Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 07:28

General

  • Target

    7835141baa42020502a32b5d1fb831d87ed08e6f8f97dbafb4f71bcaab07a983.exe

  • Size

    999KB

  • MD5

    bd7b0ce05cd09c1b6ac1a23b0b4a965d

  • SHA1

    bff7ebfdde85c7ce93fbbaac1fdc87839ad5899a

  • SHA256

    7835141baa42020502a32b5d1fb831d87ed08e6f8f97dbafb4f71bcaab07a983

  • SHA512

    2ad332133a186de4cad39518a47b3af84b737c06eaf7f40d023b55b4c0cffe86eb754aa1f70e63551e33a96f6949b197404cbcdb3623aebee009f3b1ce85402f

  • SSDEEP

    12288:hj5d9ZB6WyB1H8mmRbVQhV5u4PFKE6/khqPpcM/:lzgWyvgRZ6B9X6scd/

Malware Config

Extracted

Family

darkcomet

Botnet

cspd1044

C2

pois111.no-ip.info:1619

pois111.dyndns.info:1618

31.204.153.75:1617

Mutex

DC_MUTEX-L47V2RU

Attributes
  • gencode

    McYVnPEswVGe

  • install

    false

  • offline_keylogger

    true

  • password

    x10r2

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7835141baa42020502a32b5d1fb831d87ed08e6f8f97dbafb4f71bcaab07a983.exe
    "C:\Users\Admin\AppData\Local\Temp\7835141baa42020502a32b5d1fb831d87ed08e6f8f97dbafb4f71bcaab07a983.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Users\Admin\AppData\Local\Temp\7835141baa42020502a32b5d1fb831d87ed08e6f8f97dbafb4f71bcaab07a983.exe
      C:\Users\Admin\AppData\Local\Temp\7835141baa42020502a32b5d1fb831d87ed08e6f8f97dbafb4f71bcaab07a983.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2248

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2248-134-0x0000000000000000-mapping.dmp

  • memory/2248-135-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2248-136-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2248-137-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/4848-132-0x0000000074F90000-0x0000000075541000-memory.dmp

    Filesize

    5.7MB

  • memory/4848-133-0x0000000074F90000-0x0000000075541000-memory.dmp

    Filesize

    5.7MB

  • memory/4848-138-0x0000000074F90000-0x0000000075541000-memory.dmp

    Filesize

    5.7MB