Analysis

  • max time kernel
    174s
  • max time network
    86s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 11:43

General

  • Target

    2ee1cfe47fb4e47f6d83cb3cc9a5d54a05d91e7a7f9ccdb06ac16510e1cf3301.exe

  • Size

    649KB

  • MD5

    8db553afe32ba9cbfbdbb97f65f3866c

  • SHA1

    742552f5c4c3599c480931c68e12a6c4f64fd6ab

  • SHA256

    2ee1cfe47fb4e47f6d83cb3cc9a5d54a05d91e7a7f9ccdb06ac16510e1cf3301

  • SHA512

    0cb6076b67c658afd5ee589361732e6363466f925bedcb4d775380f3d9d170ae30c8fd2505c770831adf0e1df06e1968cb41687532913c40e99bc938cde4404e

  • SSDEEP

    12288:7k0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/9/+k:w0QRWoJEfg0oChGdJQbjPbNW5tYeP+Gl

Score
10/10

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ee1cfe47fb4e47f6d83cb3cc9a5d54a05d91e7a7f9ccdb06ac16510e1cf3301.exe
    "C:\Users\Admin\AppData\Local\Temp\2ee1cfe47fb4e47f6d83cb3cc9a5d54a05d91e7a7f9ccdb06ac16510e1cf3301.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:956

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2036-54-0x0000000075631000-0x0000000075633000-memory.dmp

          Filesize

          8KB