Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    08-05-2021 22:32

General

  • Target

    183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe

  • Size

    1.9MB

  • MD5

    b4dcd2d1d30d94db8313fff13fcec458

  • SHA1

    bb77b06b84e44bbf191caaf93bf63928bcff9669

  • SHA256

    183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f

  • SHA512

    26cfe666dadc7473d46b2eac42de712a20559e56d5f071af3ffdacde183895983ce1b6f4cf922d50112f6e92aeb31c9ea8df101c1eeaeb6b0b67d8f775229a9f

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Executes dropped EXE 3 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe
    "C:\Users\Admin\AppData\Local\Temp\183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:788
    • C:\Users\Admin\AppData\Local\Temp\183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe
      "C:\Users\Admin\AppData\Local\Temp\183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\BYGUT.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:604
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svchost" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\test\test.exe" /f
          4⤵
          • Adds Run key to start application
          PID:860
      • C:\Users\Admin\AppData\Roaming\test\test.exe
        "C:\Users\Admin\AppData\Roaming\test\test.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1712
        • C:\Users\Admin\AppData\Roaming\test\test.exe
          "C:\Users\Admin\AppData\Roaming\test\test.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:612
        • C:\Users\Admin\AppData\Roaming\test\test.exe
          "C:\Users\Admin\AppData\Roaming\test\test.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1516

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\BYGUT.bat

    MD5

    527683c48cc4c7190219814c77b72fe0

    SHA1

    d995878a8f4b9824a0508039eeada5376be9a52d

    SHA256

    bbebf3e66136e700d8e3e2e0c8f461cdd9d7e68fe5a18a235afe86344932fb4b

    SHA512

    408a53b240c23fa34153ccc2b2315f28a9741121ecc9b76d50267ee62d78230e65574327369f83c779c781802c0c28f6c578703c01a67de46c3d44f71b814fa6

  • C:\Users\Admin\AppData\Roaming\test\test.exe

    MD5

    1ccdc21516227cef30ff96038c187eb1

    SHA1

    82fe6678de707a17db12055108a6c39a7e459de3

    SHA256

    96e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf

    SHA512

    4144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce

  • C:\Users\Admin\AppData\Roaming\test\test.exe

    MD5

    1ccdc21516227cef30ff96038c187eb1

    SHA1

    82fe6678de707a17db12055108a6c39a7e459de3

    SHA256

    96e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf

    SHA512

    4144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce

  • C:\Users\Admin\AppData\Roaming\test\test.exe

    MD5

    1ccdc21516227cef30ff96038c187eb1

    SHA1

    82fe6678de707a17db12055108a6c39a7e459de3

    SHA256

    96e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf

    SHA512

    4144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce

  • C:\Users\Admin\AppData\Roaming\test\test.exe

    MD5

    1ccdc21516227cef30ff96038c187eb1

    SHA1

    82fe6678de707a17db12055108a6c39a7e459de3

    SHA256

    96e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf

    SHA512

    4144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce

  • \Users\Admin\AppData\Roaming\test\test.exe

    MD5

    1ccdc21516227cef30ff96038c187eb1

    SHA1

    82fe6678de707a17db12055108a6c39a7e459de3

    SHA256

    96e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf

    SHA512

    4144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce

  • \Users\Admin\AppData\Roaming\test\test.exe

    MD5

    1ccdc21516227cef30ff96038c187eb1

    SHA1

    82fe6678de707a17db12055108a6c39a7e459de3

    SHA256

    96e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf

    SHA512

    4144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce

  • \Users\Admin\AppData\Roaming\test\test.exe

    MD5

    1ccdc21516227cef30ff96038c187eb1

    SHA1

    82fe6678de707a17db12055108a6c39a7e459de3

    SHA256

    96e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf

    SHA512

    4144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce

  • \Users\Admin\AppData\Roaming\test\test.exe

    MD5

    1ccdc21516227cef30ff96038c187eb1

    SHA1

    82fe6678de707a17db12055108a6c39a7e459de3

    SHA256

    96e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf

    SHA512

    4144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce

  • \Users\Admin\AppData\Roaming\test\test.exe

    MD5

    1ccdc21516227cef30ff96038c187eb1

    SHA1

    82fe6678de707a17db12055108a6c39a7e459de3

    SHA256

    96e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf

    SHA512

    4144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce

  • memory/604-82-0x0000000000000000-mapping.dmp

  • memory/612-105-0x00000000004085D0-mapping.dmp

  • memory/788-69-0x0000000000401000-0x0000000000546000-memory.dmp

    Filesize

    1.3MB

  • memory/788-71-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/788-74-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/788-72-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/788-62-0x0000000000401000-0x0000000000546000-memory.dmp

    Filesize

    1.3MB

  • memory/788-78-0x0000000000360000-0x0000000000361000-memory.dmp

    Filesize

    4KB

  • memory/788-76-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/788-77-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/788-63-0x0000000000401000-0x0000000000546000-memory.dmp

    Filesize

    1.3MB

  • memory/788-65-0x0000000000401000-0x0000000000546000-memory.dmp

    Filesize

    1.3MB

  • memory/788-68-0x0000000000401000-0x0000000000546000-memory.dmp

    Filesize

    1.3MB

  • memory/788-67-0x0000000000401000-0x0000000000546000-memory.dmp

    Filesize

    1.3MB

  • memory/788-59-0x0000000000400000-0x000000000054B000-memory.dmp

    Filesize

    1.3MB

  • memory/788-66-0x0000000000401000-0x0000000000546000-memory.dmp

    Filesize

    1.3MB

  • memory/860-84-0x0000000000000000-mapping.dmp

  • memory/1516-108-0x00000000004B5640-mapping.dmp

  • memory/1516-107-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1712-90-0x0000000000000000-mapping.dmp

  • memory/1968-81-0x0000000075A71000-0x0000000075A73000-memory.dmp

    Filesize

    8KB

  • memory/1968-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1968-75-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1968-73-0x00000000004085D0-mapping.dmp