Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 00:52

General

  • Target

    66b4174f410a0e6cd23b2fe6a2ebfe6f558e09fe4e43ef0953da67a79e453ab1.exe

  • Size

    658KB

  • MD5

    9b27dc3f2167adc59bfd4f6f850522d5

  • SHA1

    95c6a98fce97feba4399973cced7decc419cf597

  • SHA256

    66b4174f410a0e6cd23b2fe6a2ebfe6f558e09fe4e43ef0953da67a79e453ab1

  • SHA512

    570e8988b48621809e4a6f925075a741ed5fb655cdb7b10be9e624a37134c1d2c57440f88ad6978396c3994f62a47abbb49694f5cb7459f12fcdc875761df2ae

  • SSDEEP

    12288:q9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hG:mZ1xuVVjfFoynPaVBUR8f+kN10EBE

Score
10/10

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66b4174f410a0e6cd23b2fe6a2ebfe6f558e09fe4e43ef0953da67a79e453ab1.exe
    "C:\Users\Admin\AppData\Local\Temp\66b4174f410a0e6cd23b2fe6a2ebfe6f558e09fe4e43ef0953da67a79e453ab1.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2036-54-0x0000000075C61000-0x0000000075C63000-memory.dmp

    Filesize

    8KB