Analysis

  • max time kernel
    36s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 21:21

General

  • Target

    edc3059056a17d92764fe565ba27ab6b03ea9a9e9d31eddc74b19893526f394d.exe

  • Size

    772KB

  • MD5

    a1613b044cd3b96c095bb159d974fdd0

  • SHA1

    a00a19578d0ce9b20c41b286710ea23119c73dd5

  • SHA256

    edc3059056a17d92764fe565ba27ab6b03ea9a9e9d31eddc74b19893526f394d

  • SHA512

    8271a6d7523f8ab73e41d9beae3cef90aeb17c5be12f8f85a5505acd4ddc70d5a1496481a231dc213bacb2d6b3c5a7e39d5e50009ed8529468cd37e3fde71a0d

  • SSDEEP

    12288:2aQX8+MJfkLHpEs4HUY7jYrFOzUnEPO4hYMaEw8HEPvoSrtrcL0Sn39K8AhHCBw:hQX8idEsSlzUnEPOc/wyEPTBc344

Malware Config

Extracted

Family

darkcomet

Botnet

Guest

C2

poorme.no-ip.biz:2000

Mutex

DC_MUTEX-V7D2UFA

Attributes
  • InstallPath

    MSDCSC\Nod32.exe

  • gencode

    1DkFyWqFtAml

  • install

    true

  • offline_keylogger

    false

  • persistence

    true

  • reg_key

    cmD

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edc3059056a17d92764fe565ba27ab6b03ea9a9e9d31eddc74b19893526f394d.exe
    "C:\Users\Admin\AppData\Local\Temp\edc3059056a17d92764fe565ba27ab6b03ea9a9e9d31eddc74b19893526f394d.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Users\Admin\AppData\Local\Temp\ANTIDOTE8VX_PATCHER.EXE
      "C:\Users\Admin\AppData\Local\Temp\ANTIDOTE8VX_PATCHER.EXE"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:1960
    • C:\Windows\SysWOW64\MSDCSC\Nod32.exe
      "C:\Windows\system32\MSDCSC\Nod32.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1740
      • C:\Users\Admin\AppData\Local\Temp\ANTIDOTE8VX_PATCHER.EXE
        "C:\Users\Admin\AppData\Local\Temp\ANTIDOTE8VX_PATCHER.EXE"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1392
      • C:\Windows\SysWOW64\MSDCSC\1DkFyWqFtAml\Nod32.exe
        "C:\Windows\system32\MSDCSC\1DkFyWqFtAml\Nod32.exe"
        3⤵
        • Executes dropped EXE
        PID:1252

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\jI82l\PCG.LI6

          Filesize

          3KB

          MD5

          974ae15ff6f92a908a247cbcdeac1dd0

          SHA1

          a9d2b31836559845473c33cdf5bc97df76223276

          SHA256

          7dc638605e2edfd7c0c1222a0026d53e39be377e892f031eee159b20df7e1fd8

          SHA512

          2b05d9b3551458eb218dc35b030694ce24b1f7ff4919ec60b8b7305973f54d4f03b7d02457ba8f382e72ab382691b248c35b0f8637da13bfb2de0278c6364066

        • C:\ProgramData\jI82l\PCG.LI6

          Filesize

          3KB

          MD5

          ff9f94847a046452e40fb39726736576

          SHA1

          ded8a0ed7b4522f9ac68cf1576cab88a5d287000

          SHA256

          a6444221a31a698569e0e6dee05ed773091cc4bedf3947a63e739c710b3f697d

          SHA512

          d07dc18986d1cf7e5f1941cd3ee51bcf9d1d2291bd8f2c8ec6366ac138b31786146a8fb84f1773843042d9c6e75b690dbc042a688efb6604078dabe08fa7d01c

        • C:\Users\Admin\AppData\Local\Temp\ANTIDOTE8VX_PATCHER.EXE

          Filesize

          12KB

          MD5

          18116d4edefb89dc09e4b65a861bfb17

          SHA1

          ff7ebd5221868e7f1bdf78340cae7d45af1c2cb6

          SHA256

          a3e8b7f48d25c8060ec90122c2c60ffc445c2f8e3976431012dba42de001ea01

          SHA512

          39262dfd2f4f8d3a55252f186b18319cab0d5b21402e5f13fe4e22eaa58ad954700cff957012f7cba8ed1b055d39a34477d8dc2646b5ddbd03bc2de52c2301b6

        • C:\Users\Admin\AppData\Local\Temp\ANTIDOTE8VX_PATCHER.EXE

          Filesize

          12KB

          MD5

          18116d4edefb89dc09e4b65a861bfb17

          SHA1

          ff7ebd5221868e7f1bdf78340cae7d45af1c2cb6

          SHA256

          a3e8b7f48d25c8060ec90122c2c60ffc445c2f8e3976431012dba42de001ea01

          SHA512

          39262dfd2f4f8d3a55252f186b18319cab0d5b21402e5f13fe4e22eaa58ad954700cff957012f7cba8ed1b055d39a34477d8dc2646b5ddbd03bc2de52c2301b6

        • C:\Users\Admin\AppData\Local\Temp\ANTIDOTE8VX_PATCHER.EXE

          Filesize

          12KB

          MD5

          18116d4edefb89dc09e4b65a861bfb17

          SHA1

          ff7ebd5221868e7f1bdf78340cae7d45af1c2cb6

          SHA256

          a3e8b7f48d25c8060ec90122c2c60ffc445c2f8e3976431012dba42de001ea01

          SHA512

          39262dfd2f4f8d3a55252f186b18319cab0d5b21402e5f13fe4e22eaa58ad954700cff957012f7cba8ed1b055d39a34477d8dc2646b5ddbd03bc2de52c2301b6

        • C:\Windows\SysWOW64\MSDCSC\1DkFyWqFtAml\Nod32.exe

          Filesize

          772KB

          MD5

          a1613b044cd3b96c095bb159d974fdd0

          SHA1

          a00a19578d0ce9b20c41b286710ea23119c73dd5

          SHA256

          edc3059056a17d92764fe565ba27ab6b03ea9a9e9d31eddc74b19893526f394d

          SHA512

          8271a6d7523f8ab73e41d9beae3cef90aeb17c5be12f8f85a5505acd4ddc70d5a1496481a231dc213bacb2d6b3c5a7e39d5e50009ed8529468cd37e3fde71a0d

        • C:\Windows\SysWOW64\MSDCSC\Nod32.exe

          Filesize

          772KB

          MD5

          a1613b044cd3b96c095bb159d974fdd0

          SHA1

          a00a19578d0ce9b20c41b286710ea23119c73dd5

          SHA256

          edc3059056a17d92764fe565ba27ab6b03ea9a9e9d31eddc74b19893526f394d

          SHA512

          8271a6d7523f8ab73e41d9beae3cef90aeb17c5be12f8f85a5505acd4ddc70d5a1496481a231dc213bacb2d6b3c5a7e39d5e50009ed8529468cd37e3fde71a0d

        • C:\Windows\SysWOW64\MSDCSC\Nod32.exe

          Filesize

          772KB

          MD5

          a1613b044cd3b96c095bb159d974fdd0

          SHA1

          a00a19578d0ce9b20c41b286710ea23119c73dd5

          SHA256

          edc3059056a17d92764fe565ba27ab6b03ea9a9e9d31eddc74b19893526f394d

          SHA512

          8271a6d7523f8ab73e41d9beae3cef90aeb17c5be12f8f85a5505acd4ddc70d5a1496481a231dc213bacb2d6b3c5a7e39d5e50009ed8529468cd37e3fde71a0d

        • \Users\Admin\AppData\Local\Temp\ANTIDOTE8VX_PATCHER.EXE

          Filesize

          12KB

          MD5

          18116d4edefb89dc09e4b65a861bfb17

          SHA1

          ff7ebd5221868e7f1bdf78340cae7d45af1c2cb6

          SHA256

          a3e8b7f48d25c8060ec90122c2c60ffc445c2f8e3976431012dba42de001ea01

          SHA512

          39262dfd2f4f8d3a55252f186b18319cab0d5b21402e5f13fe4e22eaa58ad954700cff957012f7cba8ed1b055d39a34477d8dc2646b5ddbd03bc2de52c2301b6

        • \Users\Admin\AppData\Local\Temp\ANTIDOTE8VX_PATCHER.EXE

          Filesize

          12KB

          MD5

          18116d4edefb89dc09e4b65a861bfb17

          SHA1

          ff7ebd5221868e7f1bdf78340cae7d45af1c2cb6

          SHA256

          a3e8b7f48d25c8060ec90122c2c60ffc445c2f8e3976431012dba42de001ea01

          SHA512

          39262dfd2f4f8d3a55252f186b18319cab0d5b21402e5f13fe4e22eaa58ad954700cff957012f7cba8ed1b055d39a34477d8dc2646b5ddbd03bc2de52c2301b6

        • \Users\Admin\AppData\Local\Temp\ANTIDOTE8VX_PATCHER.EXE

          Filesize

          12KB

          MD5

          18116d4edefb89dc09e4b65a861bfb17

          SHA1

          ff7ebd5221868e7f1bdf78340cae7d45af1c2cb6

          SHA256

          a3e8b7f48d25c8060ec90122c2c60ffc445c2f8e3976431012dba42de001ea01

          SHA512

          39262dfd2f4f8d3a55252f186b18319cab0d5b21402e5f13fe4e22eaa58ad954700cff957012f7cba8ed1b055d39a34477d8dc2646b5ddbd03bc2de52c2301b6

        • \Users\Admin\AppData\Local\Temp\ANTIDOTE8VX_PATCHER.EXE

          Filesize

          12KB

          MD5

          18116d4edefb89dc09e4b65a861bfb17

          SHA1

          ff7ebd5221868e7f1bdf78340cae7d45af1c2cb6

          SHA256

          a3e8b7f48d25c8060ec90122c2c60ffc445c2f8e3976431012dba42de001ea01

          SHA512

          39262dfd2f4f8d3a55252f186b18319cab0d5b21402e5f13fe4e22eaa58ad954700cff957012f7cba8ed1b055d39a34477d8dc2646b5ddbd03bc2de52c2301b6

        • \Users\Admin\AppData\Local\Temp\ANTIDOTE8VX_PATCHER.EXE

          Filesize

          12KB

          MD5

          18116d4edefb89dc09e4b65a861bfb17

          SHA1

          ff7ebd5221868e7f1bdf78340cae7d45af1c2cb6

          SHA256

          a3e8b7f48d25c8060ec90122c2c60ffc445c2f8e3976431012dba42de001ea01

          SHA512

          39262dfd2f4f8d3a55252f186b18319cab0d5b21402e5f13fe4e22eaa58ad954700cff957012f7cba8ed1b055d39a34477d8dc2646b5ddbd03bc2de52c2301b6

        • \Users\Admin\AppData\Local\Temp\ANTIDOTE8VX_PATCHER.EXE

          Filesize

          12KB

          MD5

          18116d4edefb89dc09e4b65a861bfb17

          SHA1

          ff7ebd5221868e7f1bdf78340cae7d45af1c2cb6

          SHA256

          a3e8b7f48d25c8060ec90122c2c60ffc445c2f8e3976431012dba42de001ea01

          SHA512

          39262dfd2f4f8d3a55252f186b18319cab0d5b21402e5f13fe4e22eaa58ad954700cff957012f7cba8ed1b055d39a34477d8dc2646b5ddbd03bc2de52c2301b6

        • \Users\Admin\AppData\Local\Temp\ANTIDOTE8VX_PATCHER.EXE

          Filesize

          12KB

          MD5

          18116d4edefb89dc09e4b65a861bfb17

          SHA1

          ff7ebd5221868e7f1bdf78340cae7d45af1c2cb6

          SHA256

          a3e8b7f48d25c8060ec90122c2c60ffc445c2f8e3976431012dba42de001ea01

          SHA512

          39262dfd2f4f8d3a55252f186b18319cab0d5b21402e5f13fe4e22eaa58ad954700cff957012f7cba8ed1b055d39a34477d8dc2646b5ddbd03bc2de52c2301b6

        • \Users\Admin\AppData\Local\Temp\ANTIDOTE8VX_PATCHER.EXE

          Filesize

          12KB

          MD5

          18116d4edefb89dc09e4b65a861bfb17

          SHA1

          ff7ebd5221868e7f1bdf78340cae7d45af1c2cb6

          SHA256

          a3e8b7f48d25c8060ec90122c2c60ffc445c2f8e3976431012dba42de001ea01

          SHA512

          39262dfd2f4f8d3a55252f186b18319cab0d5b21402e5f13fe4e22eaa58ad954700cff957012f7cba8ed1b055d39a34477d8dc2646b5ddbd03bc2de52c2301b6

        • \Windows\SysWOW64\MSDCSC\1DkFyWqFtAml\Nod32.exe

          Filesize

          772KB

          MD5

          a1613b044cd3b96c095bb159d974fdd0

          SHA1

          a00a19578d0ce9b20c41b286710ea23119c73dd5

          SHA256

          edc3059056a17d92764fe565ba27ab6b03ea9a9e9d31eddc74b19893526f394d

          SHA512

          8271a6d7523f8ab73e41d9beae3cef90aeb17c5be12f8f85a5505acd4ddc70d5a1496481a231dc213bacb2d6b3c5a7e39d5e50009ed8529468cd37e3fde71a0d

        • \Windows\SysWOW64\MSDCSC\1DkFyWqFtAml\Nod32.exe

          Filesize

          772KB

          MD5

          a1613b044cd3b96c095bb159d974fdd0

          SHA1

          a00a19578d0ce9b20c41b286710ea23119c73dd5

          SHA256

          edc3059056a17d92764fe565ba27ab6b03ea9a9e9d31eddc74b19893526f394d

          SHA512

          8271a6d7523f8ab73e41d9beae3cef90aeb17c5be12f8f85a5505acd4ddc70d5a1496481a231dc213bacb2d6b3c5a7e39d5e50009ed8529468cd37e3fde71a0d

        • \Windows\SysWOW64\MSDCSC\Nod32.exe

          Filesize

          772KB

          MD5

          a1613b044cd3b96c095bb159d974fdd0

          SHA1

          a00a19578d0ce9b20c41b286710ea23119c73dd5

          SHA256

          edc3059056a17d92764fe565ba27ab6b03ea9a9e9d31eddc74b19893526f394d

          SHA512

          8271a6d7523f8ab73e41d9beae3cef90aeb17c5be12f8f85a5505acd4ddc70d5a1496481a231dc213bacb2d6b3c5a7e39d5e50009ed8529468cd37e3fde71a0d

        • \Windows\SysWOW64\MSDCSC\Nod32.exe

          Filesize

          772KB

          MD5

          a1613b044cd3b96c095bb159d974fdd0

          SHA1

          a00a19578d0ce9b20c41b286710ea23119c73dd5

          SHA256

          edc3059056a17d92764fe565ba27ab6b03ea9a9e9d31eddc74b19893526f394d

          SHA512

          8271a6d7523f8ab73e41d9beae3cef90aeb17c5be12f8f85a5505acd4ddc70d5a1496481a231dc213bacb2d6b3c5a7e39d5e50009ed8529468cd37e3fde71a0d

        • memory/1252-96-0x0000000000400000-0x00000000004D1000-memory.dmp

          Filesize

          836KB

        • memory/1252-97-0x0000000000400000-0x00000000004D1000-memory.dmp

          Filesize

          836KB

        • memory/1392-95-0x0000000000020000-0x000000000002B000-memory.dmp

          Filesize

          44KB

        • memory/1392-93-0x0000000000020000-0x000000000002B000-memory.dmp

          Filesize

          44KB

        • memory/1392-94-0x0000000000020000-0x000000000002B000-memory.dmp

          Filesize

          44KB

        • memory/1392-102-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1392-103-0x0000000000020000-0x000000000002B000-memory.dmp

          Filesize

          44KB

        • memory/1392-92-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1392-104-0x0000000000020000-0x000000000002B000-memory.dmp

          Filesize

          44KB

        • memory/1668-74-0x0000000000400000-0x00000000004D1000-memory.dmp

          Filesize

          836KB

        • memory/1668-75-0x0000000004EA0000-0x0000000004F71000-memory.dmp

          Filesize

          836KB

        • memory/1668-57-0x0000000000400000-0x00000000004D1000-memory.dmp

          Filesize

          836KB

        • memory/1668-54-0x0000000075241000-0x0000000075243000-memory.dmp

          Filesize

          8KB

        • memory/1668-58-0x00000000026A0000-0x00000000026AB000-memory.dmp

          Filesize

          44KB

        • memory/1740-89-0x0000000000400000-0x00000000004D1000-memory.dmp

          Filesize

          836KB

        • memory/1740-76-0x0000000000400000-0x00000000004D1000-memory.dmp

          Filesize

          836KB

        • memory/1960-72-0x0000000000020000-0x000000000002B000-memory.dmp

          Filesize

          44KB

        • memory/1960-98-0x0000000000020000-0x000000000002B000-memory.dmp

          Filesize

          44KB

        • memory/1960-99-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1960-100-0x0000000000020000-0x000000000002B000-memory.dmp

          Filesize

          44KB

        • memory/1960-101-0x0000000000020000-0x000000000002B000-memory.dmp

          Filesize

          44KB

        • memory/1960-71-0x0000000000020000-0x000000000002B000-memory.dmp

          Filesize

          44KB

        • memory/1960-69-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB