Analysis

  • max time kernel
    150s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2022 12:05

General

  • Target

    186a7cfa0dd16e0d931c32b5617766416b8a09d00fda23b49f6e5aa60bd4a47e.exe

  • Size

    851KB

  • MD5

    11809afb3c3e1777e6efbb5a426641b0

  • SHA1

    ef713e6840fa0a049af9816bbdbec262ac5af08e

  • SHA256

    186a7cfa0dd16e0d931c32b5617766416b8a09d00fda23b49f6e5aa60bd4a47e

  • SHA512

    31d67debfad7af652d494a02fba26bd6fe66900b7ef51769f3aed6b9329028d63a1ac55704ad3221f894e5d637ecbfab6a68b261ed232c30657247d3759ca8c3

  • SSDEEP

    24576:A////c5a2YepX2JNU4G55l1FbHcoluFLhA:/HYepVj1Fb8o8

Malware Config

Extracted

Family

darkcomet

Botnet

New452012

C2

airjosh977.no-ip.biz:100

Mutex

DC_MUTEX-T577G6G

Attributes
  • gencode

    WrgUMHjTbCs4

  • install

    false

  • offline_keylogger

    true

  • password

    0123456789

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\186a7cfa0dd16e0d931c32b5617766416b8a09d00fda23b49f6e5aa60bd4a47e.exe
    "C:\Users\Admin\AppData\Local\Temp\186a7cfa0dd16e0d931c32b5617766416b8a09d00fda23b49f6e5aa60bd4a47e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      C:\Users\Admin\AppData\Local\Temp\svchost.exe
      2⤵
      • Modifies firewall policy service
      • Modifies security service
      • Windows security bypass
      • Executes dropped EXE
      • Windows security modification
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
    Filesize

    31KB

    MD5

    ed797d8dc2c92401985d162e42ffa450

    SHA1

    0f02fc517c7facc4baefde4fe9467fb6488ebabe

    SHA256

    b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e

    SHA512

    e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2

  • \Users\Admin\AppData\Local\Temp\svchost.exe
    Filesize

    31KB

    MD5

    ed797d8dc2c92401985d162e42ffa450

    SHA1

    0f02fc517c7facc4baefde4fe9467fb6488ebabe

    SHA256

    b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e

    SHA512

    e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2

  • memory/820-66-0x0000000000400000-0x00000000004BD000-memory.dmp
    Filesize

    756KB

  • memory/820-71-0x0000000000400000-0x00000000004BD000-memory.dmp
    Filesize

    756KB

  • memory/820-58-0x0000000000400000-0x00000000004BD000-memory.dmp
    Filesize

    756KB

  • memory/820-60-0x0000000000400000-0x00000000004BD000-memory.dmp
    Filesize

    756KB

  • memory/820-62-0x0000000000400000-0x00000000004BD000-memory.dmp
    Filesize

    756KB

  • memory/820-64-0x0000000000400000-0x00000000004BD000-memory.dmp
    Filesize

    756KB

  • memory/820-79-0x0000000000400000-0x00000000004BD000-memory.dmp
    Filesize

    756KB

  • memory/820-67-0x0000000000400000-0x00000000004BD000-memory.dmp
    Filesize

    756KB

  • memory/820-69-0x0000000000400000-0x00000000004BD000-memory.dmp
    Filesize

    756KB

  • memory/820-57-0x0000000000400000-0x00000000004BD000-memory.dmp
    Filesize

    756KB

  • memory/820-72-0x0000000000490888-mapping.dmp
  • memory/820-74-0x0000000000400000-0x00000000004BD000-memory.dmp
    Filesize

    756KB

  • memory/820-78-0x0000000000400000-0x00000000004BD000-memory.dmp
    Filesize

    756KB

  • memory/820-77-0x0000000000400000-0x00000000004BD000-memory.dmp
    Filesize

    756KB

  • memory/1300-76-0x0000000074270000-0x000000007481B000-memory.dmp
    Filesize

    5.7MB

  • memory/1300-55-0x0000000074270000-0x000000007481B000-memory.dmp
    Filesize

    5.7MB

  • memory/1300-54-0x00000000757A1000-0x00000000757A3000-memory.dmp
    Filesize

    8KB