Analysis

  • max time kernel
    93s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 22:02

General

  • Target

    a63014dcd0ad0a29822b3d9d796c704d7458d4b088398711b5168c20095b211d.exe

  • Size

    1.2MB

  • MD5

    a241280d074124e3fa5d05bb2cba8e6e

  • SHA1

    44a4ee61a0f9e647ada2b858942a95b947f05c47

  • SHA256

    a63014dcd0ad0a29822b3d9d796c704d7458d4b088398711b5168c20095b211d

  • SHA512

    be91faeca248ce4e97cf38461b2960f834c513cfae1f8e77fa2df5d702417c256cf9fb368d26428cec1246373f5f9bbf429eeed2a4e92ebfa0df8ad35fc27a83

  • SSDEEP

    12288:wgBvvNVR2ZI0FjCSxOpe3HJaXDngYw89UwmTYjPkgmJFxT6MPUYIAMBQaO9cOCaB:zvzRRwOpXDngYoY8j/UEFcyp0VxPN+r

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

192.168.254.104:1604

ford1981.no-ip.org:1604

Mutex

DC_MUTEX-2V3YSWB

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    aWbR1AewgYg4

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a63014dcd0ad0a29822b3d9d796c704d7458d4b088398711b5168c20095b211d.exe
    "C:\Users\Admin\AppData\Local\Temp\a63014dcd0ad0a29822b3d9d796c704d7458d4b088398711b5168c20095b211d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3796
    • C:\Users\Admin\AppData\Local\Temp\vbc.exe
      C:\Users\Admin\AppData\Local\Temp\vbc.exe
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4968
      • C:\Users\Admin\AppData\Local\Temp\GVAUGAGXKPMXSW.EXE
        "C:\Users\Admin\AppData\Local\Temp\GVAUGAGXKPMXSW.EXE"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Modifies WinLogon
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Windows\SYSTEM32\sc.exe
          sc stop wscsvc
          4⤵
          • Launches sc.exe
          PID:5000
        • C:\Windows\SYSTEM32\sc.exe
          sc stop SharedAccess
          4⤵
          • Launches sc.exe
          PID:2176
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 1960 -s 2484
          4⤵
          • Program crash
          PID:4000
      • C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
        "C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        PID:2016
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 412 -p 1960 -ip 1960
    1⤵
      PID:4536

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe

            Filesize

            1.1MB

            MD5

            d881de17aa8f2e2c08cbb7b265f928f9

            SHA1

            08936aebc87decf0af6e8eada191062b5e65ac2a

            SHA256

            b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

            SHA512

            5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

          • C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe

            Filesize

            1.1MB

            MD5

            d881de17aa8f2e2c08cbb7b265f928f9

            SHA1

            08936aebc87decf0af6e8eada191062b5e65ac2a

            SHA256

            b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

            SHA512

            5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

          • C:\Users\Admin\AppData\Local\Temp\GVAUGAGXKPMXSW.EXE

            Filesize

            27KB

            MD5

            52ef577ace72145d21637aeb3e601a77

            SHA1

            596f3ed18596bf50ad196352f9b7ab93ec5b2e68

            SHA256

            5fb2c38d2378b1ac042eb9412169e8ab4d1b2ac08f65ce4bb4234ecc40839e0a

            SHA512

            355d683ab8016dc851d51d09c81755026f626259b9804ed2ff076d81d38eb3ea7eeafffcefe9db651a05bb56723e4f7a948f35247f8dfe978cde791a150f2ec7

          • C:\Users\Admin\AppData\Local\Temp\GVAUGAGXKPMXSW.EXE

            Filesize

            27KB

            MD5

            52ef577ace72145d21637aeb3e601a77

            SHA1

            596f3ed18596bf50ad196352f9b7ab93ec5b2e68

            SHA256

            5fb2c38d2378b1ac042eb9412169e8ab4d1b2ac08f65ce4bb4234ecc40839e0a

            SHA512

            355d683ab8016dc851d51d09c81755026f626259b9804ed2ff076d81d38eb3ea7eeafffcefe9db651a05bb56723e4f7a948f35247f8dfe978cde791a150f2ec7

          • C:\Users\Admin\AppData\Local\Temp\vbc.exe

            Filesize

            1.1MB

            MD5

            d881de17aa8f2e2c08cbb7b265f928f9

            SHA1

            08936aebc87decf0af6e8eada191062b5e65ac2a

            SHA256

            b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

            SHA512

            5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

          • C:\Users\Admin\AppData\Local\Temp\vbc.exe

            Filesize

            1.1MB

            MD5

            d881de17aa8f2e2c08cbb7b265f928f9

            SHA1

            08936aebc87decf0af6e8eada191062b5e65ac2a

            SHA256

            b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

            SHA512

            5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

          • memory/1960-151-0x00007FFFEE150000-0x00007FFFEEC11000-memory.dmp

            Filesize

            10.8MB

          • memory/1960-156-0x00007FFFEE150000-0x00007FFFEEC11000-memory.dmp

            Filesize

            10.8MB

          • memory/1960-155-0x00007FFFEE150000-0x00007FFFEEC11000-memory.dmp

            Filesize

            10.8MB

          • memory/1960-147-0x0000000000E10000-0x0000000000E1E000-memory.dmp

            Filesize

            56KB

          • memory/3796-133-0x0000000075470000-0x0000000075A21000-memory.dmp

            Filesize

            5.7MB

          • memory/3796-132-0x0000000075470000-0x0000000075A21000-memory.dmp

            Filesize

            5.7MB

          • memory/3796-142-0x0000000075470000-0x0000000075A21000-memory.dmp

            Filesize

            5.7MB

          • memory/4968-138-0x0000000000400000-0x00000000004B9000-memory.dmp

            Filesize

            740KB

          • memory/4968-135-0x0000000000400000-0x00000000004B9000-memory.dmp

            Filesize

            740KB

          • memory/4968-139-0x0000000000400000-0x00000000004B9000-memory.dmp

            Filesize

            740KB

          • memory/4968-143-0x0000000000400000-0x00000000004B9000-memory.dmp

            Filesize

            740KB

          • memory/4968-152-0x0000000000400000-0x00000000004B9000-memory.dmp

            Filesize

            740KB

          • memory/4968-141-0x0000000000400000-0x00000000004B9000-memory.dmp

            Filesize

            740KB