Analysis

  • max time kernel
    151s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 18:24

General

  • Target

    e1a6613e77f8ae19a017d42d99a2b4b51e2e4a91b6c8105cc9d50d1d9de947e8.exe

  • Size

    1.4MB

  • MD5

    f4fc3c0fcab1840be2093e33ae66a018

  • SHA1

    30e9c92e50cc7c2a7ed8b0feb108517d407e73a0

  • SHA256

    e1a6613e77f8ae19a017d42d99a2b4b51e2e4a91b6c8105cc9d50d1d9de947e8

  • SHA512

    d12d34a9b9a42ffc84c3a5e5ec3d1c738cf00de6a0142ba3d2621afbd1493bed7063f0f06257c5c12b7b8e8404ad410c67cef4746ee87d2b2825105d3169bb57

  • SSDEEP

    24576:/2O/GlWvLA3yu7lhlHkNtHAsfQ5z798aQgMCa84e8XHXKkX:3UCu7l8NbfQ539oNCa8+3xX

Malware Config

Extracted

Family

darkcomet

Botnet

Newest7

C2

kitx1029.ddns.net:9001

Mutex

DC_MUTEX-XL4JBP8

Attributes
  • gencode

    QnmjhyVmSgKB

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1a6613e77f8ae19a017d42d99a2b4b51e2e4a91b6c8105cc9d50d1d9de947e8.exe
    "C:\Users\Admin\AppData\Local\Temp\e1a6613e77f8ae19a017d42d99a2b4b51e2e4a91b6c8105cc9d50d1d9de947e8.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\f6p73ho8b2z\dwm.exe
      "C:\Users\Admin\f6p73ho8b2z\dwm.exe" tLbTonzIG.RZY
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4140
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1412

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\F6P73H~1\kIfHsGR.IWB

    Filesize

    144B

    MD5

    391330e11eac5aa0caa10f9c1dd5d57a

    SHA1

    0bd0d110ba3aa8b42b545084ecc77fbd39b043e8

    SHA256

    51fc195e5eb649637fb1a301c6f4ec54c2beb4477bb3d7f0dc7356b4f4ff3c3f

    SHA512

    2f39c80aaeffddbefe1697c143e967e782d926f54b6f9867bccb024660be7e4638667b48784e75ed58249e6a9dc467e37da75b630525d983c44af8e645d906fc

  • C:\Users\Admin\F6P73H~1\zBqRS.HZH

    Filesize

    658KB

    MD5

    ef8d41120b728cd77a8f9ff6f152da00

    SHA1

    cabe3ad2c8142796a544808103100e86c50f6457

    SHA256

    fbcefd0fc0d374b8f7702d3748e3894e69b5733804ecd2997ca624e8d9e15c67

    SHA512

    fd4314a6b2ac71a2bc325036fea3814b4ce5b842b346744f4dcb22c14131198d2d145680684955c362a5a27defcf5fc831f5310f82e99d38a60af054ebed02c4

  • C:\Users\Admin\f6p73ho8b2z\dwm.exe

    Filesize

    918KB

    MD5

    92729c143c9057725c8ab422aef00b9c

    SHA1

    1f6e83d15ed51833d91dd511281cede97341e942

    SHA256

    f5041c37f5bd7deda83395d993376a1c458ab9d9be227fb3df19016302902dcc

    SHA512

    29295342e1a551fe16db9da456f93b0e1da9db253eb2c21c403ae84ac67f27662e068633aa0b0d21bc5a28a5549ffde8a2328175b96e5fe49375c0caf8507ad3

  • C:\Users\Admin\f6p73ho8b2z\dwm.exe

    Filesize

    918KB

    MD5

    92729c143c9057725c8ab422aef00b9c

    SHA1

    1f6e83d15ed51833d91dd511281cede97341e942

    SHA256

    f5041c37f5bd7deda83395d993376a1c458ab9d9be227fb3df19016302902dcc

    SHA512

    29295342e1a551fe16db9da456f93b0e1da9db253eb2c21c403ae84ac67f27662e068633aa0b0d21bc5a28a5549ffde8a2328175b96e5fe49375c0caf8507ad3

  • C:\Users\Admin\f6p73ho8b2z\tLbTonzIG.RZY

    Filesize

    340.5MB

    MD5

    0be2089d9eda6ba28f68ec283c399cee

    SHA1

    4286bf7130e990fe6e8a3a185f5d5ae10631e126

    SHA256

    b939255cd67fc9ed8a5976170a35a2fc34fa17af8c363c47963a49546ee4282c

    SHA512

    0372c956ce85ab8384ba90be60202599025ed6fb3416b4fd7611356b777b88666d0a70293a8174c02c6febcb6c487c39da1ea5ad8e8e47da1cbeb6e55ed3fb61

  • memory/1412-138-0x0000000000000000-mapping.dmp

  • memory/1412-139-0x0000000001300000-0x00000000013B2000-memory.dmp

    Filesize

    712KB

  • memory/1412-140-0x0000000001300000-0x00000000013B2000-memory.dmp

    Filesize

    712KB

  • memory/1412-141-0x0000000001300000-0x00000000013B2000-memory.dmp

    Filesize

    712KB

  • memory/1412-142-0x0000000001300000-0x00000000013B2000-memory.dmp

    Filesize

    712KB

  • memory/1412-143-0x0000000001300000-0x00000000013B2000-memory.dmp

    Filesize

    712KB

  • memory/4140-132-0x0000000000000000-mapping.dmp