Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 21:51

General

  • Target

    3d91747df27fa6094fc3ee6f93d115288aa6a5d3414fdc970e9669624d796d58.exe

  • Size

    691KB

  • MD5

    a0225368087bee96ce530d10cc9dc300

  • SHA1

    89438fe4a2c079ec4fe5e0ca439d3dcec6926c55

  • SHA256

    3d91747df27fa6094fc3ee6f93d115288aa6a5d3414fdc970e9669624d796d58

  • SHA512

    2ea3c7ae1c20bff1b65736ccc8574333222bf2303fc27c9ad9b794e729361372daa0fa6e182ab0c255118b74b2dabe567f51659db9649ceeccb417029a2ef6e4

  • SSDEEP

    12288:QXhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy452Uq:2nAw2WWeFcfbP9VPSPMTSPL/rWvzq4J6

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Windows security bypass 2 TTPs 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d91747df27fa6094fc3ee6f93d115288aa6a5d3414fdc970e9669624d796d58.exe
    "C:\Users\Admin\AppData\Local\Temp\3d91747df27fa6094fc3ee6f93d115288aa6a5d3414fdc970e9669624d796d58.exe"
    1⤵
    • Windows security bypass
    • Windows security modification
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1388

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads