Analysis

  • max time kernel
    177s
  • max time network
    213s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 14:16

General

  • Target

    27b100ab3073fc1b0b7459862930687aed91aa3fb1770e07472ac8a041fdb87f.doc

  • Size

    4.0MB

  • MD5

    3b25dfdf3f89b0a1e161d442d1fd2227

  • SHA1

    964cae96ec5364a84b13edaa305e4e3fb35fa208

  • SHA256

    27b100ab3073fc1b0b7459862930687aed91aa3fb1770e07472ac8a041fdb87f

  • SHA512

    cb0dcc230066c146926ffc158d47f48c33ba67970963ce72afcef3bb63166996e969f7d0318f6fb604fff54962cc8e934f55079bccec0f2a8f22e4e14ffef2d4

  • SSDEEP

    24576:pVfxRoAIj5FBCQELbeNJDIe5uocMALTipn5yZ0h1j8KmGN2zbRtG23zxQ0atoYBq:9p

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

doc

C2

67.242.194.118:1604

Mutex

DC_MUTEX-W3TT9NP

Attributes
  • gencode

    QMYYWMGSMDbi

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\27b100ab3073fc1b0b7459862930687aed91aa3fb1770e07472ac8a041fdb87f.doc"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Users\Admin\dnyoxbau.exe
      dnyoxbau.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:324
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\XVeObc.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\XVeObc.exe" "kcwtNy"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1096
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\System32\svchost.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1708
          • C:\Windows\SysWOW64\svchost.exe
            "C:\Windows\SysWOW64\svchost.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2000
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1796

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\MrHFkS.exe
      Filesize

      102KB

      MD5

      0df564f1184ac289b353baed6e2a0c46

      SHA1

      d492f51df890f436f5e0e994b0f19e14e3001f88

      SHA256

      330df2f54fb09d6d1344668ef458c45af620c2254fbc45e75b68444f963dc5bb

      SHA512

      30f55f79bd6e7b6f7715f20856614778d3e97a59f8c642c4659690b3f99d3153bbd98bf4e5b96704c6f1698b135d63e8280260bcf6e9cdc040fc0fe7279b0fb9

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\XVeObc.exe
      Filesize

      510KB

      MD5

      01d151ccd2a75bd713b8ce81d6509eb8

      SHA1

      c751680d504bece45dc84e363e9e976fe77a8eac

      SHA256

      a4d4dbf9e9124dbd055115706f2a2bfc8816b66cc5f52a148602f9fb0203b801

      SHA512

      8d49a4d97ef38fe5c6bb875d3bc387fade75f9a5d06a494b6a8c9d87840aa3d7cd87343e6aad268a27a9a33390bef7cd8e10d8ebe1df9f7d1ba6a68fe844107d

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\XVeObc.exe
      Filesize

      510KB

      MD5

      01d151ccd2a75bd713b8ce81d6509eb8

      SHA1

      c751680d504bece45dc84e363e9e976fe77a8eac

      SHA256

      a4d4dbf9e9124dbd055115706f2a2bfc8816b66cc5f52a148602f9fb0203b801

      SHA512

      8d49a4d97ef38fe5c6bb875d3bc387fade75f9a5d06a494b6a8c9d87840aa3d7cd87343e6aad268a27a9a33390bef7cd8e10d8ebe1df9f7d1ba6a68fe844107d

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\YKPZyv.txt
      Filesize

      3.3MB

      MD5

      efa2349c70a2c2c7a187bd2dc56badd6

      SHA1

      47b39c026aba067f081659fff5b9c79228868c0c

      SHA256

      fa343af9019e2f80fc56c1eee777b329322ebb1dc8351895769167313b370127

      SHA512

      3f51edca1aa4de85d45e1e1f39e1515d95f83b82bf5a50cd9e951221f4719da7f54cb7d7f116b72afee58a1c6dee4f99894beab20294b425b5db7acced280b3d

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\kcwtNy
      Filesize

      6KB

      MD5

      374b7508bc86f61e1fbffb4bda3543ac

      SHA1

      95bbd530b272f276d9553d90472234565a0172e7

      SHA256

      f578c2c0db2e328c94892faace17565e6b1396337c47215b8e6a27ab7d95a77e

      SHA512

      9b4d9647a0ac7c2853fb4d31d7fede4064068445ac20c2f95d5203eda615178833459b59691fd77709fb4786ba9b0ef7ffcd89713d641143dfd15ce9b3d3c692

    • C:\Users\Admin\dnyoxbau.exe
      Filesize

      1001KB

      MD5

      fdfe234a413d0d7ceaa619162ee41b55

      SHA1

      d90a8dc1600bd451d8b3eecbce2fb8b6992bf4de

      SHA256

      b0ec5dca6b01d5a346bfa663d6ae277ef63ac65e7cc0110376e70786d3a7d90d

      SHA512

      9b5c3392de845fd9444a3d812efd0925dda81795e4af1733f6621b86b2964a37a90dab9074d2572de062a3785353c8a56be27471d64666653bbed7c37e7c2b65

    • C:\Users\Admin\dnyoxbau.exe
      Filesize

      1001KB

      MD5

      fdfe234a413d0d7ceaa619162ee41b55

      SHA1

      d90a8dc1600bd451d8b3eecbce2fb8b6992bf4de

      SHA256

      b0ec5dca6b01d5a346bfa663d6ae277ef63ac65e7cc0110376e70786d3a7d90d

      SHA512

      9b5c3392de845fd9444a3d812efd0925dda81795e4af1733f6621b86b2964a37a90dab9074d2572de062a3785353c8a56be27471d64666653bbed7c37e7c2b65

    • \Users\Admin\AppData\Local\Temp\RarSFX0\XVeObc.exe
      Filesize

      510KB

      MD5

      01d151ccd2a75bd713b8ce81d6509eb8

      SHA1

      c751680d504bece45dc84e363e9e976fe77a8eac

      SHA256

      a4d4dbf9e9124dbd055115706f2a2bfc8816b66cc5f52a148602f9fb0203b801

      SHA512

      8d49a4d97ef38fe5c6bb875d3bc387fade75f9a5d06a494b6a8c9d87840aa3d7cd87343e6aad268a27a9a33390bef7cd8e10d8ebe1df9f7d1ba6a68fe844107d

    • \Users\Admin\dnyoxbau.exe
      Filesize

      1001KB

      MD5

      fdfe234a413d0d7ceaa619162ee41b55

      SHA1

      d90a8dc1600bd451d8b3eecbce2fb8b6992bf4de

      SHA256

      b0ec5dca6b01d5a346bfa663d6ae277ef63ac65e7cc0110376e70786d3a7d90d

      SHA512

      9b5c3392de845fd9444a3d812efd0925dda81795e4af1733f6621b86b2964a37a90dab9074d2572de062a3785353c8a56be27471d64666653bbed7c37e7c2b65

    • memory/324-86-0x0000000000000000-mapping.dmp
    • memory/940-74-0x00000000004B3000-0x00000000004B7000-memory.dmp
      Filesize

      16KB

    • memory/940-60-0x00000000004B3000-0x00000000004B7000-memory.dmp
      Filesize

      16KB

    • memory/940-54-0x0000000072B81000-0x0000000072B84000-memory.dmp
      Filesize

      12KB

    • memory/940-79-0x00000000715ED000-0x00000000715F8000-memory.dmp
      Filesize

      44KB

    • memory/940-80-0x00000000004B3000-0x00000000004B7000-memory.dmp
      Filesize

      16KB

    • memory/940-64-0x00000000004B3000-0x00000000004B7000-memory.dmp
      Filesize

      16KB

    • memory/940-62-0x00000000004B3000-0x00000000004B7000-memory.dmp
      Filesize

      16KB

    • memory/940-63-0x00000000004B3000-0x00000000004B7000-memory.dmp
      Filesize

      16KB

    • memory/940-61-0x00000000004B3000-0x00000000004B7000-memory.dmp
      Filesize

      16KB

    • memory/940-69-0x00000000004B3000-0x00000000004B7000-memory.dmp
      Filesize

      16KB

    • memory/940-134-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/940-59-0x00000000004B3000-0x00000000004B7000-memory.dmp
      Filesize

      16KB

    • memory/940-58-0x00000000715ED000-0x00000000715F8000-memory.dmp
      Filesize

      44KB

    • memory/940-57-0x0000000075931000-0x0000000075933000-memory.dmp
      Filesize

      8KB

    • memory/940-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/940-55-0x0000000070601000-0x0000000070603000-memory.dmp
      Filesize

      8KB

    • memory/940-135-0x00000000715ED000-0x00000000715F8000-memory.dmp
      Filesize

      44KB

    • memory/1096-91-0x0000000000000000-mapping.dmp
    • memory/1708-110-0x0000000000400000-0x0000000000575000-memory.dmp
      Filesize

      1.5MB

    • memory/1708-104-0x0000000000400000-0x0000000000575000-memory.dmp
      Filesize

      1.5MB

    • memory/1708-105-0x0000000000401BA8-mapping.dmp
    • memory/1708-101-0x0000000000400000-0x0000000000575000-memory.dmp
      Filesize

      1.5MB

    • memory/1708-98-0x0000000000400000-0x0000000000575000-memory.dmp
      Filesize

      1.5MB

    • memory/1708-99-0x0000000000400000-0x0000000000575000-memory.dmp
      Filesize

      1.5MB

    • memory/1708-129-0x0000000000400000-0x0000000000575000-memory.dmp
      Filesize

      1.5MB

    • memory/1796-133-0x000007FEFC091000-0x000007FEFC093000-memory.dmp
      Filesize

      8KB

    • memory/1796-132-0x0000000000000000-mapping.dmp
    • memory/2000-123-0x0000000000400000-0x00000000004B2000-memory.dmp
      Filesize

      712KB

    • memory/2000-130-0x0000000000400000-0x00000000004B2000-memory.dmp
      Filesize

      712KB

    • memory/2000-120-0x0000000000400000-0x00000000004B2000-memory.dmp
      Filesize

      712KB

    • memory/2000-125-0x0000000000400000-0x00000000004B2000-memory.dmp
      Filesize

      712KB

    • memory/2000-126-0x000000000048F888-mapping.dmp
    • memory/2000-127-0x0000000000400000-0x00000000004B2000-memory.dmp
      Filesize

      712KB

    • memory/2000-118-0x0000000000400000-0x00000000004B2000-memory.dmp
      Filesize

      712KB

    • memory/2000-121-0x0000000000400000-0x00000000004B2000-memory.dmp
      Filesize

      712KB

    • memory/2000-131-0x0000000000400000-0x00000000004B2000-memory.dmp
      Filesize

      712KB

    • memory/2000-116-0x0000000000400000-0x00000000004B2000-memory.dmp
      Filesize

      712KB

    • memory/2000-114-0x0000000000400000-0x00000000004B2000-memory.dmp
      Filesize

      712KB

    • memory/2000-112-0x0000000000400000-0x00000000004B2000-memory.dmp
      Filesize

      712KB

    • memory/2000-111-0x0000000000400000-0x00000000004B2000-memory.dmp
      Filesize

      712KB

    • memory/2000-136-0x0000000000400000-0x00000000004B2000-memory.dmp
      Filesize

      712KB