Analysis

  • max time kernel
    32s
  • max time network
    12s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    29-04-2021 11:00

General

  • Target

    Подключение к Cheater HAer VPsu202epdr.exe

  • Size

    1.2MB

  • MD5

    89819d45a907c55d273e9d4e2a64f2a9

  • SHA1

    18db069eb82c31af3cb577ea392e4b42775d37f4

  • SHA256

    e50cf3f7139ac7f4924b835334a98f7c426b66d0d19e986d885bd4080433d7bd

  • SHA512

    bb2eee52e673c8e2ae44c60f0df8dc69890df2108f5278f1928f207055d5e8660fd8d8eaab9d67ee3ed950574184cbc94af77d831b601323afc31d715b9ec248

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

radgoodnow.mooo.com:7777

Mutex

DC_MUTEX-0E720ZB

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    ReysmuLVc5ah

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Подключение к Cheater HAer VPsu202epdr.exe
    "C:\Users\Admin\AppData\Local\Temp\Подключение к Cheater HAer VPsu202epdr.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
        "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        PID:1796

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
    MD5

    b58b926c3574d28d5b7fdd2ca3ec30d5

    SHA1

    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

    SHA256

    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

    SHA512

    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

  • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
    MD5

    b58b926c3574d28d5b7fdd2ca3ec30d5

    SHA1

    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

    SHA256

    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

    SHA512

    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

  • \Users\Admin\Documents\MSDCSC\msdcsc.exe
    MD5

    b58b926c3574d28d5b7fdd2ca3ec30d5

    SHA1

    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

    SHA256

    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

    SHA512

    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

  • memory/1624-64-0x000000000048F888-mapping.dmp
  • memory/1624-63-0x0000000000400000-0x00000000004F4000-memory.dmp
    Filesize

    976KB

  • memory/1624-65-0x00000000757C1000-0x00000000757C3000-memory.dmp
    Filesize

    8KB

  • memory/1624-71-0x0000000000400000-0x00000000004F4000-memory.dmp
    Filesize

    976KB

  • memory/1624-72-0x0000000000130000-0x0000000000131000-memory.dmp
    Filesize

    4KB

  • memory/1796-67-0x0000000000000000-mapping.dmp
  • memory/1796-70-0x0000000001150000-0x0000000001151000-memory.dmp
    Filesize

    4KB

  • memory/1848-59-0x00000000012A0000-0x00000000012A1000-memory.dmp
    Filesize

    4KB

  • memory/1848-62-0x0000000004940000-0x0000000004A2A000-memory.dmp
    Filesize

    936KB

  • memory/1848-61-0x0000000004AA0000-0x0000000004AA1000-memory.dmp
    Filesize

    4KB