Analysis

  • max time kernel
    179s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:44

General

  • Target

    6a670d879fe45e275fcead9a363535b899873835231cfbb051c55671b9f9753a.exe

  • Size

    2.1MB

  • MD5

    23985d8d800a7b82901526105f9c69bc

  • SHA1

    41fb548fddd05c635321c380bf4440688477f9eb

  • SHA256

    6a670d879fe45e275fcead9a363535b899873835231cfbb051c55671b9f9753a

  • SHA512

    49df2f83485f0d15c8717b804d19e5fd79e2f76f02e0ea7c839d4363b89de9eb9968392b3459dd1c17409291d69fe91d5426ab74b0fd71155684e2315823d165

  • SSDEEP

    49152:taxIVry0xxf/AlgRKGY3ZXfxwlPs7IJVDVmLRzZj90w84aLuGv:ta2Fy0xxQI3oXjvouGv

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

173.254.223.124 :2556

Mutex

DC_MUTEX-4RW38P4

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    GRBqclq1WLRg

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 4 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Executes dropped EXE 10 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a670d879fe45e275fcead9a363535b899873835231cfbb051c55671b9f9753a.exe
    "C:\Users\Admin\AppData\Local\Temp\6a670d879fe45e275fcead9a363535b899873835231cfbb051c55671b9f9753a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3856
    • C:\Users\Admin\AppData\Local\Temp\Purchase DOCUMENT.exe
      "C:\Users\Admin\AppData\Local\Temp\Purchase DOCUMENT.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3384
      • C:\Users\Admin\AppData\Local\Temp\Purchase DOCUMENT.exe
        "C:\Users\Admin\AppData\Local\Temp\Purchase DOCUMENT.exe"
        3⤵
        • Executes dropped EXE
        PID:2248
      • C:\Users\Admin\AppData\Local\Temp\Purchase DOCUMENT.exe
        "C:\Users\Admin\AppData\Local\Temp\Purchase DOCUMENT.exe"
        3⤵
        • Executes dropped EXE
        PID:3888
      • C:\Users\Admin\AppData\Local\Temp\476.exe
        "C:\Users\Admin\AppData\Local\Temp\476.exe"
        3⤵
        • Windows security bypass
        • Executes dropped EXE
        • Windows security modification
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Windows\SysWOW64\notepad.exe
          notepad
          4⤵
            PID:456
      • C:\Users\Admin\AppData\Local\Temp\Sample.exe
        "C:\Users\Admin\AppData\Local\Temp\Sample.exe"
        2⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:804
        • C:\Users\Admin\AppData\Local\Temp\476.exe
          "C:\Users\Admin\AppData\Local\Temp\476.exe"
          3⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Checks computer location settings
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1356
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\476.exe" +s +h
            4⤵
              PID:4616
              • C:\Windows\SysWOW64\attrib.exe
                attrib "C:\Users\Admin\AppData\Local\Temp\476.exe" +s +h
                5⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:4552
            • C:\Windows\SysWOW64\notepad.exe
              notepad
              4⤵
                PID:4224
              • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
                "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
                4⤵
                • Windows security bypass
                • Executes dropped EXE
                • Windows security modification
                • Suspicious use of AdjustPrivilegeToken
                PID:1036
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
                4⤵
                  PID:1812
              • C:\Users\Admin\AppData\Local\Temp\Sample.exe
                "C:\Users\Admin\AppData\Local\Temp\Sample.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:4120
                • C:\Users\Admin\AppData\Local\Temp\Sample.exe
                  /scomma "C:\Users\Admin\AppData\Local\Temp\C3ctphMw9h.ini"
                  4⤵
                  • Executes dropped EXE
                  PID:4468
                • C:\Users\Admin\AppData\Local\Temp\Sample.exe
                  /scomma "C:\Users\Admin\AppData\Local\Temp\3m8L5BaJZs.ini"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of UnmapMainImage
                  PID:5084
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 12
                    5⤵
                    • Program crash
                    PID:2112
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
            1⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:1012
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5084 -ip 5084
            1⤵
              PID:1100

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\476.exe

              Filesize

              690KB

              MD5

              4ce43047f83291f0289459da6890118f

              SHA1

              901b58e1549488f2be634099dc1d614f503d18c6

              SHA256

              6438a2d3f09f68ac4e4a5b58c06630f39866c676fcbcc20ad20b298bd3a1fa66

              SHA512

              36e1efcdf4039c5670c4042fa536775f2f8202084801c3e158247859dbf1835b79837a6c2934402d37244b4c37d119cd73c6d300eacca226d22f16ec9155a968

            • C:\Users\Admin\AppData\Local\Temp\476.exe

              Filesize

              690KB

              MD5

              4ce43047f83291f0289459da6890118f

              SHA1

              901b58e1549488f2be634099dc1d614f503d18c6

              SHA256

              6438a2d3f09f68ac4e4a5b58c06630f39866c676fcbcc20ad20b298bd3a1fa66

              SHA512

              36e1efcdf4039c5670c4042fa536775f2f8202084801c3e158247859dbf1835b79837a6c2934402d37244b4c37d119cd73c6d300eacca226d22f16ec9155a968

            • C:\Users\Admin\AppData\Local\Temp\476.exe

              Filesize

              690KB

              MD5

              4ce43047f83291f0289459da6890118f

              SHA1

              901b58e1549488f2be634099dc1d614f503d18c6

              SHA256

              6438a2d3f09f68ac4e4a5b58c06630f39866c676fcbcc20ad20b298bd3a1fa66

              SHA512

              36e1efcdf4039c5670c4042fa536775f2f8202084801c3e158247859dbf1835b79837a6c2934402d37244b4c37d119cd73c6d300eacca226d22f16ec9155a968

            • C:\Users\Admin\AppData\Local\Temp\476.exe

              Filesize

              690KB

              MD5

              4ce43047f83291f0289459da6890118f

              SHA1

              901b58e1549488f2be634099dc1d614f503d18c6

              SHA256

              6438a2d3f09f68ac4e4a5b58c06630f39866c676fcbcc20ad20b298bd3a1fa66

              SHA512

              36e1efcdf4039c5670c4042fa536775f2f8202084801c3e158247859dbf1835b79837a6c2934402d37244b4c37d119cd73c6d300eacca226d22f16ec9155a968

            • C:\Users\Admin\AppData\Local\Temp\C3ctphMw9h.ini

              Filesize

              5B

              MD5

              d1ea279fb5559c020a1b4137dc4de237

              SHA1

              db6f8988af46b56216a6f0daf95ab8c9bdb57400

              SHA256

              fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba

              SHA512

              720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3

            • C:\Users\Admin\AppData\Local\Temp\Purchase DOCUMENT.exe

              Filesize

              775KB

              MD5

              0dbeb3307285753b4340481d615015a8

              SHA1

              682cb5af6ffa7c1748aaf138e9d0d8212fe976ce

              SHA256

              f474280a8b2f6f8665af5c37bda7cbf86b38b5ba9b814f82fd4a5462656d1bec

              SHA512

              e31445cf8bfa84d2b529af617423998c9a487b99846e755700e6a5f9b9322933e25d2b3781caa16d96d9c425bae85b3b15d5523ce225d333ca02aa08026e29a0

            • C:\Users\Admin\AppData\Local\Temp\Purchase DOCUMENT.exe

              Filesize

              775KB

              MD5

              0dbeb3307285753b4340481d615015a8

              SHA1

              682cb5af6ffa7c1748aaf138e9d0d8212fe976ce

              SHA256

              f474280a8b2f6f8665af5c37bda7cbf86b38b5ba9b814f82fd4a5462656d1bec

              SHA512

              e31445cf8bfa84d2b529af617423998c9a487b99846e755700e6a5f9b9322933e25d2b3781caa16d96d9c425bae85b3b15d5523ce225d333ca02aa08026e29a0

            • C:\Users\Admin\AppData\Local\Temp\Purchase DOCUMENT.exe

              Filesize

              775KB

              MD5

              0dbeb3307285753b4340481d615015a8

              SHA1

              682cb5af6ffa7c1748aaf138e9d0d8212fe976ce

              SHA256

              f474280a8b2f6f8665af5c37bda7cbf86b38b5ba9b814f82fd4a5462656d1bec

              SHA512

              e31445cf8bfa84d2b529af617423998c9a487b99846e755700e6a5f9b9322933e25d2b3781caa16d96d9c425bae85b3b15d5523ce225d333ca02aa08026e29a0

            • C:\Users\Admin\AppData\Local\Temp\Purchase DOCUMENT.exe

              Filesize

              775KB

              MD5

              0dbeb3307285753b4340481d615015a8

              SHA1

              682cb5af6ffa7c1748aaf138e9d0d8212fe976ce

              SHA256

              f474280a8b2f6f8665af5c37bda7cbf86b38b5ba9b814f82fd4a5462656d1bec

              SHA512

              e31445cf8bfa84d2b529af617423998c9a487b99846e755700e6a5f9b9322933e25d2b3781caa16d96d9c425bae85b3b15d5523ce225d333ca02aa08026e29a0

            • C:\Users\Admin\AppData\Local\Temp\Sample.exe

              Filesize

              964KB

              MD5

              131ab6f47feafee7264fe1327149f478

              SHA1

              a47dc2fcde03039d8fbadda460bb9dffe0744d3d

              SHA256

              59141e1289f77c5f53cef07bd4a943e515913329af70b46a79581626f172c0d2

              SHA512

              2c1d792108171573a386c3cb56ed4a8501757c8fc719b7b2aa5e0b20d5861bbf1b8ff432ebeba3305798fc8ca4a0eec056f166d77ec1d844d0eb71f37fb2b7d5

            • C:\Users\Admin\AppData\Local\Temp\Sample.exe

              Filesize

              964KB

              MD5

              131ab6f47feafee7264fe1327149f478

              SHA1

              a47dc2fcde03039d8fbadda460bb9dffe0744d3d

              SHA256

              59141e1289f77c5f53cef07bd4a943e515913329af70b46a79581626f172c0d2

              SHA512

              2c1d792108171573a386c3cb56ed4a8501757c8fc719b7b2aa5e0b20d5861bbf1b8ff432ebeba3305798fc8ca4a0eec056f166d77ec1d844d0eb71f37fb2b7d5

            • C:\Users\Admin\AppData\Local\Temp\Sample.exe

              Filesize

              964KB

              MD5

              131ab6f47feafee7264fe1327149f478

              SHA1

              a47dc2fcde03039d8fbadda460bb9dffe0744d3d

              SHA256

              59141e1289f77c5f53cef07bd4a943e515913329af70b46a79581626f172c0d2

              SHA512

              2c1d792108171573a386c3cb56ed4a8501757c8fc719b7b2aa5e0b20d5861bbf1b8ff432ebeba3305798fc8ca4a0eec056f166d77ec1d844d0eb71f37fb2b7d5

            • C:\Users\Admin\AppData\Local\Temp\Sample.exe

              Filesize

              964KB

              MD5

              131ab6f47feafee7264fe1327149f478

              SHA1

              a47dc2fcde03039d8fbadda460bb9dffe0744d3d

              SHA256

              59141e1289f77c5f53cef07bd4a943e515913329af70b46a79581626f172c0d2

              SHA512

              2c1d792108171573a386c3cb56ed4a8501757c8fc719b7b2aa5e0b20d5861bbf1b8ff432ebeba3305798fc8ca4a0eec056f166d77ec1d844d0eb71f37fb2b7d5

            • C:\Users\Admin\AppData\Local\Temp\Sample.exe

              Filesize

              964KB

              MD5

              131ab6f47feafee7264fe1327149f478

              SHA1

              a47dc2fcde03039d8fbadda460bb9dffe0744d3d

              SHA256

              59141e1289f77c5f53cef07bd4a943e515913329af70b46a79581626f172c0d2

              SHA512

              2c1d792108171573a386c3cb56ed4a8501757c8fc719b7b2aa5e0b20d5861bbf1b8ff432ebeba3305798fc8ca4a0eec056f166d77ec1d844d0eb71f37fb2b7d5

            • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

              Filesize

              690KB

              MD5

              4ce43047f83291f0289459da6890118f

              SHA1

              901b58e1549488f2be634099dc1d614f503d18c6

              SHA256

              6438a2d3f09f68ac4e4a5b58c06630f39866c676fcbcc20ad20b298bd3a1fa66

              SHA512

              36e1efcdf4039c5670c4042fa536775f2f8202084801c3e158247859dbf1835b79837a6c2934402d37244b4c37d119cd73c6d300eacca226d22f16ec9155a968

            • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

              Filesize

              690KB

              MD5

              4ce43047f83291f0289459da6890118f

              SHA1

              901b58e1549488f2be634099dc1d614f503d18c6

              SHA256

              6438a2d3f09f68ac4e4a5b58c06630f39866c676fcbcc20ad20b298bd3a1fa66

              SHA512

              36e1efcdf4039c5670c4042fa536775f2f8202084801c3e158247859dbf1835b79837a6c2934402d37244b4c37d119cd73c6d300eacca226d22f16ec9155a968

            • memory/804-173-0x0000000073B50000-0x0000000074101000-memory.dmp

              Filesize

              5.7MB

            • memory/804-139-0x0000000073B50000-0x0000000074101000-memory.dmp

              Filesize

              5.7MB

            • memory/3384-172-0x0000000073B50000-0x0000000074101000-memory.dmp

              Filesize

              5.7MB

            • memory/3384-138-0x0000000073B50000-0x0000000074101000-memory.dmp

              Filesize

              5.7MB

            • memory/3888-153-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/3888-161-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/3888-157-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/4120-184-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/4120-154-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/4120-180-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/4120-148-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/4468-174-0x0000000000400000-0x0000000000453000-memory.dmp

              Filesize

              332KB

            • memory/4468-164-0x0000000000400000-0x0000000000453000-memory.dmp

              Filesize

              332KB

            • memory/4468-171-0x0000000000400000-0x0000000000453000-memory.dmp

              Filesize

              332KB

            • memory/4468-168-0x0000000000400000-0x0000000000453000-memory.dmp

              Filesize

              332KB

            • memory/5084-182-0x0000000000400000-0x000000000041F000-memory.dmp

              Filesize

              124KB