Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    22-07-2021 08:04

General

  • Target

    6c6a951636ae4dee7a842c6af1d43236.exe

  • Size

    1.2MB

  • MD5

    6c6a951636ae4dee7a842c6af1d43236

  • SHA1

    387e2f026ca3ec2a291b09fa76f88fe40ae7007c

  • SHA256

    2ebc7cf945c4eba60eb0f25f6b58eb8d7d0558f6b5622530b2b3808987173952

  • SHA512

    3324a70e328be9cdbbe60f47da1254208032b73e6b48cbfea9d070b50378a1ed0f6df32b62c3b16712b78ddcaa0b696ee196f8e9448c3b0f025a9f1d36857311

Malware Config

Extracted

Family

darkcomet

Botnet

ADSAW

C2

secret92.ddns.net:82

Mutex

DC_MUTEX-TAUBLES

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    4ltiP4nFeytX

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 5 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets file to hidden 1 TTPs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c6a951636ae4dee7a842c6af1d43236.exe
    "C:\Users\Admin\AppData\Local\Temp\6c6a951636ae4dee7a842c6af1d43236.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Users\Admin\AppData\Local\Temp\R-Launcher.exe
      "C:\Users\Admin\AppData\Local\Temp\R-Launcher.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1852
      • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
        "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\R-Launcher.exe"
        3⤵
          PID:2484
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 2484 -s 356
            4⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3680
      • C:\Users\Admin\AppData\Local\Temp\darknj.exe
        "C:\Users\Admin\AppData\Local\Temp\darknj.exe"
        2⤵
        • Modifies WinLogon for persistence
        • Executes dropped EXE
        • Checks computer location settings
        • Adds Run key to start application
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1512
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\darknj.exe" +s +h
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3120
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Users\Admin\AppData\Local\Temp\darknj.exe" +s +h
            4⤵
            • Views/modifies file attributes
            PID:956
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2824
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
            4⤵
            • Views/modifies file attributes
            PID:2872
        • C:\Users\Admin\AppData\Local\Temp\NJ.EXE
          "C:\Users\Admin\AppData\Local\Temp\NJ.EXE"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:196
          • C:\Users\Admin\AppData\Roaming\WindowsServices.exe
            "C:\Users\Admin\AppData\Roaming\WindowsServices.exe"
            4⤵
            • Executes dropped EXE
            • Drops startup file
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            PID:3724
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\WindowsServices.exe" "WindowsServices.exe" ENABLE
              5⤵
                PID:1836
          • C:\Windows\SysWOW64\notepad.exe
            notepad
            3⤵
              PID:3940
            • C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
              "C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3548
              • C:\Windows\SysWOW64\notepad.exe
                notepad
                4⤵
                  PID:1360

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Winlogon Helper DLL

          1
          T1004

          Modify Existing Service

          1
          T1031

          Hidden Files and Directories

          2
          T1158

          Registry Run Keys / Startup Folder

          1
          T1060

          Defense Evasion

          Modify Registry

          2
          T1112

          Hidden Files and Directories

          2
          T1158

          Discovery

          Query Registry

          1
          T1012

          System Information Discovery

          2
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
            MD5

            b0fe10b99dd5f8494e7c71b8fda9239b

            SHA1

            e93f7447408e10424ea3f4b3a92473e125d2af6b

            SHA256

            121a202b4ff70f91e823c347f13784ec44525a9b0d4940c449e5db442acc6536

            SHA512

            6c9fdf8b1d097e454c4530a1660ef67aa1daed8e9eab8045c200b3ab1b89a8df84ef0d68be2a3c5affc30000d610dede7ea2fa7760f78c8a9983ad5d0283e518

          • C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
            MD5

            b0fe10b99dd5f8494e7c71b8fda9239b

            SHA1

            e93f7447408e10424ea3f4b3a92473e125d2af6b

            SHA256

            121a202b4ff70f91e823c347f13784ec44525a9b0d4940c449e5db442acc6536

            SHA512

            6c9fdf8b1d097e454c4530a1660ef67aa1daed8e9eab8045c200b3ab1b89a8df84ef0d68be2a3c5affc30000d610dede7ea2fa7760f78c8a9983ad5d0283e518

          • C:\Users\Admin\AppData\Local\Temp\NJ.EXE
            MD5

            d3b0deb25e223b27361f1024bdbcba0c

            SHA1

            8e250d9ea3abf31f589005d9406eb6850a2a02b6

            SHA256

            ee68e3f8ce8f704003575076c1b48a29361adb3af5fe858e0e59b5f41c685d8d

            SHA512

            d392c1202b14b99418158f75dc1496cb35f079911d8c5922d3b23d8d5a188027dee3650dfa145ff14e8f01e57c01c0f0fda09603f210e1884354e5c621565b7d

          • C:\Users\Admin\AppData\Local\Temp\NJ.EXE
            MD5

            d3b0deb25e223b27361f1024bdbcba0c

            SHA1

            8e250d9ea3abf31f589005d9406eb6850a2a02b6

            SHA256

            ee68e3f8ce8f704003575076c1b48a29361adb3af5fe858e0e59b5f41c685d8d

            SHA512

            d392c1202b14b99418158f75dc1496cb35f079911d8c5922d3b23d8d5a188027dee3650dfa145ff14e8f01e57c01c0f0fda09603f210e1884354e5c621565b7d

          • C:\Users\Admin\AppData\Local\Temp\R-Launcher.exe
            MD5

            f09f583748cb26682f60279b8bba14c8

            SHA1

            caf750a85d3abd708c080ebfa995bc2cc0b4cafd

            SHA256

            7f5b29de3370f01b63bcdf4fc7939728f2b11428462d0e2ba77a2bb62b7698dc

            SHA512

            cf8c278f297e250966ce2302191718dae3e7b09f5f9e2da2efb2bfe87ba87196f69be5c0fe52bf7048230ce616bee76d005a11fa646986fa8b33688d95861ae9

          • C:\Users\Admin\AppData\Local\Temp\R-Launcher.exe
            MD5

            f09f583748cb26682f60279b8bba14c8

            SHA1

            caf750a85d3abd708c080ebfa995bc2cc0b4cafd

            SHA256

            7f5b29de3370f01b63bcdf4fc7939728f2b11428462d0e2ba77a2bb62b7698dc

            SHA512

            cf8c278f297e250966ce2302191718dae3e7b09f5f9e2da2efb2bfe87ba87196f69be5c0fe52bf7048230ce616bee76d005a11fa646986fa8b33688d95861ae9

          • C:\Users\Admin\AppData\Local\Temp\darknj.exe
            MD5

            b0fe10b99dd5f8494e7c71b8fda9239b

            SHA1

            e93f7447408e10424ea3f4b3a92473e125d2af6b

            SHA256

            121a202b4ff70f91e823c347f13784ec44525a9b0d4940c449e5db442acc6536

            SHA512

            6c9fdf8b1d097e454c4530a1660ef67aa1daed8e9eab8045c200b3ab1b89a8df84ef0d68be2a3c5affc30000d610dede7ea2fa7760f78c8a9983ad5d0283e518

          • C:\Users\Admin\AppData\Local\Temp\darknj.exe
            MD5

            b0fe10b99dd5f8494e7c71b8fda9239b

            SHA1

            e93f7447408e10424ea3f4b3a92473e125d2af6b

            SHA256

            121a202b4ff70f91e823c347f13784ec44525a9b0d4940c449e5db442acc6536

            SHA512

            6c9fdf8b1d097e454c4530a1660ef67aa1daed8e9eab8045c200b3ab1b89a8df84ef0d68be2a3c5affc30000d610dede7ea2fa7760f78c8a9983ad5d0283e518

          • C:\Users\Admin\AppData\Roaming\WindowsServices.exe
            MD5

            d3b0deb25e223b27361f1024bdbcba0c

            SHA1

            8e250d9ea3abf31f589005d9406eb6850a2a02b6

            SHA256

            ee68e3f8ce8f704003575076c1b48a29361adb3af5fe858e0e59b5f41c685d8d

            SHA512

            d392c1202b14b99418158f75dc1496cb35f079911d8c5922d3b23d8d5a188027dee3650dfa145ff14e8f01e57c01c0f0fda09603f210e1884354e5c621565b7d

          • C:\Users\Admin\AppData\Roaming\WindowsServices.exe
            MD5

            d3b0deb25e223b27361f1024bdbcba0c

            SHA1

            8e250d9ea3abf31f589005d9406eb6850a2a02b6

            SHA256

            ee68e3f8ce8f704003575076c1b48a29361adb3af5fe858e0e59b5f41c685d8d

            SHA512

            d392c1202b14b99418158f75dc1496cb35f079911d8c5922d3b23d8d5a188027dee3650dfa145ff14e8f01e57c01c0f0fda09603f210e1884354e5c621565b7d

          • memory/196-124-0x0000000000000000-mapping.dmp
          • memory/196-130-0x00000000001F0000-0x00000000001F1000-memory.dmp
            Filesize

            4KB

          • memory/956-127-0x0000000000000000-mapping.dmp
          • memory/1360-137-0x0000000003050000-0x0000000003051000-memory.dmp
            Filesize

            4KB

          • memory/1360-135-0x0000000000000000-mapping.dmp
          • memory/1512-121-0x0000000002380000-0x0000000002381000-memory.dmp
            Filesize

            4KB

          • memory/1512-116-0x0000000000000000-mapping.dmp
          • memory/1836-142-0x0000000000000000-mapping.dmp
          • memory/1852-114-0x0000000000000000-mapping.dmp
          • memory/2484-120-0x0000000000000000-mapping.dmp
          • memory/2824-123-0x0000000000000000-mapping.dmp
          • memory/2872-128-0x0000000000000000-mapping.dmp
          • memory/3120-122-0x0000000000000000-mapping.dmp
          • memory/3548-136-0x0000000000590000-0x000000000063E000-memory.dmp
            Filesize

            696KB

          • memory/3548-132-0x0000000000000000-mapping.dmp
          • memory/3724-138-0x0000000000000000-mapping.dmp
          • memory/3724-141-0x0000000000960000-0x0000000000961000-memory.dmp
            Filesize

            4KB

          • memory/3940-131-0x0000000002E40000-0x0000000002E41000-memory.dmp
            Filesize

            4KB

          • memory/3940-129-0x0000000000000000-mapping.dmp