Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-11-2020 15:43

General

  • Target

    077a9062b87736ebfe68a2eaeb4f6ed0f800d3f5ae870a5ab5971960ea3d057f.exe

  • Size

    318KB

  • MD5

    1a18650786e0d1dd22683b8f55e9747a

  • SHA1

    e9d1ebb4441b84b5789dbde03951014acae6ab35

  • SHA256

    077a9062b87736ebfe68a2eaeb4f6ed0f800d3f5ae870a5ab5971960ea3d057f

  • SHA512

    1e749a2371d3d0f1c16374419bd84ce93e6e2cd0f158448dd1b600966659b96cd88c3977c9d33a78d1209cce3d460246941be0802742b82443370ab04833cb65

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\077a9062b87736ebfe68a2eaeb4f6ed0f800d3f5ae870a5ab5971960ea3d057f.exe
    "C:\Users\Admin\AppData\Local\Temp\077a9062b87736ebfe68a2eaeb4f6ed0f800d3f5ae870a5ab5971960ea3d057f.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    PID:932

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads