Analysis

  • max time kernel
    133s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 19:44

General

  • Target

    f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe

  • Size

    1.5MB

  • MD5

    90ca009f81efa96a4fdb9c92308d1160

  • SHA1

    4d4173207b2f7512b1be4464cabb0df1e32d23a2

  • SHA256

    f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8

  • SHA512

    04405a292ed33dd8320441e7feaa362f954d258d55ae5295c84457d33ccf1179b51a93855eafc381a53b2a53381676d98ca071be09abf88b212a94b7090e2bc5

  • SSDEEP

    24576:Rtb20pkaCqT5TBWgNQ7aaJsFgAMrirDfQxNel83lB63P6A:iVg5tQ7aae+CfQxNEclc5

Malware Config

Extracted

Family

darkcomet

Botnet

H@ck3d

C2

kelbhie.duckdns.org:5555

Mutex

DC_MUTEX-AH9W4H5

Attributes
  • gencode

    uGad9yqUjp6P

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe
    "C:\Users\Admin\AppData\Local\Temp\f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:280
      • C:\Windows\SysWOW64\WerFault.exe
        "C:\Windows\SysWOW64\WerFault.exe"
        3⤵
          PID:1888
      • C:\Windows\SysWOW64\WerFault.exe
        "C:\Windows\SysWOW64\WerFault.exe"
        2⤵
          PID:1656

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\r.oc

        Filesize

        532B

        MD5

        9da0116c309282a10d876fbd03af01e8

        SHA1

        3d76110d50896b871547793e86ce8ac670fbfc54

        SHA256

        8973d8e9230ce750758cbf6eb71e061cbd83d8e424c37927d47e04aa3a57b953

        SHA512

        38814e5f0f2968162168dbbd1bab76e4b6ba901a6073aa71e094247af6ea65c0f56851567e57edb51245f786bd2b2946ea1039b58e7ac6b0b8c5697cfd12c5f0

      • C:\Users\Admin\AppData\Local\Temp\s.c

        Filesize

        658KB

        MD5

        8dbff3d1532c9b82a91a980f68fb24ff

        SHA1

        68165e3976598a50c11b92371748ad94ecf40e80

        SHA256

        e51ad14669791fafe158c0fdafc00be4d6db066419ad5a68f539372d46383893

        SHA512

        d50e0e566535afde4e90f2d461969c8d0801bf69fc1a6b6d2c119c36eeeb068db1f367e0b6f69136828bc8ddd97cf5e6178f25aae4439be434569850808198dd

      • C:\Users\Admin\AppData\Roaming\svchost.exe

        Filesize

        1.5MB

        MD5

        90ca009f81efa96a4fdb9c92308d1160

        SHA1

        4d4173207b2f7512b1be4464cabb0df1e32d23a2

        SHA256

        f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8

        SHA512

        04405a292ed33dd8320441e7feaa362f954d258d55ae5295c84457d33ccf1179b51a93855eafc381a53b2a53381676d98ca071be09abf88b212a94b7090e2bc5

      • C:\Users\Admin\AppData\Roaming\svchost.exe

        Filesize

        1.5MB

        MD5

        90ca009f81efa96a4fdb9c92308d1160

        SHA1

        4d4173207b2f7512b1be4464cabb0df1e32d23a2

        SHA256

        f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8

        SHA512

        04405a292ed33dd8320441e7feaa362f954d258d55ae5295c84457d33ccf1179b51a93855eafc381a53b2a53381676d98ca071be09abf88b212a94b7090e2bc5

      • \Users\Admin\AppData\Roaming\svchost.exe

        Filesize

        1.5MB

        MD5

        90ca009f81efa96a4fdb9c92308d1160

        SHA1

        4d4173207b2f7512b1be4464cabb0df1e32d23a2

        SHA256

        f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8

        SHA512

        04405a292ed33dd8320441e7feaa362f954d258d55ae5295c84457d33ccf1179b51a93855eafc381a53b2a53381676d98ca071be09abf88b212a94b7090e2bc5

      • \Users\Admin\AppData\Roaming\svchost.exe

        Filesize

        1.5MB

        MD5

        90ca009f81efa96a4fdb9c92308d1160

        SHA1

        4d4173207b2f7512b1be4464cabb0df1e32d23a2

        SHA256

        f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8

        SHA512

        04405a292ed33dd8320441e7feaa362f954d258d55ae5295c84457d33ccf1179b51a93855eafc381a53b2a53381676d98ca071be09abf88b212a94b7090e2bc5

      • \Users\Admin\AppData\Roaming\svchost.exe

        Filesize

        1.5MB

        MD5

        90ca009f81efa96a4fdb9c92308d1160

        SHA1

        4d4173207b2f7512b1be4464cabb0df1e32d23a2

        SHA256

        f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8

        SHA512

        04405a292ed33dd8320441e7feaa362f954d258d55ae5295c84457d33ccf1179b51a93855eafc381a53b2a53381676d98ca071be09abf88b212a94b7090e2bc5

      • \Users\Admin\AppData\Roaming\svchost.exe

        Filesize

        1.5MB

        MD5

        90ca009f81efa96a4fdb9c92308d1160

        SHA1

        4d4173207b2f7512b1be4464cabb0df1e32d23a2

        SHA256

        f29e972d796a5fab992c5ae973ba1cdd7be5cd8840aaebfd4252725abadbd3d8

        SHA512

        04405a292ed33dd8320441e7feaa362f954d258d55ae5295c84457d33ccf1179b51a93855eafc381a53b2a53381676d98ca071be09abf88b212a94b7090e2bc5

      • memory/280-59-0x0000000000000000-mapping.dmp

      • memory/1656-67-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1656-85-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1656-100-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1656-71-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1656-75-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1656-79-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1656-83-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1656-66-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1656-89-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1656-93-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1656-95-0x000000000048F888-mapping.dmp

      • memory/1656-98-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1888-97-0x000000000048F888-mapping.dmp

      • memory/1888-99-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1888-101-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/2028-54-0x0000000075561000-0x0000000075563000-memory.dmp

        Filesize

        8KB