Analysis

  • max time kernel
    147s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    28-09-2021 09:19

General

  • Target

    e0380fd96474eebdde85471abc553c688cef21db70120fb7352151ad58c954a2.exe

  • Size

    1.5MB

  • MD5

    f548e99a9e0b219930e28696a0979619

  • SHA1

    fc09b9c82ac761f28a04c2d4d3bdf07b000d6b47

  • SHA256

    e0380fd96474eebdde85471abc553c688cef21db70120fb7352151ad58c954a2

  • SHA512

    bf875c949a83a1babd1f6c91fc707aac7e759cfa043f7289c96ff1ebdee30ea423277896cd2ebabfaf206d4a8e81a708aa93cdbe2d6255487582ff85d50aded7

Malware Config

Extracted

Family

darkcomet

Botnet

Sazan

C2

127.0.0.1:1604

Mutex

DC_MUTEX-SWYB0HA

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    jA5Q6JBljsdN

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Sets file to hidden 1 TTPs

    Modifies file attributes to stop it showing in Explorer etc.

  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0380fd96474eebdde85471abc553c688cef21db70120fb7352151ad58c954a2.exe
    "C:\Users\Admin\AppData\Local\Temp\e0380fd96474eebdde85471abc553c688cef21db70120fb7352151ad58c954a2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1580
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" +s +h
          4⤵
          • Drops file in Windows directory
          • Views/modifies file attributes
          PID:1480
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v4.0.30319" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1556
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Windows\Microsoft.NET\Framework\v4.0.30319" +s +h
          4⤵
          • Drops file in Windows directory
          • Views/modifies file attributes
          PID:1904
      • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
        "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        PID:1232

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Hidden Files and Directories

2
T1158

Scripting

1
T1064

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
    MD5

    1f7bccc57d21a4bfeddaafe514cfd74d

    SHA1

    4dab09179a12468cb1757cb7ca26e06d616b0a8d

    SHA256

    d4cb7377e8275ed47e499ab0d7ee47167829a5931ba41aa5790593595a7e1061

    SHA512

    9e639c777dc2d456f038c14efb7cbc871ceb1d7380a74d18fb722a28901357ccb1166c0d883562280e030f0252004ca13a1371ea480d0523c435cd0a6d9f43d8

  • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
    MD5

    1f7bccc57d21a4bfeddaafe514cfd74d

    SHA1

    4dab09179a12468cb1757cb7ca26e06d616b0a8d

    SHA256

    d4cb7377e8275ed47e499ab0d7ee47167829a5931ba41aa5790593595a7e1061

    SHA512

    9e639c777dc2d456f038c14efb7cbc871ceb1d7380a74d18fb722a28901357ccb1166c0d883562280e030f0252004ca13a1371ea480d0523c435cd0a6d9f43d8

  • \Users\Admin\Documents\MSDCSC\msdcsc.exe
    MD5

    1f7bccc57d21a4bfeddaafe514cfd74d

    SHA1

    4dab09179a12468cb1757cb7ca26e06d616b0a8d

    SHA256

    d4cb7377e8275ed47e499ab0d7ee47167829a5931ba41aa5790593595a7e1061

    SHA512

    9e639c777dc2d456f038c14efb7cbc871ceb1d7380a74d18fb722a28901357ccb1166c0d883562280e030f0252004ca13a1371ea480d0523c435cd0a6d9f43d8

  • memory/1112-54-0x0000000075871000-0x0000000075873000-memory.dmp
    Filesize

    8KB

  • memory/1232-65-0x0000000000000000-mapping.dmp
  • memory/1480-60-0x0000000000000000-mapping.dmp
  • memory/1556-59-0x0000000000000000-mapping.dmp
  • memory/1580-58-0x0000000000000000-mapping.dmp
  • memory/1904-61-0x0000000000000000-mapping.dmp
  • memory/2024-63-0x0000000000110000-0x0000000000111000-memory.dmp
    Filesize

    4KB

  • memory/2024-62-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/2024-56-0x000000000048F888-mapping.dmp
  • memory/2024-55-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB