Analysis

  • max time kernel
    155s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 12:54

General

  • Target

    0ce255ff615580522fb9530352f0ecb101ae6192c09a042026801dc11a219a99.exe

  • Size

    1.7MB

  • MD5

    c153e9b64b8bf151054c7fe36d74b188

  • SHA1

    8d5105e4984e229c9abaaa83451c84d73f32c78a

  • SHA256

    0ce255ff615580522fb9530352f0ecb101ae6192c09a042026801dc11a219a99

  • SHA512

    2f2245c764cdc05d2cbdb51ad60a7b642b1071f569fafe79b7c37f534276fd9a3982395dc5658876c8a23ce54287bec9275d255a108de34b4ab9628d4b7d5fc8

  • SSDEEP

    24576:bUX29rltyl8zqDeLU+YLeO7HxCbQuHouKeMzzlkj1KNT9XAa1Efll7y4LE8oS1/d:bUXoatERYTETO/lia1i+Hq4CFH

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ce255ff615580522fb9530352f0ecb101ae6192c09a042026801dc11a219a99.exe
    "C:\Users\Admin\AppData\Local\Temp\0ce255ff615580522fb9530352f0ecb101ae6192c09a042026801dc11a219a99.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Users\Admin\AppData\Local\Temp\0ce255ff615580522fb9530352f0ecb101ae6192c09a042026801dc11a219a99.exe
      C:\Users\Admin\AppData\Local\Temp\0ce255ff615580522fb9530352f0ecb101ae6192c09a042026801dc11a219a99.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Program Files\Java\jre7\bin\javaw.exe
        "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\ACCOUNT SCRAPER BY KLINTOS.JAR"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:1736
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1760
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1416
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1416 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:872
    • C:\Users\Admin\AppData\Local\Temp\0ce255ff615580522fb9530352f0ecb101ae6192c09a042026801dc11a219a99.exe
      C:\Users\Admin\AppData\Local\Temp\0ce255ff615580522fb9530352f0ecb101ae6192c09a042026801dc11a219a99.exe
      2⤵
        PID:1976

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ACCOUNT SCRAPER BY KLINTOS.JAR
      Filesize

      206KB

      MD5

      c26c14e22e8e6fe057d9b87b01dc31fb

      SHA1

      be4bf40f253ddb9dc8ddbb71c9f7cabe8636b260

      SHA256

      6f5188b893fca1dd3f70f1e947a87699c6227886bf1f63b559e9fdadcc51e275

      SHA512

      ce7c3bc64c60e3c2799318403e66039d38961282b7c88de8523221360c91e248ff17e11ebcabad5b6cafbd262daff4d1836cdc40a5652790ce3e902127ca57e6

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\054QQKOM.txt
      Filesize

      603B

      MD5

      19de18f2e27f95757114b3c683ea3a00

      SHA1

      3326aea5fc7d462fbc28750fb97c13f3bc8b98b8

      SHA256

      8820f366a6ad54e0a328c988c685b15ccf449b1fef2b80d4124f7f3e02576e99

      SHA512

      62cc40da6c05cb240486d9e2e8630c07330e8b37bdc729a32233ff1382cc9397ee1042fdcaa8d782f1a76a9d0974367b1e115dc101c14139c4db63ddd62726cf

    • memory/904-91-0x0000000074AA0000-0x000000007504B000-memory.dmp
      Filesize

      5.7MB

    • memory/904-54-0x0000000075B41000-0x0000000075B43000-memory.dmp
      Filesize

      8KB

    • memory/904-75-0x0000000002016000-0x0000000002027000-memory.dmp
      Filesize

      68KB

    • memory/904-94-0x0000000002016000-0x0000000002027000-memory.dmp
      Filesize

      68KB

    • memory/904-55-0x0000000074AA0000-0x000000007504B000-memory.dmp
      Filesize

      5.7MB

    • memory/1736-77-0x0000000000000000-mapping.dmp
    • memory/1736-96-0x0000000002130000-0x0000000005130000-memory.dmp
      Filesize

      48.0MB

    • memory/1736-102-0x0000000000280000-0x000000000028A000-memory.dmp
      Filesize

      40KB

    • memory/1736-101-0x0000000000280000-0x000000000028A000-memory.dmp
      Filesize

      40KB

    • memory/1736-98-0x0000000000280000-0x000000000028A000-memory.dmp
      Filesize

      40KB

    • memory/1736-97-0x0000000000280000-0x000000000028A000-memory.dmp
      Filesize

      40KB

    • memory/1736-78-0x000007FEFBF71000-0x000007FEFBF73000-memory.dmp
      Filesize

      8KB

    • memory/1736-85-0x0000000002130000-0x0000000005130000-memory.dmp
      Filesize

      48.0MB

    • memory/2008-76-0x0000000000400000-0x0000000000507000-memory.dmp
      Filesize

      1.0MB

    • memory/2008-63-0x0000000000400000-0x0000000000507000-memory.dmp
      Filesize

      1.0MB

    • memory/2008-65-0x0000000000400000-0x0000000000507000-memory.dmp
      Filesize

      1.0MB

    • memory/2008-59-0x0000000000400000-0x0000000000507000-memory.dmp
      Filesize

      1.0MB

    • memory/2008-84-0x0000000000400000-0x0000000000507000-memory.dmp
      Filesize

      1.0MB

    • memory/2008-61-0x0000000000400000-0x0000000000507000-memory.dmp
      Filesize

      1.0MB

    • memory/2008-57-0x0000000000400000-0x0000000000507000-memory.dmp
      Filesize

      1.0MB

    • memory/2008-66-0x0000000000400000-0x0000000000507000-memory.dmp
      Filesize

      1.0MB

    • memory/2008-74-0x0000000000400000-0x0000000000507000-memory.dmp
      Filesize

      1.0MB

    • memory/2008-70-0x0000000000400000-0x0000000000507000-memory.dmp
      Filesize

      1.0MB

    • memory/2008-71-0x000000000048C87C-mapping.dmp
    • memory/2008-72-0x0000000000400000-0x0000000000507000-memory.dmp
      Filesize

      1.0MB

    • memory/2008-68-0x0000000000400000-0x0000000000507000-memory.dmp
      Filesize

      1.0MB

    • memory/2008-56-0x0000000000400000-0x0000000000507000-memory.dmp
      Filesize

      1.0MB