.exe Token: SeSystemProfilePrivilege 2844 vbc.exe Token: SeSystemtimePrivilege 2844 vbc.exe Token: SeProfSingleProcessPrivilege 2844 vbc.exe Token: SeIncBasePriorityPrivilege 2844 vbc.exe Token: SeCreatePagefilePrivilege 2844 vbc.exe Token: SeBackupPrivilege 2844 vbc.exe Token: SeRestorePrivilege 2844 vbc.exe Token: SeShutdownPrivilege 2844 vbc.exe Token: SeDebugPrivilege 2844 vbc.exe Token: SeSystemEnvironmentPrivilege 2844 vbc.exe Token: SeChangeNotifyPrivilege 2844 vbc.exe Token: SeRemoteShutdownPrivilege 2844 vbc.exe Token: SeUndockPrivilege 2844 vbc.exe Token: SeManageVolumePrivilege 2844 vbc.exe Token: SeImpersonatePrivilege 2844 vbc.exe Token: SeCreateGlobalPrivilege 2844 vbc.exe Token: 33 2844 vbc.exe Token: 34 2844 vbc.exe Token: 35 2844 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2724 DllHost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2844 vbc.exe 2724 DllHost.exe 2724 DllHost.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2844 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 3040 wrote to memory of 2844 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 3040 wrote to memory of 2844 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 3040 wrote to memory of 2844 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 3040 wrote to memory of 2844 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 3040 wrote to memory of 2844 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 3040 wrote to memory of 2844 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 3040 wrote to memory of 2844 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 3040 wrote to memory of 2844 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 3040 wrote to memory of 2844 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 3040 wrote to memory of 2844 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 3040 wrote to memory of 2844 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 3040 wrote to memory of 2844 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 30 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 2844 wrote to memory of 3048 2844 vbc.exe 31 PID 3040 wrote to memory of 1168 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 33 PID 3040 wrote to memory of 1168 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 33 PID 3040 wrote to memory of 1168 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 33 PID 3040 wrote to memory of 1168 3040 22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe 33 PID 1168 wrote to memory of 2600 1168 cmd.exe 35 PID 1168 wrote to memory of 2600 1168 cmd.exe 35 PID 1168 wrote to memory of 2600 1168 cmd.exe 35 PID 1168 wrote to memory of 2600 1168 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe"C:\Users\Admin\AppData\Local\Temp\22c39ee739643bb374b7b3ab27645b7a2b95581f335965365dc349d696f271d4.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵
- System Location Discovery: System Language Discovery
PID:3048
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "windows updater" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FarCBAaz.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "windows updater" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FarCBAaz.exe3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2600
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD538f1f24cae2fdf2f70035c6b994631aa
SHA1cd19d0aaad291afd731e0fde703582eb863b03ca
SHA2566b923685591aebc60352bd526f6fcfd835084fff40a4b246c7492eb1a0113fa7
SHA512e365e5698528f96260c84f84fb7fac0f4be5bdf0a33cd7407971ac93643a1ad8b452c650ec3a2865009832457fadc2fef53fc1c275ac643317b18d9d85f6d048