Analysis

  • max time kernel
    29s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    29-04-2021 11:00

General

  • Target

    Подключение к Cheater HAer VPsu202epdr.exe

  • Size

    1.2MB

  • MD5

    89819d45a907c55d273e9d4e2a64f2a9

  • SHA1

    18db069eb82c31af3cb577ea392e4b42775d37f4

  • SHA256

    e50cf3f7139ac7f4924b835334a98f7c426b66d0d19e986d885bd4080433d7bd

  • SHA512

    bb2eee52e673c8e2ae44c60f0df8dc69890df2108f5278f1928f207055d5e8660fd8d8eaab9d67ee3ed950574184cbc94af77d831b601323afc31d715b9ec248

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

radgoodnow.mooo.com:7777

Mutex

DC_MUTEX-0E720ZB

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    ReysmuLVc5ah

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Подключение к Cheater HAer VPsu202epdr.exe
    "C:\Users\Admin\AppData\Local\Temp\Подключение к Cheater HAer VPsu202epdr.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3468
      • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
        "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        PID:1468

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
    MD5

    b58b926c3574d28d5b7fdd2ca3ec30d5

    SHA1

    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

    SHA256

    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

    SHA512

    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

  • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
    MD5

    b58b926c3574d28d5b7fdd2ca3ec30d5

    SHA1

    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

    SHA256

    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

    SHA512

    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

  • memory/1468-125-0x0000000000000000-mapping.dmp
  • memory/1468-128-0x00000000002E0000-0x00000000002E1000-memory.dmp
    Filesize

    4KB

  • memory/3468-123-0x0000000000400000-0x00000000004F4000-memory.dmp
    Filesize

    976KB

  • memory/3468-124-0x000000000048F888-mapping.dmp
  • memory/3468-130-0x0000000002F00000-0x0000000002F01000-memory.dmp
    Filesize

    4KB

  • memory/3468-129-0x0000000000400000-0x00000000004F4000-memory.dmp
    Filesize

    976KB

  • memory/3540-120-0x0000000005A40000-0x0000000005F3E000-memory.dmp
    Filesize

    5.0MB

  • memory/3540-121-0x0000000005C60000-0x0000000005D4A000-memory.dmp
    Filesize

    936KB

  • memory/3540-122-0x0000000005B20000-0x0000000005B21000-memory.dmp
    Filesize

    4KB

  • memory/3540-114-0x0000000000F60000-0x0000000000F61000-memory.dmp
    Filesize

    4KB

  • memory/3540-119-0x0000000005BE0000-0x0000000005BE1000-memory.dmp
    Filesize

    4KB

  • memory/3540-118-0x00000000058D0000-0x00000000058D1000-memory.dmp
    Filesize

    4KB

  • memory/3540-117-0x0000000005950000-0x0000000005951000-memory.dmp
    Filesize

    4KB

  • memory/3540-116-0x0000000005F40000-0x0000000005F41000-memory.dmp
    Filesize

    4KB