Analysis

  • max time kernel
    151s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    28-09-2021 09:15

General

  • Target

    3717bcafe138127143c62d0dee487defbe451a3c818f98f5e8c9d0f43bbd6e96.exe

  • Size

    1.8MB

  • MD5

    ef0fa837326628bff5da076ad75a562a

  • SHA1

    e6647ac7c03b9820b2cb23ab174caf4562c3ba59

  • SHA256

    3717bcafe138127143c62d0dee487defbe451a3c818f98f5e8c9d0f43bbd6e96

  • SHA512

    c38c80dd206177e6cc6b12a857b06d500c0a3564bf28ce617ef200b2ac4a16fefb32bfe38babb6870190f89ebec24b2dc733070be82af8998db6bb5eae5fd4fc

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

xExplictions.no-ip.biz:1604

Mutex

DC_MUTEX-GK7869K

Attributes
  • gencode

    jpGnHQUvJBkz

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3717bcafe138127143c62d0dee487defbe451a3c818f98f5e8c9d0f43bbd6e96.exe
    "C:\Users\Admin\AppData\Local\Temp\3717bcafe138127143c62d0dee487defbe451a3c818f98f5e8c9d0f43bbd6e96.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\Desktop\KarmaKoinV1.3.exe
      "C:\Users\Admin\Desktop\KarmaKoinV1.3.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1256
      • C:\Users\Admin\Desktop\KarmaCoinCode.exe
        "C:\Users\Admin\Desktop\KarmaCoinCode.exe"
        3⤵
        • Executes dropped EXE
        PID:824
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        3⤵
          PID:1616
        • C:\Users\Admin\AppData\Local\Temp\cmiadapter.exe
          "C:\Users\Admin\AppData\Local\Temp\cmiadapter.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:520
          • C:\Users\Admin\AppData\Local\Temp\PrintConfig.exe
            "C:\Users\Admin\AppData\Local\Temp\PrintConfig.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1876
            • C:\Windows\SysWOW64\svchost.exe
              "C:\Windows\System32\svchost.exe"
              5⤵
                PID:1880
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /d "C:\Windows\explorer.exe, C:\Users\Admin\AppData\Local\Temp\cmiadapter.exe" /f
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1728
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /d "C:\Windows\explorer.exe, C:\Users\Admin\AppData\Local\Temp\cmiadapter.exe" /f
                5⤵
                • Modifies WinLogon for persistence
                PID:1288
          • C:\Users\Admin\AppData\Local\Temp\cmiadapter.exe
            "C:\Users\Admin\AppData\Local\Temp\cmiadapter.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1540
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1724

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\PrintConfig.exe
        MD5

        2357384541f6a6c7c55bdb0cc5acf123

        SHA1

        f095f825e6a925a6d2d909ec34847e7c1fdf0879

        SHA256

        be46f9d3b9ac1bb680b503c9f67f4d579424601e401eb8a7fa84e92d1cd4017b

        SHA512

        1d782d7eec63367ad46e9e0a1b33df6c3f660dc979cb29ea5b4a5e850d8fb7586238185aa33a44335b804ae6cf43e5992c51d72a4942cbce833f8c2f8005f8ec

      • C:\Users\Admin\AppData\Local\Temp\PrintConfig.exe
        MD5

        2357384541f6a6c7c55bdb0cc5acf123

        SHA1

        f095f825e6a925a6d2d909ec34847e7c1fdf0879

        SHA256

        be46f9d3b9ac1bb680b503c9f67f4d579424601e401eb8a7fa84e92d1cd4017b

        SHA512

        1d782d7eec63367ad46e9e0a1b33df6c3f660dc979cb29ea5b4a5e850d8fb7586238185aa33a44335b804ae6cf43e5992c51d72a4942cbce833f8c2f8005f8ec

      • C:\Users\Admin\AppData\Local\Temp\cmiadapter.exe
        MD5

        c6c51cca0adc05ece4e02e83476a50b9

        SHA1

        dee0bc2c12ef7e5daec14939556b436d626eff25

        SHA256

        af5a14f516166a547c8918005d1a7bdf411e248ae9b49d90ee7b50773cd24db2

        SHA512

        389c42c8c43e60b92427195c572e68e42e56bbf47f21b9fb4d5d4ca5d3ff6d7d69f06538b6852523ebc8b4a3fd0a561f1d962c493890c539c08217a7a22a5dc0

      • C:\Users\Admin\AppData\Local\Temp\cmiadapter.exe
        MD5

        c6c51cca0adc05ece4e02e83476a50b9

        SHA1

        dee0bc2c12ef7e5daec14939556b436d626eff25

        SHA256

        af5a14f516166a547c8918005d1a7bdf411e248ae9b49d90ee7b50773cd24db2

        SHA512

        389c42c8c43e60b92427195c572e68e42e56bbf47f21b9fb4d5d4ca5d3ff6d7d69f06538b6852523ebc8b4a3fd0a561f1d962c493890c539c08217a7a22a5dc0

      • C:\Users\Admin\AppData\Local\Temp\cmiadapter.exe
        MD5

        c6c51cca0adc05ece4e02e83476a50b9

        SHA1

        dee0bc2c12ef7e5daec14939556b436d626eff25

        SHA256

        af5a14f516166a547c8918005d1a7bdf411e248ae9b49d90ee7b50773cd24db2

        SHA512

        389c42c8c43e60b92427195c572e68e42e56bbf47f21b9fb4d5d4ca5d3ff6d7d69f06538b6852523ebc8b4a3fd0a561f1d962c493890c539c08217a7a22a5dc0

      • C:\Users\Admin\Desktop\KarmaCoinCode.exe
        MD5

        6e9ae1add01edc9937c73888c6216594

        SHA1

        a85bec988395e954c1ec9635161f1d869d4b367b

        SHA256

        15c42e8686454d9e50f48140750a366cae0e1a806d7262c8aa684d9b7b54a239

        SHA512

        651a34a99756f536b2f102c8c8679647983856c2054b117f06532b25df92246912bec4596c1ea4036889f9af05a1086ca6338152227410cd7b3607f17c0d1e27

      • C:\Users\Admin\Desktop\KarmaCoinCode.exe
        MD5

        6e9ae1add01edc9937c73888c6216594

        SHA1

        a85bec988395e954c1ec9635161f1d869d4b367b

        SHA256

        15c42e8686454d9e50f48140750a366cae0e1a806d7262c8aa684d9b7b54a239

        SHA512

        651a34a99756f536b2f102c8c8679647983856c2054b117f06532b25df92246912bec4596c1ea4036889f9af05a1086ca6338152227410cd7b3607f17c0d1e27

      • C:\Users\Admin\Desktop\KarmaKoinV1.3.exe
        MD5

        2357384541f6a6c7c55bdb0cc5acf123

        SHA1

        f095f825e6a925a6d2d909ec34847e7c1fdf0879

        SHA256

        be46f9d3b9ac1bb680b503c9f67f4d579424601e401eb8a7fa84e92d1cd4017b

        SHA512

        1d782d7eec63367ad46e9e0a1b33df6c3f660dc979cb29ea5b4a5e850d8fb7586238185aa33a44335b804ae6cf43e5992c51d72a4942cbce833f8c2f8005f8ec

      • C:\Users\Admin\Desktop\KarmaKoinV1.3.exe
        MD5

        2357384541f6a6c7c55bdb0cc5acf123

        SHA1

        f095f825e6a925a6d2d909ec34847e7c1fdf0879

        SHA256

        be46f9d3b9ac1bb680b503c9f67f4d579424601e401eb8a7fa84e92d1cd4017b

        SHA512

        1d782d7eec63367ad46e9e0a1b33df6c3f660dc979cb29ea5b4a5e850d8fb7586238185aa33a44335b804ae6cf43e5992c51d72a4942cbce833f8c2f8005f8ec

      • \Users\Admin\AppData\Local\Temp\PrintConfig.exe
        MD5

        2357384541f6a6c7c55bdb0cc5acf123

        SHA1

        f095f825e6a925a6d2d909ec34847e7c1fdf0879

        SHA256

        be46f9d3b9ac1bb680b503c9f67f4d579424601e401eb8a7fa84e92d1cd4017b

        SHA512

        1d782d7eec63367ad46e9e0a1b33df6c3f660dc979cb29ea5b4a5e850d8fb7586238185aa33a44335b804ae6cf43e5992c51d72a4942cbce833f8c2f8005f8ec

      • \Users\Admin\AppData\Local\Temp\cmiadapter.exe
        MD5

        c6c51cca0adc05ece4e02e83476a50b9

        SHA1

        dee0bc2c12ef7e5daec14939556b436d626eff25

        SHA256

        af5a14f516166a547c8918005d1a7bdf411e248ae9b49d90ee7b50773cd24db2

        SHA512

        389c42c8c43e60b92427195c572e68e42e56bbf47f21b9fb4d5d4ca5d3ff6d7d69f06538b6852523ebc8b4a3fd0a561f1d962c493890c539c08217a7a22a5dc0

      • \Users\Admin\AppData\Local\Temp\cmiadapter.exe
        MD5

        c6c51cca0adc05ece4e02e83476a50b9

        SHA1

        dee0bc2c12ef7e5daec14939556b436d626eff25

        SHA256

        af5a14f516166a547c8918005d1a7bdf411e248ae9b49d90ee7b50773cd24db2

        SHA512

        389c42c8c43e60b92427195c572e68e42e56bbf47f21b9fb4d5d4ca5d3ff6d7d69f06538b6852523ebc8b4a3fd0a561f1d962c493890c539c08217a7a22a5dc0

      • \Users\Admin\Desktop\KarmaCoinCode.exe
        MD5

        6e9ae1add01edc9937c73888c6216594

        SHA1

        a85bec988395e954c1ec9635161f1d869d4b367b

        SHA256

        15c42e8686454d9e50f48140750a366cae0e1a806d7262c8aa684d9b7b54a239

        SHA512

        651a34a99756f536b2f102c8c8679647983856c2054b117f06532b25df92246912bec4596c1ea4036889f9af05a1086ca6338152227410cd7b3607f17c0d1e27

      • \Users\Admin\Desktop\KarmaKoinV1.3.exe
        MD5

        2357384541f6a6c7c55bdb0cc5acf123

        SHA1

        f095f825e6a925a6d2d909ec34847e7c1fdf0879

        SHA256

        be46f9d3b9ac1bb680b503c9f67f4d579424601e401eb8a7fa84e92d1cd4017b

        SHA512

        1d782d7eec63367ad46e9e0a1b33df6c3f660dc979cb29ea5b4a5e850d8fb7586238185aa33a44335b804ae6cf43e5992c51d72a4942cbce833f8c2f8005f8ec

      • memory/520-84-0x0000000000B60000-0x0000000000B61000-memory.dmp
        Filesize

        4KB

      • memory/520-80-0x0000000000000000-mapping.dmp
      • memory/824-74-0x0000000000000000-mapping.dmp
      • memory/824-85-0x0000000000A50000-0x0000000000A51000-memory.dmp
        Filesize

        4KB

      • memory/824-87-0x00000000020D0000-0x00000000020D1000-memory.dmp
        Filesize

        4KB

      • memory/824-88-0x00000000020D5000-0x00000000020E6000-memory.dmp
        Filesize

        68KB

      • memory/1256-63-0x0000000000000000-mapping.dmp
      • memory/1256-70-0x0000000001E50000-0x0000000001E51000-memory.dmp
        Filesize

        4KB

      • memory/1288-95-0x0000000000000000-mapping.dmp
      • memory/1540-101-0x0000000000B40000-0x0000000000B41000-memory.dmp
        Filesize

        4KB

      • memory/1540-98-0x0000000000000000-mapping.dmp
      • memory/1616-78-0x00000000004B307E-mapping.dmp
      • memory/1616-77-0x0000000000400000-0x00000000004B8000-memory.dmp
        Filesize

        736KB

      • memory/1652-60-0x0000000076641000-0x0000000076643000-memory.dmp
        Filesize

        8KB

      • memory/1652-61-0x0000000000CB0000-0x0000000000CB1000-memory.dmp
        Filesize

        4KB

      • memory/1724-71-0x0000000000400000-0x00000000004B2000-memory.dmp
        Filesize

        712KB

      • memory/1724-72-0x0000000000260000-0x0000000000261000-memory.dmp
        Filesize

        4KB

      • memory/1724-68-0x000000000048F888-mapping.dmp
      • memory/1724-67-0x0000000000400000-0x00000000004B2000-memory.dmp
        Filesize

        712KB

      • memory/1728-91-0x0000000000000000-mapping.dmp
      • memory/1876-96-0x0000000000BB0000-0x0000000000BB1000-memory.dmp
        Filesize

        4KB

      • memory/1876-92-0x0000000000000000-mapping.dmp
      • memory/1880-103-0x00000000004B307E-mapping.dmp