Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
_____.exe

Overview

General Information

Sample name:_____.exe
Analysis ID:1580627
MD5:b620f1561ef43fdc7132375a63dd3e8d
SHA1:097594e519e510a5e7b69e2f8d367cc97c01c7e6
SHA256:424e8d889288010e58a66fa8c9008c22cef78dced0e46b59ee417cc9e746c23f
Tags:exeuser-zhuzhu0009
Infos:

Detection

DarkComet
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected DarkComet
AI detected suspicious sample
Installs a global keyboard hook
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Enables debug privileges
Enables driver privileges
Enables security privileges
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • _____.exe (PID: 6156 cmdline: "C:\Users\user\Desktop\_____.exe" MD5: B620F1561EF43FDC7132375A63DD3E8D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DarkCometDarkComet is one of the most famous RATs, developed by Jean-Pierre Lesueur in 2008. After being used in the Syrian civil war in 2011, Lesuer decided to stop developing the trojan. Indeed, DarkComet is able to enable control over a compromised system through use of a simple graphic user interface. Experts think that this user friendliness is the key of its mass success.
  • APT33
  • Lazarus Group
  • Operation C-Major
https://malpedia.caad.fkie.fraunhofer.de/details/win.darkcomet
{"MUTEX": "DC_MUTEX-5VE3E85", "SID": "Guest16", "FWB": "0", "NETDATA": ["king-hit.gl.at.ply.gg:25737"], "GENCODE": "rcJPlzKijYD9", "OFFLINEK": "1"}
SourceRuleDescriptionAuthorStrings
_____.exeJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    _____.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      _____.exeJoeSecurity_DarkCometRatYara detected DarkCometKevin Breen <kevin@techanarchy.net>
        _____.exeWindows_Trojan_Darkcomet_1df27bccunknownunknown
        • 0x82dbc:$a1: BTRESULTHTTP Flood|Http Flood task finished!|
        • 0x7d72d:$a2: is now open!|
        • 0x7d088:$a3: ActiveOnlineKeylogger
        • 0x7d78c:$a4: #BOT#RunPrompt
        • 0x7c834:$a5: GETMONITORS
        _____.exeRAT_DarkCometDetects DarkComet RATKevin Breen <kevin@techanarchy.net>
        • 0x7d8ac:$a1: #BOT#URLUpdate
        • 0x7d7c5:$a2: Command successfully executed!
        • 0x808:$b1: FastMM Borland Edition
        • 0x2b34c:$b2: %s, ClassID: %s
        • 0x72228:$b3: I wasn't able to open the hosts file
        • 0x7d6b0:$b4: #BOT#VisitUrl
        • 0x6c5c0:$b5: #KCMDDC
        Click to see the 4 entries
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.2031400989.000000000049D000.00000008.00000001.01000000.00000003.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          00000000.00000002.3278626802.000000000238A000.00000004.00001000.00020000.00000000.sdmpDarkComet_2DarkCometJean-Philippe Teissier / @Jipe_
          • 0x908:$c: DC_MUTEX-
          • 0x9a8:$k2: #KCMDDC51#-890
          00000000.00000002.3278626802.0000000002330000.00000004.00001000.00020000.00000000.sdmpDarkComet_2DarkCometJean-Philippe Teissier / @Jipe_
          • 0xe08:$a: #BEGIN DARKCOMET DATA --
          • 0xf88:$a: #BEGIN DARKCOMET DATA --
          • 0xea1:$b: #EOF DARKCOMET DATA --
          • 0xe29:$c: DC_MUTEX-
          • 0xfa9:$c: DC_MUTEX-
          00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
            00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_DarkCometRatYara detected DarkCometKevin Breen <kevin@techanarchy.net>
              Click to see the 13 entries
              SourceRuleDescriptionAuthorStrings
              0.0._____.exe.400000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                0.0._____.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                  0.0._____.exe.400000.0.unpackJoeSecurity_DarkCometRatYara detected DarkCometKevin Breen <kevin@techanarchy.net>
                    0.0._____.exe.400000.0.unpackWindows_Trojan_Darkcomet_1df27bccunknownunknown
                    • 0x82dbc:$a1: BTRESULTHTTP Flood|Http Flood task finished!|
                    • 0x7d72d:$a2: is now open!|
                    • 0x7d088:$a3: ActiveOnlineKeylogger
                    • 0x7d78c:$a4: #BOT#RunPrompt
                    • 0x7c834:$a5: GETMONITORS
                    0.0._____.exe.400000.0.unpackRAT_DarkCometDetects DarkComet RATKevin Breen <kevin@techanarchy.net>
                    • 0x7d8ac:$a1: #BOT#URLUpdate
                    • 0x7d7c5:$a2: Command successfully executed!
                    • 0x808:$b1: FastMM Borland Edition
                    • 0x2b34c:$b2: %s, ClassID: %s
                    • 0x72228:$b3: I wasn't able to open the hosts file
                    • 0x7d6b0:$b4: #BOT#VisitUrl
                    • 0x6c5c0:$b5: #KCMDDC
                    Click to see the 4 entries
                    No Sigma rule has matched
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: _____.exeAvira: detected
                    Source: _____.exeMalware Configuration Extractor: DarkComet {"MUTEX": "DC_MUTEX-5VE3E85", "SID": "Guest16", "FWB": "0", "NETDATA": ["king-hit.gl.at.ply.gg:25737"], "GENCODE": "rcJPlzKijYD9", "OFFLINEK": "1"}
                    Source: _____.exeVirustotal: Detection: 93%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
                    Source: _____.exeJoe Sandbox ML: detected
                    Source: _____.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                    Source: global trafficTCP traffic: 192.168.2.5:49704 -> 147.185.221.23:25737
                    Source: Joe Sandbox ViewIP Address: 147.185.221.23 147.185.221.23
                    Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: king-hit.gl.at.ply.gg

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Users\user\Desktop\_____.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\_____.exeJump to behavior
                    Source: Yara matchFile source: _____.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0._____.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.2031400989.000000000049D000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: _____.exe PID: 6156, type: MEMORYSTR

                    System Summary

                    barindex
                    Source: _____.exe, type: SAMPLEMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
                    Source: _____.exe, type: SAMPLEMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: _____.exe, type: SAMPLEMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
                    Source: _____.exe, type: SAMPLEMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
                    Source: _____.exe, type: SAMPLEMatched rule: DarkComet_4 Author: unknown
                    Source: _____.exe, type: SAMPLEMatched rule: Detects DarkComet Author: ditekSHen
                    Source: 0.0._____.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
                    Source: 0.0._____.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 0.0._____.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
                    Source: 0.0._____.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 0.0._____.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 Author: unknown
                    Source: 0.0._____.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet Author: ditekSHen
                    Source: 00000000.00000002.3278626802.000000000238A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
                    Source: 00000000.00000002.3278626802.0000000002330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
                    Source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
                    Source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
                    Source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
                    Source: Process Memory Space: _____.exe PID: 6156, type: MEMORYSTRMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
                    Source: Process Memory Space: _____.exe PID: 6156, type: MEMORYSTRMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: Process Memory Space: _____.exe PID: 6156, type: MEMORYSTRMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
                    Source: Process Memory Space: _____.exe PID: 6156, type: MEMORYSTRMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
                    Source: Process Memory Space: _____.exe PID: 6156, type: MEMORYSTRMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
                    Source: Process Memory Space: _____.exe PID: 6156, type: MEMORYSTRMatched rule: DarkComet_4 Author: unknown
                    Source: Yara matchFile source: _____.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0._____.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: _____.exe PID: 6156, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\_____.exeProcess token adjusted: Load DriverJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeProcess token adjusted: SecurityJump to behavior
                    Source: _____.exe, 00000000.00000000.2031442843.00000000004A4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMSRSAAP.EXEV vs _____.exe
                    Source: _____.exeBinary or memory string: OriginalFilenameMSRSAAP.EXEV vs _____.exe
                    Source: _____.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                    Source: _____.exe, type: SAMPLEMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
                    Source: _____.exe, type: SAMPLEMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
                    Source: _____.exe, type: SAMPLEMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
                    Source: _____.exe, type: SAMPLEMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
                    Source: _____.exe, type: SAMPLEMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
                    Source: _____.exe, type: SAMPLEMatched rule: MALWARE_Win_DarkComet author = ditekSHen, description = Detects DarkComet
                    Source: 0.0._____.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
                    Source: 0.0._____.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
                    Source: 0.0._____.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
                    Source: 0.0._____.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
                    Source: 0.0._____.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
                    Source: 0.0._____.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DarkComet author = ditekSHen, description = Detects DarkComet
                    Source: 00000000.00000002.3278626802.000000000238A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
                    Source: 00000000.00000002.3278626802.0000000002330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
                    Source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
                    Source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
                    Source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
                    Source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
                    Source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
                    Source: Process Memory Space: _____.exe PID: 6156, type: MEMORYSTRMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
                    Source: Process Memory Space: _____.exe PID: 6156, type: MEMORYSTRMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
                    Source: Process Memory Space: _____.exe PID: 6156, type: MEMORYSTRMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
                    Source: Process Memory Space: _____.exe PID: 6156, type: MEMORYSTRMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
                    Source: Process Memory Space: _____.exe PID: 6156, type: MEMORYSTRMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
                    Source: Process Memory Space: _____.exe PID: 6156, type: MEMORYSTRMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
                    Source: classification engineClassification label: mal92.troj.spyw.winEXE@1/0@1/1
                    Source: C:\Users\user\Desktop\_____.exeFile created: C:\Users\user\AppData\Roaming\dclogsJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeMutant created: \Sessions\1\BaseNamedObjects\DC_MUTEX-5VE3E85
                    Source: Yara matchFile source: _____.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0._____.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: C:\Users\user\Desktop\_____.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: _____.exeVirustotal: Detection: 93%
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: netapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: msacm32.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: netapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: shfolder.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: avicap32.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: winmmbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: winmmbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: msvfw32.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: napinsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: pnrpnsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: wshbth.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: winrnr.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\_____.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\_____.exeCode function: 0_2_02AFD3A6 push eax; retn 0057h0_2_02AFD3B5
                    Source: C:\Users\user\Desktop\_____.exeCode function: 0_2_02AFD3BC push eax; retn 0057h0_2_02AFD3BD
                    Source: C:\Users\user\Desktop\_____.exeCode function: 0_2_02AFCFB8 pushad ; iretd 0_2_02AFCFC9
                    Source: C:\Users\user\Desktop\_____.exeCode function: 0_2_02AFE314 push eax; retn 0057h0_2_02AFE315
                    Source: C:\Users\user\Desktop\_____.exeCode function: 0_2_02AFD2E0 push eax; retn 0057h0_2_02AFD2E1
                    Source: C:\Users\user\Desktop\_____.exeCode function: 0_2_02AFD3CC push eax; retn 0057h0_2_02AFD3CD
                    Source: C:\Users\user\Desktop\_____.exeCode function: 0_2_02AFD2D8 push eax; retn 0057h0_2_02AFD2D9
                    Source: _____.exe, 00000000.00000002.3278527921.000000000053E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: _____.exe, 00000000.00000002.3278527921.000000000053E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\_____.exeProcess token adjusted: DebugJump to behavior
                    Source: _____.exeBinary or memory string: Shell_traywndTrayNotifyWndTrayClockWClassjh<
                    Source: _____.exe, 00000000.00000002.3278626802.000000000238A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: _____.exeBinary or memory string: Shell_TrayWnd
                    Source: _____.exeBinary or memory string: Progman
                    Source: _____.exeBinary or memory string: Shell_TrayWndjjh
                    Source: _____.exeBinary or memory string: Progmanjhh
                    Source: _____.exeBinary or memory string: Shell_traywndTrayNotifyWndjh
                    Source: _____.exeBinary or memory string: ProgmanU
                    Source: _____.exe, 00000000.00000002.3278626802.000000000238A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Manager`
                    Source: _____.exeBinary or memory string: Shell_traywndTrayNotifyWndTrayClockWClassjh
                    Source: _____.exeBinary or memory string: ButtonShell_TrayWndj
                    Source: _____.exeBinary or memory string: Shell_traywndReBarWindow32jh
                    Source: _____.exeBinary or memory string: Shell_traywndReBarWindow32jhD
                    Source: _____.exeBinary or memory string: Shell_traywnd
                    Source: _____.exeBinary or memory string: Shell_TrayWndPjjh
                    Source: C:\Users\user\Desktop\_____.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                    LSASS Driver
                    1
                    Process Injection
                    1
                    Masquerading
                    11
                    Input Capture
                    1
                    Security Software Discovery
                    Remote Services11
                    Input Capture
                    1
                    Non-Standard Port
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    DLL Side-Loading
                    1
                    LSASS Driver
                    1
                    Process Injection
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Non-Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    1
                    Obfuscated Files or Information
                    Security Account Manager1
                    File and Directory Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    DLL Side-Loading
                    NTDS11
                    System Information Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    _____.exe93%VirustotalBrowse
                    _____.exe100%AviraBDS/DarkKomet.GS
                    _____.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    king-hit.gl.at.ply.gg
                    147.185.221.23
                    truetrue
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      147.185.221.23
                      king-hit.gl.at.ply.ggUnited States
                      12087SALSGIVERUStrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1580627
                      Start date and time:2024-12-25 13:14:07 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 3m 46s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:4
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:_____.exe
                      Detection:MAL
                      Classification:mal92.troj.spyw.winEXE@1/0@1/1
                      EGA Information:Failed
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                      • Excluded IPs from analysis (whitelisted): 13.107.246.63, 20.12.23.50
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target _____.exe, PID 6156 because there are no executed function
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      No simulations
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      147.185.221.23WO.exeGet hashmaliciousMetasploitBrowse
                        reddit.exeGet hashmaliciousMetasploitBrowse
                          dr2YKJiGH9.exeGet hashmaliciousXWormBrowse
                            jSm8N1jXbk.exeGet hashmaliciousS400 RATBrowse
                              enigma_loader.exeGet hashmaliciousXWormBrowse
                                exe006.exeGet hashmaliciousSheetRatBrowse
                                  yF21ypxRB7.exeGet hashmaliciousXWormBrowse
                                    9GlCWW6bXc.exeGet hashmaliciousXWormBrowse
                                      fiPZoO6xvJ.exeGet hashmaliciousXWormBrowse
                                        EternalPredictor.exeGet hashmaliciousBlank Grabber, Skuld Stealer, XWormBrowse
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          SALSGIVERUStest.exeGet hashmaliciousDarkCometBrowse
                                          • 147.185.221.24
                                          L363rVr7oL.exeGet hashmaliciousNjratBrowse
                                          • 147.185.221.24
                                          WO.exeGet hashmaliciousMetasploitBrowse
                                          • 147.185.221.23
                                          reddit.exeGet hashmaliciousMetasploitBrowse
                                          • 147.185.221.23
                                          loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                                          • 147.176.119.110
                                          horrify's Modx Menu v1.exeGet hashmaliciousXWormBrowse
                                          • 147.185.221.24
                                          fvbhdyuJYi.exeGet hashmaliciousXWormBrowse
                                          • 147.185.221.24
                                          8DiSW8IPEF.exeGet hashmaliciousXWormBrowse
                                          • 147.185.221.24
                                          twE44mm07j.exeGet hashmaliciousXWormBrowse
                                          • 147.185.221.18
                                          YgJ5inWPQO.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                          • 147.185.221.18
                                          No context
                                          No context
                                          No created / dropped files found
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):6.616970366410712
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.81%
                                          • Windows Screen Saver (13104/52) 0.13%
                                          • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          File name:_____.exe
                                          File size:673'792 bytes
                                          MD5:b620f1561ef43fdc7132375a63dd3e8d
                                          SHA1:097594e519e510a5e7b69e2f8d367cc97c01c7e6
                                          SHA256:424e8d889288010e58a66fa8c9008c22cef78dced0e46b59ee417cc9e746c23f
                                          SHA512:186e292d6b142660930f93522ab37f70b3aefd3d8c594141de2912ddba4208b390d4e69da3478f8a470e546fc9cdeca3551971affb96a855eb382d40c0f0401f
                                          SSDEEP:12288:C9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/h1:uZ1xuVVjfFoynPaVBUR8f+kN10EBX
                                          TLSH:0EE48E31F1808837D97219789C5F92E6982A7E202E39754B3AE62F4C5F3D6C239193D7
                                          File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                          Icon Hash:00928e8e8686b000
                                          Entrypoint:0x48f888
                                          Entrypoint Section:.itext
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                          DLL Characteristics:
                                          Time Stamp:0x4FD0CFF9 [Thu Jun 7 15:59:53 2012 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:e5b4359a3773764a372173074ae9b6bd
                                          Instruction
                                          push ebp
                                          mov ebp, esp
                                          mov ecx, 00000030h
                                          push 00000000h
                                          push 00000000h
                                          dec ecx
                                          jne 00007F44E153E78Bh
                                          push ecx
                                          push ebx
                                          push esi
                                          push edi
                                          mov eax, 0048E3E0h
                                          call 00007F44E14B65C4h
                                          xor eax, eax
                                          push ebp
                                          push 00490656h
                                          push dword ptr fs:[eax]
                                          mov dword ptr fs:[eax], esp
                                          push 00000000h
                                          call 00007F44E14BEEBFh
                                          mov eax, dword ptr [004948B0h]
                                          mov byte ptr [eax], 00000001h
                                          call 00007F44E1539EB6h
                                          mov dl, 01h
                                          mov eax, dword ptr [0048DE80h]
                                          call 00007F44E153CDAEh
                                          mov dword ptr [0049C3E8h], eax
                                          xor edx, edx
                                          push ebp
                                          push 0048FA09h
                                          push dword ptr fs:[edx]
                                          mov dword ptr fs:[edx], esp
                                          lea ecx, dword ptr [ebp-14h]
                                          mov edx, 00490670h
                                          mov eax, dword ptr [0049C3E8h]
                                          call 00007F44E153CDFDh
                                          mov edx, dword ptr [ebp-14h]
                                          mov eax, dword ptr [00494B38h]
                                          call 00007F44E14B4414h
                                          lea edx, dword ptr [ebp-20h]
                                          xor eax, eax
                                          call 00007F44E14BE0BAh
                                          mov eax, dword ptr [ebp-20h]
                                          lea edx, dword ptr [ebp-1Ch]
                                          call 00007F44E14B941Bh
                                          push dword ptr [ebp-1Ch]
                                          lea edx, dword ptr [ebp-24h]
                                          mov eax, 00490680h
                                          call 00007F44E1522453h
                                          push dword ptr [ebp-24h]
                                          push 00490690h
                                          lea eax, dword ptr [ebp-18h]
                                          mov edx, 00000003h
                                          call 00007F44E14B4736h
                                          mov eax, dword ptr [ebp-18h]
                                          call 00007F44E14B90BAh
                                          test al, al
                                          je 00007F44E153E838h
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x9d0000x4140.idata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xad0000x4188.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xa40000x8adc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0xa30000x18.rdata
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x9dca40x9e8.idata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x8d8f00x8da008067456c5dc713997e61924c501c8cb2False0.514571726059135data6.553417346138988IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .itext0x8f0000x19540x1a003f63b5c2974302201afb8afa01b8ac10False0.5345552884615384data5.953748187744434IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .data0x910000x3d3c0x3e0081fa247370ecc3476b5c17086c0f2024False0.42357610887096775data4.834870765212306IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .bss0x950000x74040x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .idata0x9d0000x41400x4200cd30ca2b6ff5111155dec94ee29ec186False0.3171756628787879data5.268136117677001IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .tls0xa20000x380x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rdata0xa30000x180x200c1788dfeb92bbf0cff5aeaeaf1270ff8False0.05078125MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "J"0.2108262677871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0xa40000x8adc0x8c00e55564594dad16a2ca19fb85903b9300False0.6743024553571428data6.725005245595376IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          .rsrc0xad0000x41880x4200f1e0ba01d3bce7333b73bde2aa0327fbFalse0.3484256628787879data4.233015672100186IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_CURSOR0xad6bc0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                                          RT_CURSOR0xad7f00x134dataEnglishUnited States0.4642857142857143
                                          RT_CURSOR0xad9240x134dataEnglishUnited States0.4805194805194805
                                          RT_CURSOR0xada580x134dataEnglishUnited States0.38311688311688313
                                          RT_CURSOR0xadb8c0x134dataEnglishUnited States0.36038961038961037
                                          RT_CURSOR0xadcc00x134dataEnglishUnited States0.4090909090909091
                                          RT_CURSOR0xaddf40x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                                          RT_STRING0xadf280x20cdata0.42366412213740456
                                          RT_STRING0xae1340x3fcdata0.4
                                          RT_STRING0xae5300xa8data0.7202380952380952
                                          RT_STRING0xae5d80x140data0.584375
                                          RT_STRING0xae7180x478data0.38636363636363635
                                          RT_STRING0xaeb900x330data0.41421568627450983
                                          RT_STRING0xaeec00x36cdata0.3687214611872146
                                          RT_STRING0xaf22c0x3f0data0.3898809523809524
                                          RT_STRING0xaf61c0xccdata0.5392156862745098
                                          RT_STRING0xaf6e80xb0data0.6534090909090909
                                          RT_STRING0xaf7980x2acdata0.4766081871345029
                                          RT_STRING0xafa440x3b8data0.32668067226890757
                                          RT_STRING0xafdfc0x354data0.3884976525821596
                                          RT_STRING0xb01500x2f0data0.3829787234042553
                                          RT_RCDATA0xb04400x15eASCII text, with very long lines (350), with no line terminators0.5914285714285714
                                          RT_RCDATA0xb05a00x10data1.5
                                          RT_RCDATA0xb05b00x7f4data0.6360510805500982
                                          RT_GROUP_CURSOR0xb0da40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                          RT_GROUP_CURSOR0xb0db80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                          RT_GROUP_CURSOR0xb0dcc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                          RT_GROUP_CURSOR0xb0de00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                          RT_GROUP_CURSOR0xb0df40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                          RT_GROUP_CURSOR0xb0e080x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                          RT_GROUP_CURSOR0xb0e1c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                          RT_VERSION0xb0e300x358dataFrenchFrance0.42406542056074764
                                          DLLImport
                                          oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                          advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                          user32.dllGetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA
                                          kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetTickCount, QueryPerformanceCounter, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, CompareStringA, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle
                                          kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                          user32.dllCreateWindowExA, mouse_event, keybd_event, WindowFromPoint, WaitMessage, VkKeyScanA, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, ToAscii, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursorPos, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LockWorkStation, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsClipboardFormatAvailable, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextLengthA, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessagePos, GetMessageA, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastInputInfo, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassLongA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowExA, FindWindowA, FillRect, ExitWindowsEx, EqualRect, EnumWindows, EnumThreadWindows, EnumDisplayDevicesA, EnumClipboardFormats, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                          gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, RectVisible, RealizePalette, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutA, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateDCA, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, BitBlt
                                          version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                          kernel32.dlllstrcpyA, WriteProcessMemory, WriteFile, WinExec, WaitForSingleObject, WaitForMultipleObjectsEx, VirtualQuery, VirtualProtectEx, VirtualProtect, VirtualFreeEx, VirtualFree, VirtualAllocEx, VirtualAlloc, VerLanguageNameA, UnmapViewOfFile, TerminateProcess, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetThreadContext, SetLastError, SetFileTime, SetFilePointer, SetFileAttributesA, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, ReadProcessMemory, ReadFile, PeekNamedPipe, OpenProcess, MultiByteToWideChar, MulDiv, MoveFileA, MapViewOfFile, LockResource, LocalFileTimeToFileTime, LocalAlloc, LoadResource, LoadLibraryA, LeaveCriticalSection, IsBadReadPtr, InitializeCriticalSection, HeapFree, HeapAlloc, GlobalUnlock, GlobalMemoryStatus, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetWindowsDirectoryA, GetVolumeInformationA, GetVersionExA, GetVersion, GetUserDefaultLangID, GetTickCount, GetThreadLocale, GetThreadContext, GetTempPathA, GetSystemPowerStatus, GetSystemDirectoryA, GetStdHandle, GetProcessHeap, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileTime, GetFileSize, GetFileAttributesA, GetExitCodeThread, GetExitCodeProcess, GetEnvironmentVariableA, GetDriveTypeA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetComputerNameA, GetCPInfo, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FindResourceA, FindNextFileA, FindFirstFileA, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExitThread, ExitProcess, EnumResourceNamesA, EnumCalendarInfoA, EnterCriticalSection, DosDateTimeToFileTime, DeleteFileA, DeleteCriticalSection, CreateThread, CreateRemoteThread, CreateProcessA, CreatePipe, CreateMutexA, CreateFileMappingA, CreateFileA, CreateEventA, CreateDirectoryA, CopyFileA, CompareStringA, CloseHandle, Beep
                                          advapi32.dllRegSetValueExA, RegQueryValueExA, RegQueryInfoKeyA, RegOpenKeyExA, RegOpenKeyA, RegFlushKey, RegEnumValueA, RegEnumKeyExA, RegDeleteValueA, RegDeleteKeyA, RegCreateKeyExA, RegCreateKeyA, RegCloseKey, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueA, LookupPrivilegeNameA, LookupPrivilegeDisplayNameA, LookupAccountSidA, IsValidSid, GetUserNameA, GetTokenInformation, GetSidSubAuthorityCount, GetSidSubAuthority, GetSidIdentifierAuthority, GetCurrentHwProfileA, AdjustTokenPrivileges
                                          wsock32.dll__WSAFDIsSet, WSACleanup, WSAStartup, WSAGetLastError, gethostname, getservbyname, gethostbyname, gethostbyaddr, socket, shutdown, sendto, send, select, recv, ntohs, listen, ioctlsocket, inet_ntoa, inet_addr, htons, getsockname, connect, closesocket, bind, accept
                                          kernel32.dllSleep
                                          ole32.dllCoTaskMemFree, StringFromCLSID
                                          shell32.dllShellExecuteExA, ShellExecuteA, SHGetFileInfoA, SHFileOperationA, DragQueryFileA
                                          oleaut32.dllGetErrorInfo, GetActiveObject, SysFreeString
                                          ole32.dllCoTaskMemFree, CLSIDFromProgID, ProgIDFromCLSID, StringFromCLSID, CoCreateInstance, CoUninitialize, CoInitialize, IsEqualGUID
                                          URLMON.DLLURLDownloadToFileA
                                          oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                          comctl32.dll_TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
                                          wininet.dllInternetReadFile, InternetOpenUrlA, InternetOpenA, InternetConnectA, InternetCloseHandle, HttpQueryInfoA, FtpPutFileA
                                          shell32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA
                                          winmm.dllwaveInUnprepareHeader, waveInStart, waveInReset, waveInPrepareHeader, waveInOpen, waveInClose, waveInAddBuffer, PlaySoundA, mciSendStringA
                                          netapi32.dllNetbios
                                          gdiplus.dllGdipGetImageEncoders, GdipGetImageEncodersSize, GdipDrawImageRectI, GdipSetInterpolationMode, GdipDeleteGraphics, GdipCreateBitmapFromHBITMAP, GdipCreateBitmapFromScan0, GdipGetImagePixelFormat, GdipGetImageGraphicsContext, GdipSaveImageToStream, GdipDisposeImage, GdiplusShutdown, GdiplusStartup, GdipFree, GdipAlloc
                                          advapi32.dllStartServiceA, QueryServiceStatus, OpenServiceA, OpenSCManagerA, EnumServicesStatusA, DeleteService, CreateServiceA, ControlService, CloseServiceHandle
                                          msacm32.dllacmStreamUnprepareHeader, acmStreamPrepareHeader, acmStreamConvert, acmStreamReset, acmStreamSize, acmStreamClose, acmStreamOpen
                                          ntdll.dllNtQuerySystemInformation
                                          netapi32.dllNetApiBufferFree, NetShareGetInfo, NetShareEnum
                                          WS2_32.DLLWSAIoctl
                                          SHFolder.dllSHGetFolderPathA
                                          ntdllNtUnmapViewOfSection
                                          user32.dllEnumDisplayMonitors, GetMonitorInfoA
                                          SHELL32.DLLSHEmptyRecycleBinA
                                          AVICAP32.DLLcapGetDriverDescriptionA
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          FrenchFrance
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 25, 2024 13:14:58.571346045 CET4970425737192.168.2.5147.185.221.23
                                          Dec 25, 2024 13:14:58.691056013 CET2573749704147.185.221.23192.168.2.5
                                          Dec 25, 2024 13:14:58.691185951 CET4970425737192.168.2.5147.185.221.23
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 25, 2024 13:14:58.326690912 CET6219953192.168.2.51.1.1.1
                                          Dec 25, 2024 13:14:58.568438053 CET53621991.1.1.1192.168.2.5
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Dec 25, 2024 13:14:58.326690912 CET192.168.2.51.1.1.10xbfaeStandard query (0)king-hit.gl.at.ply.ggA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Dec 25, 2024 13:14:58.568438053 CET1.1.1.1192.168.2.50xbfaeNo error (0)king-hit.gl.at.ply.gg147.185.221.23A (IP address)IN (0x0001)false

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Target ID:0
                                          Start time:07:14:56
                                          Start date:25/12/2024
                                          Path:C:\Users\user\Desktop\_____.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\_____.exe"
                                          Imagebase:0x400000
                                          File size:673'792 bytes
                                          MD5 hash:B620F1561EF43FDC7132375A63DD3E8D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:Borland Delphi
                                          Yara matches:
                                          • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000000.2031400989.000000000049D000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: DarkComet_2, Description: DarkComet, Source: 00000000.00000002.3278626802.000000000238A000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                                          • Rule: DarkComet_2, Description: DarkComet, Source: 00000000.00000002.3278626802.0000000002330000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                                          • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: DarkComet_1, Description: DarkComet RAT, Source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: botherder https://github.com/botherder
                                          • Rule: DarkComet_3, Description: unknown, Source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: DarkComet_4, Description: unknown, Source: 00000000.00000000.2031337687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                                          Reputation:low
                                          Has exited:false

                                          No disassembly