Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 05:50

General

  • Target

    aec5792af7af331e9f4202eac9bffec4949315426d5664b4bec4b92ef9d852ce.exe

  • Size

    3.3MB

  • MD5

    33cfb8a961ff5d36d4ccaa08a6c62d65

  • SHA1

    530dd18398d48e0976561e4a0b099e7f20f05ec6

  • SHA256

    aec5792af7af331e9f4202eac9bffec4949315426d5664b4bec4b92ef9d852ce

  • SHA512

    87ee7154b678715fe1f669e1cff8b570eccccda6e5ebb0b21dcbc6202aab1eaff3eb0c0f5b38153f8f848f17596afd6b58e79b8415459c7c3ac90e59119f8b5c

  • SSDEEP

    49152:gFpRSE2HtYhiLeCCEbaOWhxbgGzH97Z4a3syCyyIPo:cRSxHtWYCEbaOWhxbgy7tsnco

Malware Config

Extracted

Family

darkcomet

Botnet

Hardcore

C2

darkcometi.no-ip.biz:1604

Mutex

DC_MUTEX-F54S21D

Attributes
  • gencode

    oLPNrCVEbNtk

  • install

    false

  • offline_keylogger

    true

  • password

    topfun3814

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aec5792af7af331e9f4202eac9bffec4949315426d5664b4bec4b92ef9d852ce.exe
    "C:\Users\Admin\AppData\Local\Temp\aec5792af7af331e9f4202eac9bffec4949315426d5664b4bec4b92ef9d852ce.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Users\Admin\AppData\Local\Temp\vbc.exe
      C:\Users\Admin\AppData\Local\Temp\vbc.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4720
      • C:\Users\Admin\AppData\Local\Temp\EPICBOT_520.EXE
        "C:\Users\Admin\AppData\Local\Temp\EPICBOT_520.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:512
        • C:\Users\Admin\AppData\Local\Temp\EPICBOT_520.EXE
          "C:\Users\Admin\AppData\Local\Temp\EPICBOT_520.EXE" /wrapper /dir="C:\Users\Admin\AppData\Local\Temp\pkg_b4373760" /pproc="vbc.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:5056
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        3⤵
          PID:5004
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          3⤵
            PID:5024

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scripting

      1
      T1064

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Scripting

      1
      T1064

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\EPICBOT_520.EXE
        Filesize

        1.6MB

        MD5

        0d51050931dd3a7ace5bbf95723d446e

        SHA1

        12f7032b0f90feafaecbca1fce3beffa6952cd0d

        SHA256

        7a6946a968cdad50ee5d5b66c0d1a39960efe82c85c6e117427be95c76af9a8e

        SHA512

        c2168e607659c1926d7fc30914908737f6d69cac2cfcecba5b2b444a0ecbfe30963daf5f51493772e2abfd941a998104acbdf6b5fc6bdf0d68400dcb0457db5a

      • C:\Users\Admin\AppData\Local\Temp\EPICBOT_520.EXE
        Filesize

        1.6MB

        MD5

        0d51050931dd3a7ace5bbf95723d446e

        SHA1

        12f7032b0f90feafaecbca1fce3beffa6952cd0d

        SHA256

        7a6946a968cdad50ee5d5b66c0d1a39960efe82c85c6e117427be95c76af9a8e

        SHA512

        c2168e607659c1926d7fc30914908737f6d69cac2cfcecba5b2b444a0ecbfe30963daf5f51493772e2abfd941a998104acbdf6b5fc6bdf0d68400dcb0457db5a

      • C:\Users\Admin\AppData\Local\Temp\EPICBOT_520.EXE
        Filesize

        1.6MB

        MD5

        0d51050931dd3a7ace5bbf95723d446e

        SHA1

        12f7032b0f90feafaecbca1fce3beffa6952cd0d

        SHA256

        7a6946a968cdad50ee5d5b66c0d1a39960efe82c85c6e117427be95c76af9a8e

        SHA512

        c2168e607659c1926d7fc30914908737f6d69cac2cfcecba5b2b444a0ecbfe30963daf5f51493772e2abfd941a998104acbdf6b5fc6bdf0d68400dcb0457db5a

      • C:\Users\Admin\AppData\Local\Temp\pkg_b4373760\autorun.txt
        Filesize

        114B

        MD5

        c819368178ce1e40fd55c813340a597a

        SHA1

        81aef3fd883c52de4fe211f3e43f70137cbccdf6

        SHA256

        1334449583ff7823df9ba97e57bed51eaaba21eed4551e25b07794f1d48c3e31

        SHA512

        753ce58ed7b76de63f8d68bf95949dfd772e805d0ab514f2706d72b2d504fb53e9beadaed0d34d933fee4f98d3ea13172c8b3a0e391bcab639c3d70003ec71a7

      • C:\Users\Admin\AppData\Local\Temp\pkg_b4373760\wrapper.xml
        Filesize

        798B

        MD5

        1d45a29e3511b982a1f91b33c70e964f

        SHA1

        176a47b489be3f27dc354a2b9dd0b580bb2f3904

        SHA256

        0a69c29fe16727b18425df8ded1cfe9d07a380b9f23f1beb32f60fefc000b3dc

        SHA512

        c574719f56a9cc0a3c393001f0774a5826afa5972906d9d9d214a183724a9f7226483a7181a0030e0f801b481a19957761efc170a10850aec786623eb939eb69

      • C:\Users\Admin\AppData\Local\Temp\vbc.exe
        Filesize

        1.1MB

        MD5

        d881de17aa8f2e2c08cbb7b265f928f9

        SHA1

        08936aebc87decf0af6e8eada191062b5e65ac2a

        SHA256

        b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

        SHA512

        5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

      • C:\Users\Admin\AppData\Local\Temp\vbc.exe
        Filesize

        1.1MB

        MD5

        d881de17aa8f2e2c08cbb7b265f928f9

        SHA1

        08936aebc87decf0af6e8eada191062b5e65ac2a

        SHA256

        b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

        SHA512

        5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

      • memory/512-142-0x0000000000000000-mapping.dmp
      • memory/2620-140-0x00000000750D0000-0x0000000075681000-memory.dmp
        Filesize

        5.7MB

      • memory/2620-132-0x00000000750D0000-0x0000000075681000-memory.dmp
        Filesize

        5.7MB

      • memory/4720-141-0x0000000000400000-0x0000000000649000-memory.dmp
        Filesize

        2.3MB

      • memory/4720-138-0x0000000000400000-0x0000000000649000-memory.dmp
        Filesize

        2.3MB

      • memory/4720-143-0x0000000000400000-0x0000000000649000-memory.dmp
        Filesize

        2.3MB

      • memory/4720-137-0x0000000000400000-0x0000000000649000-memory.dmp
        Filesize

        2.3MB

      • memory/4720-134-0x0000000000400000-0x0000000000649000-memory.dmp
        Filesize

        2.3MB

      • memory/4720-133-0x0000000000000000-mapping.dmp
      • memory/4720-151-0x0000000000400000-0x0000000000649000-memory.dmp
        Filesize

        2.3MB

      • memory/5004-148-0x0000000000000000-mapping.dmp
      • memory/5056-146-0x0000000000000000-mapping.dmp