Analysis

  • max time kernel
    150s
  • max time network
    13s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    25-05-2021 10:02

General

  • Target

    FOTOVERANO15.scr

  • Size

    874KB

  • MD5

    ec692bde91ad1c6e182843bc0a5c7e81

  • SHA1

    54996c1d4aeaf76855b7b73a323b74c191573863

  • SHA256

    de19d8ea2911ff7e337823576e214151ad4426206db8e9ea9880778f2592f935

  • SHA512

    4b4d5b7707071b86cb2d55411766bb3ebde9a8765becdaf5840d78be6e278f5b3d2bbe2888350a4d113c49a65c9b8e2ec818429db91c72529b0fbfd12f9c7dbe

Malware Config

Extracted

Family

darkcomet

Botnet

FOTOVERANO15

C2

seguridadsocial.ddns.net:1604

Mutex

DC_MUTEX-MKHPJPY

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    lsBsa7lPZ9Fu

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FOTOVERANO15.scr
    "C:\Users\Admin\AppData\Local\Temp\FOTOVERANO15.scr" /S
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Windows\SysWOW64\notepad.exe
      notepad
      2⤵
      • Deletes itself
      PID:1516
    • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
      "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
      2⤵
      • Modifies firewall policy service
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1432
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
          PID:1540
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          3⤵
            PID:1620
          • C:\Windows\SysWOW64\notepad.exe
            notepad
            3⤵
              PID:1564
        • C:\Windows\SysWOW64\DllHost.exe
          C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
          1⤵
          • Suspicious use of FindShellTrayWindow
          PID:1924

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\FOTOVERANO15.JPG

          MD5

          aeffb88a40a4be078244229bcfee3d2f

          SHA1

          d7289fe88f0929c36dd642f2b16bdb649bbc88eb

          SHA256

          71204f05c21a26aba9343ec13042d96ae3b3bf6702a38dd3a6a42a09ee96042b

          SHA512

          af0c7e413680b62d12445bee0577bf288195395b4935cf9a5fbe372d4ea490d6ab07082d24d7f72ca020a8e0ccca713a800a3eb0aebb38b3ddb629d083538d80

        • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

          MD5

          ec692bde91ad1c6e182843bc0a5c7e81

          SHA1

          54996c1d4aeaf76855b7b73a323b74c191573863

          SHA256

          de19d8ea2911ff7e337823576e214151ad4426206db8e9ea9880778f2592f935

          SHA512

          4b4d5b7707071b86cb2d55411766bb3ebde9a8765becdaf5840d78be6e278f5b3d2bbe2888350a4d113c49a65c9b8e2ec818429db91c72529b0fbfd12f9c7dbe

        • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

          MD5

          ec692bde91ad1c6e182843bc0a5c7e81

          SHA1

          54996c1d4aeaf76855b7b73a323b74c191573863

          SHA256

          de19d8ea2911ff7e337823576e214151ad4426206db8e9ea9880778f2592f935

          SHA512

          4b4d5b7707071b86cb2d55411766bb3ebde9a8765becdaf5840d78be6e278f5b3d2bbe2888350a4d113c49a65c9b8e2ec818429db91c72529b0fbfd12f9c7dbe

        • \Users\Admin\Documents\MSDCSC\msdcsc.exe

          MD5

          ec692bde91ad1c6e182843bc0a5c7e81

          SHA1

          54996c1d4aeaf76855b7b73a323b74c191573863

          SHA256

          de19d8ea2911ff7e337823576e214151ad4426206db8e9ea9880778f2592f935

          SHA512

          4b4d5b7707071b86cb2d55411766bb3ebde9a8765becdaf5840d78be6e278f5b3d2bbe2888350a4d113c49a65c9b8e2ec818429db91c72529b0fbfd12f9c7dbe

        • \Users\Admin\Documents\MSDCSC\msdcsc.exe

          MD5

          ec692bde91ad1c6e182843bc0a5c7e81

          SHA1

          54996c1d4aeaf76855b7b73a323b74c191573863

          SHA256

          de19d8ea2911ff7e337823576e214151ad4426206db8e9ea9880778f2592f935

          SHA512

          4b4d5b7707071b86cb2d55411766bb3ebde9a8765becdaf5840d78be6e278f5b3d2bbe2888350a4d113c49a65c9b8e2ec818429db91c72529b0fbfd12f9c7dbe

        • memory/1072-62-0x00000000036A0000-0x00000000036A2000-memory.dmp

          Filesize

          8KB

        • memory/1072-64-0x00000000003C0000-0x00000000003C1000-memory.dmp

          Filesize

          4KB

        • memory/1072-60-0x0000000075411000-0x0000000075413000-memory.dmp

          Filesize

          8KB

        • memory/1432-77-0x0000000000290000-0x0000000000291000-memory.dmp

          Filesize

          4KB

        • memory/1432-70-0x0000000000000000-mapping.dmp

        • memory/1516-66-0x0000000000000000-mapping.dmp

        • memory/1516-76-0x0000000000020000-0x0000000000021000-memory.dmp

          Filesize

          4KB

        • memory/1564-74-0x0000000000000000-mapping.dmp

        • memory/1564-78-0x00000000001C0000-0x00000000001C1000-memory.dmp

          Filesize

          4KB

        • memory/1924-65-0x00000000001C0000-0x00000000001C1000-memory.dmp

          Filesize

          4KB

        • memory/1924-63-0x0000000000120000-0x0000000000122000-memory.dmp

          Filesize

          8KB