Analysis

  • max time kernel
    155s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 14:08

General

  • Target

    f85a49531e9d2b8fba2f505b6199111d3eb7ec20c3226278ec631e868a5c6f1f.exe

  • Size

    1.4MB

  • MD5

    f1dce02270c994b295f4e0c501a68688

  • SHA1

    0dbfe5bc38fc766fec9da4dc9bad677733c44dad

  • SHA256

    f85a49531e9d2b8fba2f505b6199111d3eb7ec20c3226278ec631e868a5c6f1f

  • SHA512

    74a04f4a78a94c8c35d203dd348cc42147a51e8255c3317b37449be934a4f60f5dbf4a9d0d15ef4ae4b5c3577b5428d9f12c34213642897ad37732d4654695cf

  • SSDEEP

    24576:Gx4Xwm93aftAyKOTyHm4yIHKib/p6e0Brc2UJ8K5+c9pB2DZJ7JsXlSV3CQOD3fv:KOT9dysmf6d/4CnR+00D7Jyf

Malware Config

Extracted

Family

darkcomet

Botnet

Rat

C2

testingdirtypic.no-ip.biz:1701

Mutex

DC_MUTEX-K8KYHE6

Attributes
  • InstallPath

    WinDir\rundll32.exe

  • gencode

    hpWkLgQk4yn2

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    Windows Rundll32

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f85a49531e9d2b8fba2f505b6199111d3eb7ec20c3226278ec631e868a5c6f1f.exe
    "C:\Users\Admin\AppData\Local\Temp\f85a49531e9d2b8fba2f505b6199111d3eb7ec20c3226278ec631e868a5c6f1f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • Modifies WinLogon for persistence
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4896
      • C:\Users\Admin\AppData\Local\Temp\WinDir\rundll32.exe
        "C:\Users\Admin\AppData\Local\Temp\WinDir\rundll32.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:920
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          4⤵
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\WinDir\rundll32.exe

    Filesize

    1.4MB

    MD5

    f1dce02270c994b295f4e0c501a68688

    SHA1

    0dbfe5bc38fc766fec9da4dc9bad677733c44dad

    SHA256

    f85a49531e9d2b8fba2f505b6199111d3eb7ec20c3226278ec631e868a5c6f1f

    SHA512

    74a04f4a78a94c8c35d203dd348cc42147a51e8255c3317b37449be934a4f60f5dbf4a9d0d15ef4ae4b5c3577b5428d9f12c34213642897ad37732d4654695cf

  • C:\Users\Admin\AppData\Local\Temp\WinDir\rundll32.exe

    Filesize

    1.4MB

    MD5

    f1dce02270c994b295f4e0c501a68688

    SHA1

    0dbfe5bc38fc766fec9da4dc9bad677733c44dad

    SHA256

    f85a49531e9d2b8fba2f505b6199111d3eb7ec20c3226278ec631e868a5c6f1f

    SHA512

    74a04f4a78a94c8c35d203dd348cc42147a51e8255c3317b37449be934a4f60f5dbf4a9d0d15ef4ae4b5c3577b5428d9f12c34213642897ad37732d4654695cf

  • memory/920-147-0x0000000074990000-0x0000000074F41000-memory.dmp

    Filesize

    5.7MB

  • memory/1556-132-0x00000000748A0000-0x0000000074E51000-memory.dmp

    Filesize

    5.7MB

  • memory/1556-137-0x00000000748A0000-0x0000000074E51000-memory.dmp

    Filesize

    5.7MB

  • memory/1780-146-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/1780-148-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/1780-149-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/4896-138-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/4896-136-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/4896-135-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/4896-142-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/4896-134-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB