Analysis

  • max time kernel
    4s
  • max time network
    11s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    13-05-2021 11:35

General

  • Target

    7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe

  • Size

    1.5MB

  • MD5

    b4f71adf9ec04a2b87e7588d8af2ba9e

  • SHA1

    316b8b6e5a80eb8d2e061a80527ff7be6731c25e

  • SHA256

    7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1

  • SHA512

    36b1259f6769582ae28a14ebf64ac7c8133f5513f8595892a3eb3de8d71b12966967e67f82ea0a301bc91f9f912d79862905048853e22b26c070aaf9368908d2

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe
    "C:\Users\Admin\AppData\Local\Temp\7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Users\Admin\AppData\Local\Temp\vbc.exe
      C:\Users\Admin\AppData\Local\Temp\vbc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
          PID:1176

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\vbc.exe
      MD5

      34aa912defa18c2c129f1e09d75c1d7e

      SHA1

      9c3046324657505a30ecd9b1fdb46c05bde7d470

      SHA256

      6df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386

      SHA512

      d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98

    • C:\Users\Admin\AppData\Local\Temp\vbc.exe
      MD5

      34aa912defa18c2c129f1e09d75c1d7e

      SHA1

      9c3046324657505a30ecd9b1fdb46c05bde7d470

      SHA256

      6df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386

      SHA512

      d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98

    • \Users\Admin\AppData\Local\Temp\vbc.exe
      MD5

      34aa912defa18c2c129f1e09d75c1d7e

      SHA1

      9c3046324657505a30ecd9b1fdb46c05bde7d470

      SHA256

      6df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386

      SHA512

      d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98

    • memory/1104-59-0x0000000075561000-0x0000000075563000-memory.dmp
      Filesize

      8KB

    • memory/1104-64-0x0000000000A60000-0x0000000000A61000-memory.dmp
      Filesize

      4KB

    • memory/1176-67-0x0000000000400000-0x000000000051E000-memory.dmp
      Filesize

      1.1MB

    • memory/1176-68-0x00000000004748DA-mapping.dmp
    • memory/2032-61-0x0000000000400000-0x00000000004C3000-memory.dmp
      Filesize

      780KB

    • memory/2032-62-0x000000000049F92C-mapping.dmp
    • memory/2032-69-0x0000000000400000-0x00000000004C3000-memory.dmp
      Filesize

      780KB

    • memory/2032-70-0x00000000004E0000-0x00000000004E1000-memory.dmp
      Filesize

      4KB