Analysis

  • max time kernel
    151s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2022 02:02

General

  • Target

    4787475f9db3bcd0753330fa904898e5ba4f63401d09a20929036e8ab512ba75.exe

  • Size

    1.1MB

  • MD5

    058d38212447c0e8164820368f6f3d6f

  • SHA1

    8f2d6bc502fd1c863ff962dd8e59c10558017507

  • SHA256

    4787475f9db3bcd0753330fa904898e5ba4f63401d09a20929036e8ab512ba75

  • SHA512

    f8e569fa81ff401c340bf3367ce86113c7c4fec76e52a170b7fdd102a19c9e22ae4fce97fd843a34bd6a5b8d154b8df055395abd5490d8eedd1cdd7c5a287118

  • SSDEEP

    24576:LSZxSDTIfGPjHX6AqVizETalNJiKPDtM+oXB5uc2zedaa4k9+slgf:LSTOTr36AqAzaWMFR5oadaagso

Malware Config

Extracted

Family

darkcomet

Botnet

01

C2

geoecon.no-ip.org:1604

Mutex

DC_MUTEX-CZN9ESJ

Attributes
  • InstallPath

    Temps\msdcsc.exe

  • gencode

    BdpaYroRpCHK

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    svhost

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 8 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4787475f9db3bcd0753330fa904898e5ba4f63401d09a20929036e8ab512ba75.exe
    "C:\Users\Admin\AppData\Local\Temp\4787475f9db3bcd0753330fa904898e5ba4f63401d09a20929036e8ab512ba75.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Users\Admin\AppData\Local\Temp\4787475f9db3bcd0753330fa904898e5ba4f63401d09a20929036e8ab512ba75.exe
      "C:\Users\Admin\AppData\Local\Temp\4787475f9db3bcd0753330fa904898e5ba4f63401d09a20929036e8ab512ba75.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Users\Admin\AppData\Local\Temp\4787475f9db3bcd0753330fa904898e5ba4f63401d09a20929036e8ab512ba75.exe
        "C:\Users\Admin\AppData\Local\Temp\4787475f9db3bcd0753330fa904898e5ba4f63401d09a20929036e8ab512ba75.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1928
        • C:\Users\Admin\AppData\Local\Temp\4787475f9db3bcd0753330fa904898e5ba4f63401d09a20929036e8ab512ba75.exe
          "C:\Users\Admin\AppData\Local\Temp\4787475f9db3bcd0753330fa904898e5ba4f63401d09a20929036e8ab512ba75.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1292
          • C:\Windows\SysWOW64\Temps\msdcsc.exe
            "C:\Windows\system32\Temps\msdcsc.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:728
            • C:\Windows\SysWOW64\Temps\msdcsc.exe
              "C:\Windows\SysWOW64\Temps\msdcsc.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1108
              • C:\Windows\SysWOW64\Temps\msdcsc.exe
                "C:\Windows\SysWOW64\Temps\msdcsc.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1076
                • C:\Windows\SysWOW64\notepad.exe
                  notepad
                  8⤵
                  • Loads dropped DLL
                  PID:1816
              • C:\Users\Admin\AppData\Local\Temp\thomson.exe
                "C:\Users\Admin\AppData\Local\Temp\thomson.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1352
        • C:\Users\Admin\AppData\Local\Temp\thomson.exe
          "C:\Users\Admin\AppData\Local\Temp\thomson.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:1148

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\mak57E.tmp
    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • C:\Users\Admin\AppData\Local\Temp\qbkEA2.tmp
    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • C:\Users\Admin\AppData\Local\Temp\thomson.exe
    Filesize

    334KB

    MD5

    a029673ea8625b53a9698310eb95f04e

    SHA1

    b84b27c7a11c86eaab02ff87c31c474b8945decf

    SHA256

    3d2686496c8bc524339f26e471bfea0a17a4c186c632da468ac44460f871aef8

    SHA512

    aa686e600a9bb0b1f93c6c9278c409db4d3236ebf42e4270b893bf19f24576a6e676c631be30787226b11c01e42b09811ba6f9210b1ff6feecc24d3645fbeb1c

  • C:\Users\Admin\AppData\Local\Temp\thomson.exe
    Filesize

    334KB

    MD5

    a029673ea8625b53a9698310eb95f04e

    SHA1

    b84b27c7a11c86eaab02ff87c31c474b8945decf

    SHA256

    3d2686496c8bc524339f26e471bfea0a17a4c186c632da468ac44460f871aef8

    SHA512

    aa686e600a9bb0b1f93c6c9278c409db4d3236ebf42e4270b893bf19f24576a6e676c631be30787226b11c01e42b09811ba6f9210b1ff6feecc24d3645fbeb1c

  • C:\Users\Admin\AppData\Local\Temp\thomson.exe
    Filesize

    334KB

    MD5

    a029673ea8625b53a9698310eb95f04e

    SHA1

    b84b27c7a11c86eaab02ff87c31c474b8945decf

    SHA256

    3d2686496c8bc524339f26e471bfea0a17a4c186c632da468ac44460f871aef8

    SHA512

    aa686e600a9bb0b1f93c6c9278c409db4d3236ebf42e4270b893bf19f24576a6e676c631be30787226b11c01e42b09811ba6f9210b1ff6feecc24d3645fbeb1c

  • C:\Windows\SysWOW64\Temps\msdcsc.exe
    Filesize

    1.1MB

    MD5

    058d38212447c0e8164820368f6f3d6f

    SHA1

    8f2d6bc502fd1c863ff962dd8e59c10558017507

    SHA256

    4787475f9db3bcd0753330fa904898e5ba4f63401d09a20929036e8ab512ba75

    SHA512

    f8e569fa81ff401c340bf3367ce86113c7c4fec76e52a170b7fdd102a19c9e22ae4fce97fd843a34bd6a5b8d154b8df055395abd5490d8eedd1cdd7c5a287118

  • C:\Windows\SysWOW64\Temps\msdcsc.exe
    Filesize

    1.1MB

    MD5

    058d38212447c0e8164820368f6f3d6f

    SHA1

    8f2d6bc502fd1c863ff962dd8e59c10558017507

    SHA256

    4787475f9db3bcd0753330fa904898e5ba4f63401d09a20929036e8ab512ba75

    SHA512

    f8e569fa81ff401c340bf3367ce86113c7c4fec76e52a170b7fdd102a19c9e22ae4fce97fd843a34bd6a5b8d154b8df055395abd5490d8eedd1cdd7c5a287118

  • C:\Windows\SysWOW64\Temps\msdcsc.exe
    Filesize

    1.1MB

    MD5

    058d38212447c0e8164820368f6f3d6f

    SHA1

    8f2d6bc502fd1c863ff962dd8e59c10558017507

    SHA256

    4787475f9db3bcd0753330fa904898e5ba4f63401d09a20929036e8ab512ba75

    SHA512

    f8e569fa81ff401c340bf3367ce86113c7c4fec76e52a170b7fdd102a19c9e22ae4fce97fd843a34bd6a5b8d154b8df055395abd5490d8eedd1cdd7c5a287118

  • C:\Windows\SysWOW64\Temps\msdcsc.exe
    Filesize

    1.1MB

    MD5

    058d38212447c0e8164820368f6f3d6f

    SHA1

    8f2d6bc502fd1c863ff962dd8e59c10558017507

    SHA256

    4787475f9db3bcd0753330fa904898e5ba4f63401d09a20929036e8ab512ba75

    SHA512

    f8e569fa81ff401c340bf3367ce86113c7c4fec76e52a170b7fdd102a19c9e22ae4fce97fd843a34bd6a5b8d154b8df055395abd5490d8eedd1cdd7c5a287118

  • \Users\Admin\AppData\Local\Temp\mak57E.tmp
    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • \Users\Admin\AppData\Local\Temp\mak57E.tmp
    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • \Users\Admin\AppData\Local\Temp\mak57E.tmp
    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • \Users\Admin\AppData\Local\Temp\qbkEA2.tmp
    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • \Users\Admin\AppData\Local\Temp\qbkEA2.tmp
    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • \Users\Admin\AppData\Local\Temp\qbkEA2.tmp
    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • \Users\Admin\AppData\Local\Temp\thomson.exe
    Filesize

    334KB

    MD5

    a029673ea8625b53a9698310eb95f04e

    SHA1

    b84b27c7a11c86eaab02ff87c31c474b8945decf

    SHA256

    3d2686496c8bc524339f26e471bfea0a17a4c186c632da468ac44460f871aef8

    SHA512

    aa686e600a9bb0b1f93c6c9278c409db4d3236ebf42e4270b893bf19f24576a6e676c631be30787226b11c01e42b09811ba6f9210b1ff6feecc24d3645fbeb1c

  • \Users\Admin\AppData\Local\Temp\thomson.exe
    Filesize

    334KB

    MD5

    a029673ea8625b53a9698310eb95f04e

    SHA1

    b84b27c7a11c86eaab02ff87c31c474b8945decf

    SHA256

    3d2686496c8bc524339f26e471bfea0a17a4c186c632da468ac44460f871aef8

    SHA512

    aa686e600a9bb0b1f93c6c9278c409db4d3236ebf42e4270b893bf19f24576a6e676c631be30787226b11c01e42b09811ba6f9210b1ff6feecc24d3645fbeb1c

  • \Users\Admin\AppData\Local\Temp\thomson.exe
    Filesize

    334KB

    MD5

    a029673ea8625b53a9698310eb95f04e

    SHA1

    b84b27c7a11c86eaab02ff87c31c474b8945decf

    SHA256

    3d2686496c8bc524339f26e471bfea0a17a4c186c632da468ac44460f871aef8

    SHA512

    aa686e600a9bb0b1f93c6c9278c409db4d3236ebf42e4270b893bf19f24576a6e676c631be30787226b11c01e42b09811ba6f9210b1ff6feecc24d3645fbeb1c

  • \Users\Admin\AppData\Local\Temp\thomson.exe
    Filesize

    334KB

    MD5

    a029673ea8625b53a9698310eb95f04e

    SHA1

    b84b27c7a11c86eaab02ff87c31c474b8945decf

    SHA256

    3d2686496c8bc524339f26e471bfea0a17a4c186c632da468ac44460f871aef8

    SHA512

    aa686e600a9bb0b1f93c6c9278c409db4d3236ebf42e4270b893bf19f24576a6e676c631be30787226b11c01e42b09811ba6f9210b1ff6feecc24d3645fbeb1c

  • \Windows\SysWOW64\Temps\msdcsc.exe
    Filesize

    1.1MB

    MD5

    058d38212447c0e8164820368f6f3d6f

    SHA1

    8f2d6bc502fd1c863ff962dd8e59c10558017507

    SHA256

    4787475f9db3bcd0753330fa904898e5ba4f63401d09a20929036e8ab512ba75

    SHA512

    f8e569fa81ff401c340bf3367ce86113c7c4fec76e52a170b7fdd102a19c9e22ae4fce97fd843a34bd6a5b8d154b8df055395abd5490d8eedd1cdd7c5a287118

  • memory/728-98-0x0000000000000000-mapping.dmp
  • memory/1076-130-0x000000000048F888-mapping.dmp
  • memory/1076-144-0x00000000004C0000-0x0000000000533000-memory.dmp
    Filesize

    460KB

  • memory/1076-143-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1076-157-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1108-110-0x0000000000401110-mapping.dmp
  • memory/1108-140-0x0000000000400000-0x0000000000500000-memory.dmp
    Filesize

    1024KB

  • memory/1108-142-0x0000000000810000-0x0000000000883000-memory.dmp
    Filesize

    460KB

  • memory/1108-159-0x0000000000810000-0x0000000000883000-memory.dmp
    Filesize

    460KB

  • memory/1148-96-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/1148-94-0x0000000000560000-0x00000000005D3000-memory.dmp
    Filesize

    460KB

  • memory/1148-158-0x0000000000560000-0x00000000005D3000-memory.dmp
    Filesize

    460KB

  • memory/1148-156-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/1148-155-0x0000000002DA0000-0x0000000002E13000-memory.dmp
    Filesize

    460KB

  • memory/1148-89-0x0000000000000000-mapping.dmp
  • memory/1292-68-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1292-75-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1292-83-0x000000000048F888-mapping.dmp
  • memory/1292-82-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1292-80-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1292-78-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1292-77-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1292-84-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1292-73-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1292-71-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1292-69-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1292-86-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1292-95-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1352-139-0x0000000000000000-mapping.dmp
  • memory/1352-153-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/1352-154-0x0000000000590000-0x0000000000603000-memory.dmp
    Filesize

    460KB

  • memory/1816-146-0x0000000000000000-mapping.dmp
  • memory/1816-152-0x00000000003B0000-0x0000000000423000-memory.dmp
    Filesize

    460KB

  • memory/1928-63-0x0000000000400000-0x0000000000500000-memory.dmp
    Filesize

    1024KB

  • memory/1928-60-0x0000000000400000-0x0000000000500000-memory.dmp
    Filesize

    1024KB

  • memory/1928-59-0x0000000000400000-0x0000000000500000-memory.dmp
    Filesize

    1024KB

  • memory/1928-58-0x0000000000400000-0x0000000000500000-memory.dmp
    Filesize

    1024KB

  • memory/1928-61-0x0000000000400000-0x0000000000500000-memory.dmp
    Filesize

    1024KB

  • memory/1928-64-0x0000000000401110-mapping.dmp
  • memory/1928-66-0x0000000075D71000-0x0000000075D73000-memory.dmp
    Filesize

    8KB

  • memory/1928-92-0x0000000000400000-0x0000000000500000-memory.dmp
    Filesize

    1024KB

  • memory/1928-56-0x0000000000400000-0x0000000000500000-memory.dmp
    Filesize

    1024KB

  • memory/1928-67-0x0000000000400000-0x0000000000500000-memory.dmp
    Filesize

    1024KB

  • memory/1928-55-0x0000000000400000-0x0000000000500000-memory.dmp
    Filesize

    1024KB

  • memory/1948-54-0x0000000000FB188E-mapping.dmp