Analysis

  • max time kernel
    136s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    31-08-2021 19:14

General

  • Target

    1c85f500e9ca0788bfd183ad5c8a5a8dafe9dd89e76ed7cef7e025f942cd8df4.exe

  • Size

    668KB

  • MD5

    a2e0b62fb8b7aa36c51ac1c87e90965f

  • SHA1

    77a671bc6f1bf7fb1891f2c0c70bf49b12c7ee1e

  • SHA256

    1c85f500e9ca0788bfd183ad5c8a5a8dafe9dd89e76ed7cef7e025f942cd8df4

  • SHA512

    4b9bd5b5f8008f55b609c2cd547e316f18d035b273ffe39e390053ccb8938f7f702c08d20d1c8105dc31930b396138fe75a362838ea052bc0bd1990515332eb3

Score
10/10

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c85f500e9ca0788bfd183ad5c8a5a8dafe9dd89e76ed7cef7e025f942cd8df4.exe
    "C:\Users\Admin\AppData\Local\Temp\1c85f500e9ca0788bfd183ad5c8a5a8dafe9dd89e76ed7cef7e025f942cd8df4.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:368

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/368-60-0x0000000076661000-0x0000000076663000-memory.dmp
    Filesize

    8KB

  • memory/368-61-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB