Analysis

  • max time kernel
    6s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-11-2020 20:44

General

  • Target

    248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe

  • Size

    1.5MB

  • MD5

    368388bd7d8ea845d3e78b9fe35052e2

  • SHA1

    7350161b91820035c14c201b4f0f010873537fda

  • SHA256

    248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6

  • SHA512

    01f21de158447cd7f2bafbcbd32a61bf5491ac2b1dff32e813cd76a3c442f135c3adb34296abb48ad0ef46e81e6f5009aaccbe5c71a1dd0d7cfbf818d8038894

Malware Config

Extracted

Family

darkcomet

Botnet

Runescape

C2

mrsnickers03.no-ip.biz:340

Mutex

DC_MUTEX-6ZFK11A

Attributes
  • gencode

    uNwew4gojxtu

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe
    "C:\Users\Admin\AppData\Local\Temp\248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1592
    • C:\Users\Admin\AppData\Local\Temp\248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe
      "C:\Users\Admin\AppData\Local\Temp\248392feac8b12fcb295125354044fe32e2dc50c517d12e1c9218793c7cb27e6.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1004

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NJKVS.bat
    MD5

    92353035f01403e26aa2ff51c3963238

    SHA1

    d13f167c73bfce23a2deab8ce7c4ce9f78759ff4

    SHA256

    2e72a8542f8f809bfb1e4adfb481c7c5e6dc00dda7970c74692ba8d83ea0a870

    SHA512

    74560e33477caae3c7bc13914e4ae3c6911bbcfe257b2833155c236a158db0aca17478beb9d97f648ff1ea566005260f511361771c74203195107f4e82cce7df

  • C:\Users\Admin\AppData\Roaming\IDM\ichader.exe
    MD5

    4401da11826e074ce6a9c0d31980505d

    SHA1

    a2ec4827dcff1714ccbd5bd24fc795a5c211145c

    SHA256

    daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4

    SHA512

    562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217

  • C:\Users\Admin\AppData\Roaming\IDM\ichader.exe
    MD5

    4401da11826e074ce6a9c0d31980505d

    SHA1

    a2ec4827dcff1714ccbd5bd24fc795a5c211145c

    SHA256

    daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4

    SHA512

    562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217

  • C:\Users\Admin\AppData\Roaming\IDM\ichader.exe
    MD5

    4401da11826e074ce6a9c0d31980505d

    SHA1

    a2ec4827dcff1714ccbd5bd24fc795a5c211145c

    SHA256

    daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4

    SHA512

    562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217

  • C:\Users\Admin\AppData\Roaming\IDM\ichader.exe
    MD5

    4401da11826e074ce6a9c0d31980505d

    SHA1

    a2ec4827dcff1714ccbd5bd24fc795a5c211145c

    SHA256

    daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4

    SHA512

    562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217

  • \Users\Admin\AppData\Roaming\IDM\ichader.exe
    MD5

    4401da11826e074ce6a9c0d31980505d

    SHA1

    a2ec4827dcff1714ccbd5bd24fc795a5c211145c

    SHA256

    daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4

    SHA512

    562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217

  • \Users\Admin\AppData\Roaming\IDM\ichader.exe
    MD5

    4401da11826e074ce6a9c0d31980505d

    SHA1

    a2ec4827dcff1714ccbd5bd24fc795a5c211145c

    SHA256

    daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4

    SHA512

    562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217

  • \Users\Admin\AppData\Roaming\IDM\ichader.exe
    MD5

    4401da11826e074ce6a9c0d31980505d

    SHA1

    a2ec4827dcff1714ccbd5bd24fc795a5c211145c

    SHA256

    daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4

    SHA512

    562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217

  • \Users\Admin\AppData\Roaming\IDM\ichader.exe
    MD5

    4401da11826e074ce6a9c0d31980505d

    SHA1

    a2ec4827dcff1714ccbd5bd24fc795a5c211145c

    SHA256

    daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4

    SHA512

    562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217

  • \Users\Admin\AppData\Roaming\IDM\ichader.exe
    MD5

    4401da11826e074ce6a9c0d31980505d

    SHA1

    a2ec4827dcff1714ccbd5bd24fc795a5c211145c

    SHA256

    daa36483d22c3fdd0168e9440b58420dbacad88c4e984613c104a6f036273dc4

    SHA512

    562f516da8a0b141e5efa343afa55b12fa33320e953b3c3bd71c89660782716af15397450f2273741d0351288d654766bea9e1a4f5e8ce17de7dcb4ff9833217

  • memory/556-43-0x0000000000000000-mapping.dmp
  • memory/624-71-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-76-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-83-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-82-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-81-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-80-0x0000000000668000-0x0000000000669000-memory.dmp
    Filesize

    4KB

  • memory/624-79-0x0000000000668000-0x0000000000669000-memory.dmp
    Filesize

    4KB

  • memory/624-78-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-77-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-75-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-72-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-70-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-69-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-64-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-66-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-65-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-63-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-61-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-62-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-60-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-59-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-58-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-57-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-56-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-55-0x0000000000666000-0x0000000000667000-memory.dmp
    Filesize

    4KB

  • memory/624-51-0x0000000000000000-mapping.dmp
  • memory/676-45-0x0000000000000000-mapping.dmp
  • memory/1004-35-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1004-36-0x00000000004085D0-mapping.dmp
  • memory/1004-37-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1004-40-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1040-2-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-18-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-11-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-13-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-12-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-4-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-9-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-3-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-6-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-7-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-8-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-17-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-29-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-30-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-28-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-10-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-26-0x0000000000278000-0x0000000000279000-memory.dmp
    Filesize

    4KB

  • memory/1040-27-0x0000000000278000-0x0000000000279000-memory.dmp
    Filesize

    4KB

  • memory/1040-16-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-5-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-19-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-23-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-22-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-25-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1040-24-0x0000000000276000-0x0000000000277000-memory.dmp
    Filesize

    4KB

  • memory/1320-95-0x0000000000400000-0x00000000004B7000-memory.dmp
    Filesize

    732KB

  • memory/1320-97-0x00000000004B5210-mapping.dmp
  • memory/1320-101-0x0000000000400000-0x00000000004B7000-memory.dmp
    Filesize

    732KB

  • memory/1320-102-0x0000000000400000-0x00000000004B7000-memory.dmp
    Filesize

    732KB

  • memory/1592-31-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/1592-33-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/1592-34-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/1592-32-0x000000000040B000-mapping.dmp
  • memory/1892-90-0x00000000004085D0-mapping.dmp
  • memory/2008-84-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/2008-86-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/2008-85-0x000000000040B000-mapping.dmp