Analysis

  • max time kernel
    151s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    31-07-2022 08:44

General

  • Target

    6a7094256c550e2b09363147e579f221637dc311ca29bfc4e7afc7c5e5847dba.exe

  • Size

    1.6MB

  • MD5

    189d808e63b0cab773bf93e2d223aa1e

  • SHA1

    ba8ae355509c8c73cd53e32d09f3b756a9876884

  • SHA256

    6a7094256c550e2b09363147e579f221637dc311ca29bfc4e7afc7c5e5847dba

  • SHA512

    5cd92c6f1675b6ecafc8cb713625aeca66576b368cadb186c95f283e676b1bda8e328c1d40d307e7049280b47d831413d5153cefb55b6096012c59af564e3642

Malware Config

Extracted

Family

darkcomet

Botnet

June 10 19

C2

bio4kobs.geekgalaxy.com:1605

Mutex

DC_MUTEX-3UZXKGG

Attributes
  • gencode

    cKHdyd1DkDNv

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 4 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a7094256c550e2b09363147e579f221637dc311ca29bfc4e7afc7c5e5847dba.exe
    "C:\Users\Admin\AppData\Local\Temp\6a7094256c550e2b09363147e579f221637dc311ca29bfc4e7afc7c5e5847dba.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:288
    • C:\Users\Admin\AppData\Local\Cache.exe
      C:\Users\Admin\AppData\Local\Cache.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Windows\SysWOW64\ctfmon.exe
        ctfmon.exe
        3⤵
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        PID:1148
        • C:\Windows\SysWOW64\logagent.exe
          logagent.exe
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1528
          • C:\Windows\SysWOW64\notepad.exe
            notepad
            5⤵
              PID:856

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Cache.exe
      Filesize

      413KB

      MD5

      c6db6ae46411c10036f472634524d56e

      SHA1

      edea43634f29770ae45806a3784c92d936cb39d0

      SHA256

      5d383909ae9cb8cd0cd947c6dd7c1b4efa4c6ee390ac205c796ee659c7846261

      SHA512

      b898f47b688f51f36ef6eb49b9d84abcac7c72beacf5eba61a53f8d1e9173bf3180917538826fac52bcecedf075fe56052f0f5658b757048f8e957eb675c54ec

    • C:\Users\Admin\AppData\Local\Cache.exe
      Filesize

      413KB

      MD5

      c6db6ae46411c10036f472634524d56e

      SHA1

      edea43634f29770ae45806a3784c92d936cb39d0

      SHA256

      5d383909ae9cb8cd0cd947c6dd7c1b4efa4c6ee390ac205c796ee659c7846261

      SHA512

      b898f47b688f51f36ef6eb49b9d84abcac7c72beacf5eba61a53f8d1e9173bf3180917538826fac52bcecedf075fe56052f0f5658b757048f8e957eb675c54ec

    • C:\Users\Admin\AppData\Local\Tm.bmp
      Filesize

      690KB

      MD5

      b18c102b88890dec91896b5a591bd59d

      SHA1

      9cd180e2d83f72013d4be79dc0f59abbb33ec159

      SHA256

      fabc7103396904bd7d967c81ffea1218c1cc7adf5bc33d7ff29fdcbc206bb0f2

      SHA512

      14a1fe14b825cd7c8bf230a6aeb5bc74d9738ab2cbe715e8dcd0056a12a19184c0b636f80d699d465989372b0dbcd1a3905a49c218dd96170c79a09c2f4567d1

    • \Users\Admin\AppData\Local\Cache.exe
      Filesize

      413KB

      MD5

      c6db6ae46411c10036f472634524d56e

      SHA1

      edea43634f29770ae45806a3784c92d936cb39d0

      SHA256

      5d383909ae9cb8cd0cd947c6dd7c1b4efa4c6ee390ac205c796ee659c7846261

      SHA512

      b898f47b688f51f36ef6eb49b9d84abcac7c72beacf5eba61a53f8d1e9173bf3180917538826fac52bcecedf075fe56052f0f5658b757048f8e957eb675c54ec

    • \Users\Admin\AppData\Local\Cache.exe
      Filesize

      413KB

      MD5

      c6db6ae46411c10036f472634524d56e

      SHA1

      edea43634f29770ae45806a3784c92d936cb39d0

      SHA256

      5d383909ae9cb8cd0cd947c6dd7c1b4efa4c6ee390ac205c796ee659c7846261

      SHA512

      b898f47b688f51f36ef6eb49b9d84abcac7c72beacf5eba61a53f8d1e9173bf3180917538826fac52bcecedf075fe56052f0f5658b757048f8e957eb675c54ec

    • memory/288-54-0x0000000076191000-0x0000000076193000-memory.dmp
      Filesize

      8KB

    • memory/288-55-0x0000000000400000-0x00000000005DC000-memory.dmp
      Filesize

      1.9MB

    • memory/288-56-0x0000000000400000-0x00000000005DC000-memory.dmp
      Filesize

      1.9MB

    • memory/288-61-0x0000000000400000-0x00000000005DC000-memory.dmp
      Filesize

      1.9MB

    • memory/856-86-0x0000000000000000-mapping.dmp
    • memory/1148-74-0x0000000020010000-0x00000000200A0000-memory.dmp
      Filesize

      576KB

    • memory/1148-84-0x0000000020010000-0x00000000200A0000-memory.dmp
      Filesize

      576KB

    • memory/1148-72-0x0000000020010000-0x00000000200A0000-memory.dmp
      Filesize

      576KB

    • memory/1148-65-0x0000000000000000-mapping.dmp
    • memory/1528-77-0x0000000000400000-0x00000000004B7000-memory.dmp
      Filesize

      732KB

    • memory/1528-78-0x00000000004B5680-mapping.dmp
    • memory/1528-79-0x0000000000400000-0x00000000004B7000-memory.dmp
      Filesize

      732KB

    • memory/1528-75-0x0000000000400000-0x00000000004B7000-memory.dmp
      Filesize

      732KB

    • memory/1528-82-0x0000000000400000-0x00000000004B7000-memory.dmp
      Filesize

      732KB

    • memory/1528-83-0x0000000000400000-0x00000000004B7000-memory.dmp
      Filesize

      732KB

    • memory/1528-85-0x0000000000400000-0x00000000004B7000-memory.dmp
      Filesize

      732KB

    • memory/1528-88-0x0000000000400000-0x00000000004B7000-memory.dmp
      Filesize

      732KB

    • memory/1652-66-0x0000000020010000-0x00000000200A0000-memory.dmp
      Filesize

      576KB

    • memory/1652-59-0x0000000000000000-mapping.dmp