Analysis

  • max time kernel
    246s
  • max time network
    353s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 00:13

General

  • Target

    34e3b029473a25d0eed41532071b5fd8f217e24e31642985324e48e0cd832313.exe

  • Size

    2.8MB

  • MD5

    c633939e77b5cad28435cd6d1992f733

  • SHA1

    beb9eb6895f973e8652f93ec792ce899653e07f2

  • SHA256

    34e3b029473a25d0eed41532071b5fd8f217e24e31642985324e48e0cd832313

  • SHA512

    a7dda52d2d62c51fd7e4a4e326a159f1ee16789fad0db98742c89003de20c7989b6f1aa37dd318e2e9091a749449b2335799740861019f57358d08b09f958fb3

  • SSDEEP

    49152:3v5eYSm++WEQybtwVgRKwK9Svaj4u05l0Cs/zRHXK4M1RRTM88z04g8crAc+f8:/NSm++WE1dRKpSSj05l0Cs/zRHXK4M1f

Malware Config

Extracted

Family

darkcomet

Botnet

word

C2

markben390.no-ip.org:1604

Mutex

DCMIN_MUTEX-WG79R6U

Attributes
  • gencode

    QUoBsi7XUpPd

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34e3b029473a25d0eed41532071b5fd8f217e24e31642985324e48e0cd832313.exe
    "C:\Users\Admin\AppData\Local\Temp\34e3b029473a25d0eed41532071b5fd8f217e24e31642985324e48e0cd832313.exe"
    1⤵
    • Checks BIOS information in registry
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:652
    • C:\Users\Admin\AppData\Local\Temp\34e3b029473a25d0eed41532071b5fd8f217e24e31642985324e48e0cd832313.exe
      "C:\Users\Admin\AppData\Local\Temp\34e3b029473a25d0eed41532071b5fd8f217e24e31642985324e48e0cd832313.exe"
      2⤵
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Users\Admin\AppData\Local\Temp\34e3b029473a25d0eed41532071b5fd8f217e24e31642985324e48e0cd832313.exe
        C:\Users\Admin\AppData\Local\Temp\34e3b029473a25d0eed41532071b5fd8f217e24e31642985324e48e0cd832313.exe /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\c" "C:\Users\Admin\AppData\Local\Temp\34e3b029473a25d0eed41532071b5fd8f217e24e31642985324e48e0cd832313.exe"
        3⤵
        • Checks BIOS information in registry
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1716
        • C:\Users\Admin\AppData\Local\Temp\34e3b029473a25d0eed41532071b5fd8f217e24e31642985324e48e0cd832313.exe
          C:\Users\Admin\AppData\Local\Temp\34e3b029473a25d0eed41532071b5fd8f217e24e31642985324e48e0cd832313.exe /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\c" "C:\Users\Admin\AppData\Local\Temp\34e3b029473a25d0eed41532071b5fd8f217e24e31642985324e48e0cd832313.exe"
          4⤵
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1548
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1584

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\c
    Filesize

    18KB

    MD5

    5d1f7483021192a2b59bdb1286a88db4

    SHA1

    327b7b7fa9a71ba82cbe482429ac4251d4abaea3

    SHA256

    79cf35a79ebbe69fcb67f11b08a0fbdf2cccbf50a437cb1c4ee67952c97c483e

    SHA512

    8f7bd64df0b4f2083dd1cca09f27bf2ce6652694f6112ff24a0d26eaf1f58328924202a0611465b9aa62fba063d37b48b1e76f8307f1de3fb61c280974d8acf2

  • C:\Users\Admin\AppData\Local\Temp\incl1
    Filesize

    12KB

    MD5

    31fd40fd1891ede7259c8eaca4debcb9

    SHA1

    5e79575a985ba6f98c4b876f84b1355de61aed55

    SHA256

    dc9d156617c01507ebbd09a44a336bd75801ba2ac5ee6240884084e5536b7b01

    SHA512

    6655a831bdb041dcc8c026ec27abb80494e847b8ffdf813a99955c6dcb144ac5916827f3ac1e8b0012e87e88e8cb311cd3f2905072d7e8fe3eca079507d82b6a

  • C:\Users\Admin\AppData\Local\Temp\incl2
    Filesize

    658KB

    MD5

    79be0bededaf7797fea83e7f15ddb002

    SHA1

    9e9ce8942718d368bca03c2233acd59a21974da7

    SHA256

    a0ad369ecf9a402c24ff082a0b63c17a820e590f0cb2cfb1a8513e6de196e56d

    SHA512

    3a896e605c8d96b9b2ebda795c7e4530a8bd39ff0ee29e553d1a859129bffb991ac858ff62c7a58787068359ceb42ce5c293df54d52836beaffeaea7c28e6798

  • memory/652-55-0x0000000000270000-0x0000000000278000-memory.dmp
    Filesize

    32KB

  • memory/652-54-0x0000000074ED1000-0x0000000074ED3000-memory.dmp
    Filesize

    8KB

  • memory/1548-73-0x0000000000400000-0x0000000000580000-memory.dmp
    Filesize

    1.5MB

  • memory/1548-66-0x0000000000400000-0x0000000000580000-memory.dmp
    Filesize

    1.5MB

  • memory/1548-61-0x0000000000425F74-mapping.dmp
  • memory/1584-70-0x00000000002DF888-mapping.dmp
  • memory/1584-67-0x0000000000250000-0x0000000000302000-memory.dmp
    Filesize

    712KB

  • memory/1584-69-0x0000000000250000-0x0000000000302000-memory.dmp
    Filesize

    712KB

  • memory/1584-71-0x0000000000250000-0x0000000000302000-memory.dmp
    Filesize

    712KB

  • memory/1584-74-0x0000000000250000-0x0000000000302000-memory.dmp
    Filesize

    712KB

  • memory/1584-75-0x0000000000250000-0x0000000000302000-memory.dmp
    Filesize

    712KB

  • memory/1584-76-0x0000000000250000-0x0000000000302000-memory.dmp
    Filesize

    712KB

  • memory/1716-58-0x0000000000000000-mapping.dmp
  • memory/1800-59-0x0000000000400000-0x0000000000580000-memory.dmp
    Filesize

    1.5MB

  • memory/1800-56-0x0000000000425F74-mapping.dmp