Analysis

  • max time kernel
    150s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 21:51

General

  • Target

    71aea274979fc1275bacf5bcc1e7da6901171f9d7b695947fed085a553d2d994.exe

  • Size

    1.0MB

  • MD5

    a03ed43ace6d29aaecf9a6c13bdc7b86

  • SHA1

    065ecf33db60b29a7bdd79c216e212a474ea34e5

  • SHA256

    71aea274979fc1275bacf5bcc1e7da6901171f9d7b695947fed085a553d2d994

  • SHA512

    7525501194eeeee98ab0a7e666c076392481692877780bad88a09fdfa5d4937c58faaa299885a1bf6b14d008fc3b9dcddd91ba8ec1747e4e33499ed3ed74cb0b

  • SSDEEP

    24576:6Ljvo3mJoJji1lybDnmHOu5vnp9k0soC+juQAJcC:KjvoR9iDU0t5vIKju1c

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

cabronez.no-ip.org:1604

Mutex

DC_MUTEX-09463WY

Attributes
  • InstallPath

    Winlogin\Winlogin.exe

  • gencode

    BYJoRgU93ded

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    Winlogin

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71aea274979fc1275bacf5bcc1e7da6901171f9d7b695947fed085a553d2d994.exe
    "C:\Users\Admin\AppData\Local\Temp\71aea274979fc1275bacf5bcc1e7da6901171f9d7b695947fed085a553d2d994.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\torrentz.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\torrentz.exe
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Windows\SysWOW64\Winlogin\Winlogin.exe
        "C:\Windows\system32\Winlogin\Winlogin.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:980
        • C:\Windows\SysWOW64\notepad.exe
          notepad
          4⤵
            PID:2040
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EPICBO~1.EXE
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EPICBO~1.EXE
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1256
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EPICBO~1.EXE
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EPICBO~1.EXE" /wrapper /dir="C:\Users\Admin\AppData\Local\Temp\pkg_32ba1d50" /pproc="71aea274979fc1275bacf5bcc1e7da6901171f9d7b695947fed085a553d2d994.exe"
          3⤵
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:880
          • C:\Users\Admin\AppData\LocalLow\cookieman.exe
            "C:\Users\Admin\AppData\LocalLow\cookieman.exe" /mode=read installiq.com
            4⤵
            • Executes dropped EXE
            PID:1504

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\cookie.ini

            Filesize

            34B

            MD5

            3f4519b56cb1e006dfe4341e72112913

            SHA1

            0ff5675d359c898b6a6bdc1dff10f71097bc9927

            SHA256

            125adf4924899f2026436c0919853bb78b718c7cb6f2187148b01938b79388a2

            SHA512

            78c0961f0828f32032c643f0e6ab59d1ca8b96bb891a74b0b255e1a1a63a0c581f486e9e16b070399e6365d1fb53464eb2b723932480b41a2df5e9f1eb89ab40

          • C:\Users\Admin\AppData\LocalLow\cookieman.exe

            Filesize

            45KB

            MD5

            a4cbca81563189287dcbd938fb8cfc7f

            SHA1

            eadf5bdef9fb78dc83c1a2b2f547e12c0146dd6f

            SHA256

            24857bf3c202bec52334804f275f8c291f6276a8c9a46418dcde17068a1afd54

            SHA512

            974ce74f3b8057c94e132cd2aa3b0b7b3207c7f89570eadc222ddfc4e4c700a12e920bb1102699e76bb373e0475500b45d2dd03fc9811975d9f8b1b69159f860

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EPICBO~1.EXE

            Filesize

            1.5MB

            MD5

            1d2465f3281f85b9bc381af61ec5e90c

            SHA1

            ea4dc3045cb82ec2338768a50096b69a59897f2a

            SHA256

            d9e7c18a223f47be40e376ef8024a0ec54e0a55af1c10c24dfe7d6e175bc61de

            SHA512

            12a9679e7aecc8b9f9b313fcf0d198a46b7cc4ea325fd67997c57212b7b6d1c54ecc34e42b647a30ddc4ded9c20a9ee3f254d64af955324bf4e5f129d9830ce0

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EPICBO~1.EXE

            Filesize

            1.5MB

            MD5

            1d2465f3281f85b9bc381af61ec5e90c

            SHA1

            ea4dc3045cb82ec2338768a50096b69a59897f2a

            SHA256

            d9e7c18a223f47be40e376ef8024a0ec54e0a55af1c10c24dfe7d6e175bc61de

            SHA512

            12a9679e7aecc8b9f9b313fcf0d198a46b7cc4ea325fd67997c57212b7b6d1c54ecc34e42b647a30ddc4ded9c20a9ee3f254d64af955324bf4e5f129d9830ce0

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EPICBO~1.EXE

            Filesize

            1.5MB

            MD5

            1d2465f3281f85b9bc381af61ec5e90c

            SHA1

            ea4dc3045cb82ec2338768a50096b69a59897f2a

            SHA256

            d9e7c18a223f47be40e376ef8024a0ec54e0a55af1c10c24dfe7d6e175bc61de

            SHA512

            12a9679e7aecc8b9f9b313fcf0d198a46b7cc4ea325fd67997c57212b7b6d1c54ecc34e42b647a30ddc4ded9c20a9ee3f254d64af955324bf4e5f129d9830ce0

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\torrentz.exe

            Filesize

            251KB

            MD5

            680618c64c9ee623220dcd327d74714a

            SHA1

            d96aba44d6427b7a875b57e8ac5484c92345f8b3

            SHA256

            c30a8a5ae4681f367e84e9660600dbad9345beef04a73cff210473ca1e30c32e

            SHA512

            353c930b04bb3ec389ef7f5536e63c225cdfdb18d9ef8a76ad7dc29e5e3ee51a0b34e78b977c08ffbebe0a55590f289df9bb0cfd13503f793b7f27a7610b064b

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\torrentz.exe

            Filesize

            251KB

            MD5

            680618c64c9ee623220dcd327d74714a

            SHA1

            d96aba44d6427b7a875b57e8ac5484c92345f8b3

            SHA256

            c30a8a5ae4681f367e84e9660600dbad9345beef04a73cff210473ca1e30c32e

            SHA512

            353c930b04bb3ec389ef7f5536e63c225cdfdb18d9ef8a76ad7dc29e5e3ee51a0b34e78b977c08ffbebe0a55590f289df9bb0cfd13503f793b7f27a7610b064b

          • C:\Users\Admin\AppData\Local\Temp\pkg_32ba1d50\autorun.txt

            Filesize

            114B

            MD5

            c819368178ce1e40fd55c813340a597a

            SHA1

            81aef3fd883c52de4fe211f3e43f70137cbccdf6

            SHA256

            1334449583ff7823df9ba97e57bed51eaaba21eed4551e25b07794f1d48c3e31

            SHA512

            753ce58ed7b76de63f8d68bf95949dfd772e805d0ab514f2706d72b2d504fb53e9beadaed0d34d933fee4f98d3ea13172c8b3a0e391bcab639c3d70003ec71a7

          • C:\Users\Admin\AppData\Local\Temp\pkg_32ba1d50\wrapper.xml

            Filesize

            692B

            MD5

            44601e00ff712607d2a0b64de786d843

            SHA1

            5696d1604b564a38669035faf395f78c933d8717

            SHA256

            424ef303f88bcd0c6af1858cdacc0e3225545957fcb6c49110e39ff39b26b7f9

            SHA512

            7328a2db19fc89d43a4c6dac7338ebf71dfe418bf3bd5bf04966afa1cd76cc7c73daeea07496c7df425ad369f6b17ffcbdf3b2d5de7e7d70424621d9375b73d1

          • C:\Windows\SysWOW64\Winlogin\Winlogin.exe

            Filesize

            251KB

            MD5

            680618c64c9ee623220dcd327d74714a

            SHA1

            d96aba44d6427b7a875b57e8ac5484c92345f8b3

            SHA256

            c30a8a5ae4681f367e84e9660600dbad9345beef04a73cff210473ca1e30c32e

            SHA512

            353c930b04bb3ec389ef7f5536e63c225cdfdb18d9ef8a76ad7dc29e5e3ee51a0b34e78b977c08ffbebe0a55590f289df9bb0cfd13503f793b7f27a7610b064b

          • C:\Windows\SysWOW64\Winlogin\Winlogin.exe

            Filesize

            251KB

            MD5

            680618c64c9ee623220dcd327d74714a

            SHA1

            d96aba44d6427b7a875b57e8ac5484c92345f8b3

            SHA256

            c30a8a5ae4681f367e84e9660600dbad9345beef04a73cff210473ca1e30c32e

            SHA512

            353c930b04bb3ec389ef7f5536e63c225cdfdb18d9ef8a76ad7dc29e5e3ee51a0b34e78b977c08ffbebe0a55590f289df9bb0cfd13503f793b7f27a7610b064b

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\EPICBO~1.EXE

            Filesize

            1.5MB

            MD5

            1d2465f3281f85b9bc381af61ec5e90c

            SHA1

            ea4dc3045cb82ec2338768a50096b69a59897f2a

            SHA256

            d9e7c18a223f47be40e376ef8024a0ec54e0a55af1c10c24dfe7d6e175bc61de

            SHA512

            12a9679e7aecc8b9f9b313fcf0d198a46b7cc4ea325fd67997c57212b7b6d1c54ecc34e42b647a30ddc4ded9c20a9ee3f254d64af955324bf4e5f129d9830ce0

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\EPICBO~1.EXE

            Filesize

            1.5MB

            MD5

            1d2465f3281f85b9bc381af61ec5e90c

            SHA1

            ea4dc3045cb82ec2338768a50096b69a59897f2a

            SHA256

            d9e7c18a223f47be40e376ef8024a0ec54e0a55af1c10c24dfe7d6e175bc61de

            SHA512

            12a9679e7aecc8b9f9b313fcf0d198a46b7cc4ea325fd67997c57212b7b6d1c54ecc34e42b647a30ddc4ded9c20a9ee3f254d64af955324bf4e5f129d9830ce0

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\torrentz.exe

            Filesize

            251KB

            MD5

            680618c64c9ee623220dcd327d74714a

            SHA1

            d96aba44d6427b7a875b57e8ac5484c92345f8b3

            SHA256

            c30a8a5ae4681f367e84e9660600dbad9345beef04a73cff210473ca1e30c32e

            SHA512

            353c930b04bb3ec389ef7f5536e63c225cdfdb18d9ef8a76ad7dc29e5e3ee51a0b34e78b977c08ffbebe0a55590f289df9bb0cfd13503f793b7f27a7610b064b

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\torrentz.exe

            Filesize

            251KB

            MD5

            680618c64c9ee623220dcd327d74714a

            SHA1

            d96aba44d6427b7a875b57e8ac5484c92345f8b3

            SHA256

            c30a8a5ae4681f367e84e9660600dbad9345beef04a73cff210473ca1e30c32e

            SHA512

            353c930b04bb3ec389ef7f5536e63c225cdfdb18d9ef8a76ad7dc29e5e3ee51a0b34e78b977c08ffbebe0a55590f289df9bb0cfd13503f793b7f27a7610b064b

          • \Windows\SysWOW64\Winlogin\Winlogin.exe

            Filesize

            251KB

            MD5

            680618c64c9ee623220dcd327d74714a

            SHA1

            d96aba44d6427b7a875b57e8ac5484c92345f8b3

            SHA256

            c30a8a5ae4681f367e84e9660600dbad9345beef04a73cff210473ca1e30c32e

            SHA512

            353c930b04bb3ec389ef7f5536e63c225cdfdb18d9ef8a76ad7dc29e5e3ee51a0b34e78b977c08ffbebe0a55590f289df9bb0cfd13503f793b7f27a7610b064b

          • \Windows\SysWOW64\Winlogin\Winlogin.exe

            Filesize

            251KB

            MD5

            680618c64c9ee623220dcd327d74714a

            SHA1

            d96aba44d6427b7a875b57e8ac5484c92345f8b3

            SHA256

            c30a8a5ae4681f367e84e9660600dbad9345beef04a73cff210473ca1e30c32e

            SHA512

            353c930b04bb3ec389ef7f5536e63c225cdfdb18d9ef8a76ad7dc29e5e3ee51a0b34e78b977c08ffbebe0a55590f289df9bb0cfd13503f793b7f27a7610b064b

          • memory/948-68-0x00000000002B0000-0x0000000000367000-memory.dmp

            Filesize

            732KB

          • memory/980-70-0x0000000000400000-0x00000000004B7000-memory.dmp

            Filesize

            732KB

          • memory/980-85-0x0000000000400000-0x00000000004B7000-memory.dmp

            Filesize

            732KB

          • memory/2004-69-0x0000000000400000-0x00000000004B7000-memory.dmp

            Filesize

            732KB

          • memory/2004-58-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

            Filesize

            8KB