Analysis

  • max time kernel
    151s
  • max time network
    174s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 01:34

General

  • Target

    8d8cd5e4463edda11942a4b127af178b41683820fd0d193adf5da6d75534e2f2.exe

  • Size

    1.4MB

  • MD5

    7e97e65b7b90c1e50cf557c5b7454b4c

  • SHA1

    9e3e0fa86d0b86d2ce1c6edee431024de9ab3643

  • SHA256

    8d8cd5e4463edda11942a4b127af178b41683820fd0d193adf5da6d75534e2f2

  • SHA512

    e6708066672f41f3dbc081683519a1147f4234b350a4d27014805faf8671769f120cb2d8b07df8b3e2c9e6bc447ef43e14de475437aece09b5055ab18e3003f4

  • SSDEEP

    24576:lb/J+1ptt5Un9GYHogKGZCsYlPFbFdbEDSfacoo2:lbUxzikfss0

Score
10/10

Malware Config

Extracted

Family

darkcomet

Botnet

HF

C2

rabbo-hotel.nl:1604

Mutex

DC_MUTEX-7F8DZX7

Attributes
  • gencode

    Jfjp26UvqMcH

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NTFS ADS 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d8cd5e4463edda11942a4b127af178b41683820fd0d193adf5da6d75534e2f2.exe
    "C:\Users\Admin\AppData\Local\Temp\8d8cd5e4463edda11942a4b127af178b41683820fd0d193adf5da6d75534e2f2.exe"
    1⤵
    • Loads dropped DLL
    • NTFS ADS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:688
    • C:\Users\Admin\AppData\Local\Temp\dikkelol.exe
      "C:\Users\Admin\AppData\Local\Temp\dikkelol.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dikkelol.exe

    Filesize

    658KB

    MD5

    fd8bbbce20b93376f439c1ad6b6da018

    SHA1

    89012e84470bb2d9c7b8b34fe64d70105776ea3c

    SHA256

    6d122c0b37a45944b2781d347e9baa240be02a669759197e2a4ebf16a4b2dbb1

    SHA512

    edcc072b669e5824d167d2829510b1af01b85d6aa372a571ae1c3a561765252edb8a45ef7257fa44cb5e44ff096c5030aad4ca9c17eed2278c67a0eb2970a0df

  • C:\Users\Admin\AppData\Local\Temp\dikkelol.exe

    Filesize

    658KB

    MD5

    fd8bbbce20b93376f439c1ad6b6da018

    SHA1

    89012e84470bb2d9c7b8b34fe64d70105776ea3c

    SHA256

    6d122c0b37a45944b2781d347e9baa240be02a669759197e2a4ebf16a4b2dbb1

    SHA512

    edcc072b669e5824d167d2829510b1af01b85d6aa372a571ae1c3a561765252edb8a45ef7257fa44cb5e44ff096c5030aad4ca9c17eed2278c67a0eb2970a0df

  • \Users\Admin\AppData\Local\Temp\dikkelol.exe

    Filesize

    658KB

    MD5

    fd8bbbce20b93376f439c1ad6b6da018

    SHA1

    89012e84470bb2d9c7b8b34fe64d70105776ea3c

    SHA256

    6d122c0b37a45944b2781d347e9baa240be02a669759197e2a4ebf16a4b2dbb1

    SHA512

    edcc072b669e5824d167d2829510b1af01b85d6aa372a571ae1c3a561765252edb8a45ef7257fa44cb5e44ff096c5030aad4ca9c17eed2278c67a0eb2970a0df

  • \Users\Admin\AppData\Local\Temp\dikkelol.exe

    Filesize

    658KB

    MD5

    fd8bbbce20b93376f439c1ad6b6da018

    SHA1

    89012e84470bb2d9c7b8b34fe64d70105776ea3c

    SHA256

    6d122c0b37a45944b2781d347e9baa240be02a669759197e2a4ebf16a4b2dbb1

    SHA512

    edcc072b669e5824d167d2829510b1af01b85d6aa372a571ae1c3a561765252edb8a45ef7257fa44cb5e44ff096c5030aad4ca9c17eed2278c67a0eb2970a0df

  • memory/688-55-0x0000000074D61000-0x0000000074D63000-memory.dmp

    Filesize

    8KB

  • memory/688-56-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/688-57-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/688-58-0x0000000074110000-0x00000000746BB000-memory.dmp

    Filesize

    5.7MB

  • memory/688-64-0x0000000074110000-0x00000000746BB000-memory.dmp

    Filesize

    5.7MB