Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    16-05-2021 03:23

General

  • Target

    82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe

  • Size

    284KB

  • MD5

    20acfcd784e83f9e31cf6dcea58b293a

  • SHA1

    9678f409aabdafe1b2898fae408a8e67ef3fc9d7

  • SHA256

    82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2

  • SHA512

    8af9df96ed10e28a40617d8e716dbcde8508e97966f44a4e9d01db44935fe187a3b947634192b2f3d7c2e81f656c75fc3b8441ffdd154400a22f5016fa1cb6ad

Score
10/10

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe
    "C:\Users\Admin\AppData\Local\Temp\82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:644

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/644-114-0x0000000000BD0000-0x0000000000BD1000-memory.dmp
    Filesize

    4KB