Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-11-2020 21:25

General

  • Target

    a442c3203228642a60f501ff0c78520c22cbf332cf9a25fc584d2712a16ba905.exe

  • Size

    318KB

  • MD5

    05cf4f8680713194351357aa49b43076

  • SHA1

    a2e23c0195c04160da45e1739424bb0c6695e6a3

  • SHA256

    a442c3203228642a60f501ff0c78520c22cbf332cf9a25fc584d2712a16ba905

  • SHA512

    4d70affba693089faf4c2debe3839afa5eda63936e3c9a7cadc3a222e29687f3021113e38a74be1498aa1c267fb44e489fecdee51f595f5d2229fb1efd05332a

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a442c3203228642a60f501ff0c78520c22cbf332cf9a25fc584d2712a16ba905.exe
    "C:\Users\Admin\AppData\Local\Temp\a442c3203228642a60f501ff0c78520c22cbf332cf9a25fc584d2712a16ba905.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    PID:1848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads