Analysis

  • max time kernel
    151s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 08:08

General

  • Target

    2c7ec6ddbff93364c2f96227bc804da29826cfc10ff32b80b1d12a1acaf081f1.exe

  • Size

    1.0MB

  • MD5

    d7dbd0670862cfb5eaca24c091ce6cdd

  • SHA1

    754e3f28386a95391f8dc5f9eb51b176e23f4242

  • SHA256

    2c7ec6ddbff93364c2f96227bc804da29826cfc10ff32b80b1d12a1acaf081f1

  • SHA512

    1cbb39991c836f2bc9557f1f051b01df2b040db7f7c6541b3a8a687f994e361f90a7e7c7cd2d231b9ee986816d48cc4071568f0c2ee106a1c10ee434d8510e12

  • SSDEEP

    24576:O9poYtYhCNrGgKb6Z9pe7d+U0c/d4WwnB5UYh:O9p6xb09qdht/6zl

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

custumes.no-ip.biz:6712

Mutex

DC_MUTEX-4FXVAGJ

Attributes
  • gencode

    aRxiGL6irJ3D

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c7ec6ddbff93364c2f96227bc804da29826cfc10ff32b80b1d12a1acaf081f1.exe
    "C:\Users\Admin\AppData\Local\Temp\2c7ec6ddbff93364c2f96227bc804da29826cfc10ff32b80b1d12a1acaf081f1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\checklistMRD.pdf"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1912
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1892
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1088
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1528
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1168
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          PID:1568

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe
    Filesize

    1.0MB

    MD5

    d7dbd0670862cfb5eaca24c091ce6cdd

    SHA1

    754e3f28386a95391f8dc5f9eb51b176e23f4242

    SHA256

    2c7ec6ddbff93364c2f96227bc804da29826cfc10ff32b80b1d12a1acaf081f1

    SHA512

    1cbb39991c836f2bc9557f1f051b01df2b040db7f7c6541b3a8a687f994e361f90a7e7c7cd2d231b9ee986816d48cc4071568f0c2ee106a1c10ee434d8510e12

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe
    Filesize

    1.0MB

    MD5

    d7dbd0670862cfb5eaca24c091ce6cdd

    SHA1

    754e3f28386a95391f8dc5f9eb51b176e23f4242

    SHA256

    2c7ec6ddbff93364c2f96227bc804da29826cfc10ff32b80b1d12a1acaf081f1

    SHA512

    1cbb39991c836f2bc9557f1f051b01df2b040db7f7c6541b3a8a687f994e361f90a7e7c7cd2d231b9ee986816d48cc4071568f0c2ee106a1c10ee434d8510e12

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe
    Filesize

    17KB

    MD5

    d38438b149f0be1d52d06fb1442c6975

    SHA1

    c8d2013661c84c362c840203b0ff82de67311eaf

    SHA256

    307de44bf0495d1d75a9adefc32fce14abe910ddb8a30861575314eb37ed0907

    SHA512

    cc9cf8b99b86735a49bf5e6a85de83de204e238c88d1a4deba60c6307039c0dd782ae43f2ebe84d5287a534e01b29b800c7a49f5286294503afcccfd468670f2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe
    Filesize

    17KB

    MD5

    d38438b149f0be1d52d06fb1442c6975

    SHA1

    c8d2013661c84c362c840203b0ff82de67311eaf

    SHA256

    307de44bf0495d1d75a9adefc32fce14abe910ddb8a30861575314eb37ed0907

    SHA512

    cc9cf8b99b86735a49bf5e6a85de83de204e238c88d1a4deba60c6307039c0dd782ae43f2ebe84d5287a534e01b29b800c7a49f5286294503afcccfd468670f2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe
    Filesize

    17KB

    MD5

    d38438b149f0be1d52d06fb1442c6975

    SHA1

    c8d2013661c84c362c840203b0ff82de67311eaf

    SHA256

    307de44bf0495d1d75a9adefc32fce14abe910ddb8a30861575314eb37ed0907

    SHA512

    cc9cf8b99b86735a49bf5e6a85de83de204e238c88d1a4deba60c6307039c0dd782ae43f2ebe84d5287a534e01b29b800c7a49f5286294503afcccfd468670f2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe
    Filesize

    17KB

    MD5

    d38438b149f0be1d52d06fb1442c6975

    SHA1

    c8d2013661c84c362c840203b0ff82de67311eaf

    SHA256

    307de44bf0495d1d75a9adefc32fce14abe910ddb8a30861575314eb37ed0907

    SHA512

    cc9cf8b99b86735a49bf5e6a85de83de204e238c88d1a4deba60c6307039c0dd782ae43f2ebe84d5287a534e01b29b800c7a49f5286294503afcccfd468670f2

  • C:\Users\Admin\Desktop\checklistMRD.pdf
    Filesize

    99KB

    MD5

    63938183c27d586a9213827ece182bed

    SHA1

    343338bc14182f771a75be2b7839aca54f8f55f1

    SHA256

    4cb2c05e6540b4c2ae621586b5e5f4688761961809a126ee1aff119808812213

    SHA512

    9e3fb68c3e717573f7056e0ab25c10322decdc15b974f348bff9c26ced389761d2eabaf996f30cd5765f1cc1e29194e66b5e56db82a92ed01783805716890552

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe
    Filesize

    1.0MB

    MD5

    d7dbd0670862cfb5eaca24c091ce6cdd

    SHA1

    754e3f28386a95391f8dc5f9eb51b176e23f4242

    SHA256

    2c7ec6ddbff93364c2f96227bc804da29826cfc10ff32b80b1d12a1acaf081f1

    SHA512

    1cbb39991c836f2bc9557f1f051b01df2b040db7f7c6541b3a8a687f994e361f90a7e7c7cd2d231b9ee986816d48cc4071568f0c2ee106a1c10ee434d8510e12

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe
    Filesize

    17KB

    MD5

    d38438b149f0be1d52d06fb1442c6975

    SHA1

    c8d2013661c84c362c840203b0ff82de67311eaf

    SHA256

    307de44bf0495d1d75a9adefc32fce14abe910ddb8a30861575314eb37ed0907

    SHA512

    cc9cf8b99b86735a49bf5e6a85de83de204e238c88d1a4deba60c6307039c0dd782ae43f2ebe84d5287a534e01b29b800c7a49f5286294503afcccfd468670f2

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe
    Filesize

    17KB

    MD5

    d38438b149f0be1d52d06fb1442c6975

    SHA1

    c8d2013661c84c362c840203b0ff82de67311eaf

    SHA256

    307de44bf0495d1d75a9adefc32fce14abe910ddb8a30861575314eb37ed0907

    SHA512

    cc9cf8b99b86735a49bf5e6a85de83de204e238c88d1a4deba60c6307039c0dd782ae43f2ebe84d5287a534e01b29b800c7a49f5286294503afcccfd468670f2

  • memory/1088-88-0x00000000742C0000-0x000000007486B000-memory.dmp
    Filesize

    5.7MB

  • memory/1088-86-0x00000000742C0000-0x000000007486B000-memory.dmp
    Filesize

    5.7MB

  • memory/1088-78-0x0000000000000000-mapping.dmp
  • memory/1088-98-0x00000000742C0000-0x000000007486B000-memory.dmp
    Filesize

    5.7MB

  • memory/1168-123-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1168-114-0x000000000048F888-mapping.dmp
  • memory/1168-127-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1416-97-0x00000000742C0000-0x000000007486B000-memory.dmp
    Filesize

    5.7MB

  • memory/1416-54-0x0000000074DC1000-0x0000000074DC3000-memory.dmp
    Filesize

    8KB

  • memory/1416-56-0x00000000742C0000-0x000000007486B000-memory.dmp
    Filesize

    5.7MB

  • memory/1416-55-0x00000000742C0000-0x000000007486B000-memory.dmp
    Filesize

    5.7MB

  • memory/1528-96-0x00000000742C0000-0x000000007486B000-memory.dmp
    Filesize

    5.7MB

  • memory/1528-95-0x00000000742C0000-0x000000007486B000-memory.dmp
    Filesize

    5.7MB

  • memory/1528-92-0x0000000000000000-mapping.dmp
  • memory/1568-121-0x0000000000000000-mapping.dmp
  • memory/1568-126-0x00000000742C0000-0x000000007486B000-memory.dmp
    Filesize

    5.7MB

  • memory/1568-128-0x00000000742C0000-0x000000007486B000-memory.dmp
    Filesize

    5.7MB

  • memory/1892-68-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1892-89-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1892-87-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1892-84-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1892-82-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1892-64-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1892-73-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1892-74-0x000000000048F888-mapping.dmp
  • memory/1892-75-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1892-69-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1892-71-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1892-66-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1892-62-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1892-60-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1892-59-0x0000000000400000-0x00000000004B2000-memory.dmp
    Filesize

    712KB

  • memory/1912-57-0x0000000000000000-mapping.dmp