Analysis

  • max time kernel
    154s
  • max time network
    61s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 21:27

General

  • Target

    82534de56cd3119a15d6a90c454655dcf067f2b53bcd7d81c980660b3d63a2d4.exe

  • Size

    1.4MB

  • MD5

    c160cd6bca4c3830a6724e9025679917

  • SHA1

    490377dd2e7b4ac5a3beb76aeb8d4ccbe2a5a3c7

  • SHA256

    82534de56cd3119a15d6a90c454655dcf067f2b53bcd7d81c980660b3d63a2d4

  • SHA512

    e40ea4781822eea6118c46f5b8dc6c11ef2bb9cccbd2a283f31dfa35c1a81654ee263867eba27637f584e70289d17293c617b270ebbdf20b295e146b5dd4fbeb

  • SSDEEP

    24576:Gg7XAzwtfPsTlwpF3DYpdhupEZF/FtKddBXjpOlu/c5Sg7VP5o6/pFxH:f7XAzwtfc2pDYA67KdxOlu/c5SiN6aBH

Malware Config

Extracted

Family

darkcomet

Botnet

Server

C2

lifefornoobs.no-ip.org:23697

Mutex

9485kM24

Attributes
  • gencode

    cKpULmvnfG1r

  • install

    false

  • offline_keylogger

    true

  • password

    123123

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Executes dropped EXE 4 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82534de56cd3119a15d6a90c454655dcf067f2b53bcd7d81c980660b3d63a2d4.exe
    "C:\Users\Admin\AppData\Local\Temp\82534de56cd3119a15d6a90c454655dcf067f2b53bcd7d81c980660b3d63a2d4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Users\Admin\AppData\Local\Temp\82534de56cd3119a15d6a90c454655dcf067f2b53bcd7d81c980660b3d63a2d4.exe
      "C:\Users\Admin\AppData\Local\Temp\82534de56cd3119a15d6a90c454655dcf067f2b53bcd7d81c980660b3d63a2d4.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Users\Admin\AppData\Local\Temp\csrss.exe
        "C:\Users\Admin\AppData\Local\Temp\csrss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1028
        • C:\Users\Admin\AppData\Local\Temp\csrss.exe
          "C:\Users\Admin\AppData\Local\Temp\csrss.exe"
          4⤵
          • Executes dropped EXE
          PID:692
      • C:\Users\Admin\AppData\Local\Temp\nvvsvc.exe
        "C:\Users\Admin\AppData\Local\Temp\nvvsvc.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:680
        • C:\Users\Admin\AppData\Local\Temp\nvvsvc.exe
          "C:\Users\Admin\AppData\Local\Temp\nvvsvc.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1856
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\pyt.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1556
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\pyt.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1632
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "csrss" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\csrss.exe" /f
            5⤵
            • Adds Run key to start application
            PID:268
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dc.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1208
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\dc.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1992
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "nvvsvc" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\nvvsvc.exe" /f
            5⤵
            • Adds Run key to start application
            PID:956
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1576

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\PHOTO_377.jpg
    Filesize

    65KB

    MD5

    d1c5efc3fcbe1d18ce76d4ef339f59d0

    SHA1

    b31f6b78ef517c1d23a4e0dd6c4453fa4feb05c5

    SHA256

    dcd8c510feb280fdcdf8201950c6c93b369168ae754786a676e4c32a9bd2f164

    SHA512

    8537b615cae9b0f71c8a7810bf1eb23dc5f8c7aaa3a4d030948ea8d1974b08e55dcbc94e2dca5e9ce15a10c63009c32ec68f3cc5d478fd8328eb7dae4d4a8924

  • C:\Users\Admin\AppData\Local\Temp\csrss.exe
    Filesize

    380KB

    MD5

    43ae58eec11c99f805d518745ae66ed2

    SHA1

    eb63531821176b3c86850f35b97bb67258814cc6

    SHA256

    db761ed0a642c862363f361b039f7130ae5b4c5f732ae16f10a5ce1cf6d713b9

    SHA512

    3e7f41d9b2df9bb637faf71e6cfe364c6eec6a2fd6a80619025599259ca8377fc1deb7eb2a63a484c66f30948ec72aee8f1d0fb2b5b2c1b54bfda19ae6fb6fae

  • C:\Users\Admin\AppData\Local\Temp\csrss.exe
    Filesize

    380KB

    MD5

    43ae58eec11c99f805d518745ae66ed2

    SHA1

    eb63531821176b3c86850f35b97bb67258814cc6

    SHA256

    db761ed0a642c862363f361b039f7130ae5b4c5f732ae16f10a5ce1cf6d713b9

    SHA512

    3e7f41d9b2df9bb637faf71e6cfe364c6eec6a2fd6a80619025599259ca8377fc1deb7eb2a63a484c66f30948ec72aee8f1d0fb2b5b2c1b54bfda19ae6fb6fae

  • C:\Users\Admin\AppData\Local\Temp\csrss.exe
    Filesize

    380KB

    MD5

    43ae58eec11c99f805d518745ae66ed2

    SHA1

    eb63531821176b3c86850f35b97bb67258814cc6

    SHA256

    db761ed0a642c862363f361b039f7130ae5b4c5f732ae16f10a5ce1cf6d713b9

    SHA512

    3e7f41d9b2df9bb637faf71e6cfe364c6eec6a2fd6a80619025599259ca8377fc1deb7eb2a63a484c66f30948ec72aee8f1d0fb2b5b2c1b54bfda19ae6fb6fae

  • C:\Users\Admin\AppData\Local\Temp\dc.bat
    Filesize

    131B

    MD5

    df2fe85f4bcf1fa75ae5dca9264d229e

    SHA1

    6ef8ca26f4e08ed85f8d5678581ea777bc735779

    SHA256

    fa25835a8fd15b62cd1ebc5b90e1b5955e49da318ef74674f74b9b28689397f0

    SHA512

    1f259cb3c9e1f64b2c50a1ec3273ff98164c997e3f1ad05ba832d72507f98fef0962259f88011c6e1c3f1ceb375fbf3b6cbc2c35522b6e93fd6fbd58865911f6

  • C:\Users\Admin\AppData\Local\Temp\dc.vbs
    Filesize

    105B

    MD5

    6f84dc948b82ffec7dc6f5b53347983d

    SHA1

    477208432c5b789680dfe63a66efb60bfd8a61a7

    SHA256

    c2cdc803127faa2435d054d4f2f8e7cda405f93e8f640bb7bbc33c99132de1b6

    SHA512

    2a2e2d0bbbe20f92f7945d7653790e1f4ee42abe1b283d9861b82ed7450fefae0e7da62560da5e7d9c30f0e1024df7e2db4c63ce99f354993891f9a6334456d9

  • C:\Users\Admin\AppData\Local\Temp\nvvsvc.exe
    Filesize

    588KB

    MD5

    6750fb6ee5a6b47c404736f29f021377

    SHA1

    ac25c9f3ff0865a08922071ccca328a1d0e30cda

    SHA256

    2d69be52fe32d73008a25813094f75555eeba3746639a27607818f873a726fc9

    SHA512

    c20d00f14ced46f14cc183cf186a92b639649333a1fd54b71d32b7a4c0709ebbf9cd03dd4bf2fe566c95abaf393ed0807c308c5badc10d1d71ad301d513201da

  • C:\Users\Admin\AppData\Local\Temp\nvvsvc.exe
    Filesize

    588KB

    MD5

    6750fb6ee5a6b47c404736f29f021377

    SHA1

    ac25c9f3ff0865a08922071ccca328a1d0e30cda

    SHA256

    2d69be52fe32d73008a25813094f75555eeba3746639a27607818f873a726fc9

    SHA512

    c20d00f14ced46f14cc183cf186a92b639649333a1fd54b71d32b7a4c0709ebbf9cd03dd4bf2fe566c95abaf393ed0807c308c5badc10d1d71ad301d513201da

  • C:\Users\Admin\AppData\Local\Temp\nvvsvc.exe
    Filesize

    588KB

    MD5

    6750fb6ee5a6b47c404736f29f021377

    SHA1

    ac25c9f3ff0865a08922071ccca328a1d0e30cda

    SHA256

    2d69be52fe32d73008a25813094f75555eeba3746639a27607818f873a726fc9

    SHA512

    c20d00f14ced46f14cc183cf186a92b639649333a1fd54b71d32b7a4c0709ebbf9cd03dd4bf2fe566c95abaf393ed0807c308c5badc10d1d71ad301d513201da

  • C:\Users\Admin\AppData\Local\Temp\pyt.bat
    Filesize

    129B

    MD5

    d9c99c3e40b4608bf2b27b610d31cd1f

    SHA1

    703154038806a0ed3c5482132ea4bb84b3d01063

    SHA256

    957e85c8c1cb9372672fdfa1e0b792e22edf4243d1a6e6b226e879c7f862b79a

    SHA512

    eace32b06e46ff91a3e1547a31df84a4f7d12bc30a8ca2f5e2460e9d9d758e21b670178b3d977096b6d9b4a79ba66ad2a9da16964e5a69c7798b4e18c7d26566

  • C:\Users\Admin\AppData\Local\Temp\pyt.vbs
    Filesize

    106B

    MD5

    b4b20425f7e2fd50862eb8942aad8d46

    SHA1

    b064d29ceeabf60453e27adafef610a48d65616a

    SHA256

    821fc60d73a4e2339b293761a673eff820bdbc7df1981b5703b86466670fbe57

    SHA512

    23c4a9edb0224e8a588f3dee3d5b405ae867d5748a65ce3b83072b4bf695ca1edcfefec74a83e5d1a08241c9c2e38b0f54c2430071b9b6f88837b056d2f58260

  • \Users\Admin\AppData\Local\Temp\csrss.exe
    Filesize

    380KB

    MD5

    43ae58eec11c99f805d518745ae66ed2

    SHA1

    eb63531821176b3c86850f35b97bb67258814cc6

    SHA256

    db761ed0a642c862363f361b039f7130ae5b4c5f732ae16f10a5ce1cf6d713b9

    SHA512

    3e7f41d9b2df9bb637faf71e6cfe364c6eec6a2fd6a80619025599259ca8377fc1deb7eb2a63a484c66f30948ec72aee8f1d0fb2b5b2c1b54bfda19ae6fb6fae

  • \Users\Admin\AppData\Local\Temp\csrss.exe
    Filesize

    380KB

    MD5

    43ae58eec11c99f805d518745ae66ed2

    SHA1

    eb63531821176b3c86850f35b97bb67258814cc6

    SHA256

    db761ed0a642c862363f361b039f7130ae5b4c5f732ae16f10a5ce1cf6d713b9

    SHA512

    3e7f41d9b2df9bb637faf71e6cfe364c6eec6a2fd6a80619025599259ca8377fc1deb7eb2a63a484c66f30948ec72aee8f1d0fb2b5b2c1b54bfda19ae6fb6fae

  • \Users\Admin\AppData\Local\Temp\csrss.exe
    Filesize

    380KB

    MD5

    43ae58eec11c99f805d518745ae66ed2

    SHA1

    eb63531821176b3c86850f35b97bb67258814cc6

    SHA256

    db761ed0a642c862363f361b039f7130ae5b4c5f732ae16f10a5ce1cf6d713b9

    SHA512

    3e7f41d9b2df9bb637faf71e6cfe364c6eec6a2fd6a80619025599259ca8377fc1deb7eb2a63a484c66f30948ec72aee8f1d0fb2b5b2c1b54bfda19ae6fb6fae

  • \Users\Admin\AppData\Local\Temp\nvvsvc.exe
    Filesize

    588KB

    MD5

    6750fb6ee5a6b47c404736f29f021377

    SHA1

    ac25c9f3ff0865a08922071ccca328a1d0e30cda

    SHA256

    2d69be52fe32d73008a25813094f75555eeba3746639a27607818f873a726fc9

    SHA512

    c20d00f14ced46f14cc183cf186a92b639649333a1fd54b71d32b7a4c0709ebbf9cd03dd4bf2fe566c95abaf393ed0807c308c5badc10d1d71ad301d513201da

  • \Users\Admin\AppData\Local\Temp\nvvsvc.exe
    Filesize

    588KB

    MD5

    6750fb6ee5a6b47c404736f29f021377

    SHA1

    ac25c9f3ff0865a08922071ccca328a1d0e30cda

    SHA256

    2d69be52fe32d73008a25813094f75555eeba3746639a27607818f873a726fc9

    SHA512

    c20d00f14ced46f14cc183cf186a92b639649333a1fd54b71d32b7a4c0709ebbf9cd03dd4bf2fe566c95abaf393ed0807c308c5badc10d1d71ad301d513201da

  • \Users\Admin\AppData\Local\Temp\nvvsvc.exe
    Filesize

    588KB

    MD5

    6750fb6ee5a6b47c404736f29f021377

    SHA1

    ac25c9f3ff0865a08922071ccca328a1d0e30cda

    SHA256

    2d69be52fe32d73008a25813094f75555eeba3746639a27607818f873a726fc9

    SHA512

    c20d00f14ced46f14cc183cf186a92b639649333a1fd54b71d32b7a4c0709ebbf9cd03dd4bf2fe566c95abaf393ed0807c308c5badc10d1d71ad301d513201da

  • memory/268-125-0x0000000000000000-mapping.dmp
  • memory/680-79-0x0000000000000000-mapping.dmp
  • memory/692-88-0x000000000041EB00-mapping.dmp
  • memory/692-82-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/692-83-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/692-107-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/692-86-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/692-106-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/692-102-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/692-123-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/692-87-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/956-124-0x0000000000000000-mapping.dmp
  • memory/1028-73-0x0000000000000000-mapping.dmp
  • memory/1208-113-0x0000000000000000-mapping.dmp
  • memory/1556-112-0x0000000000000000-mapping.dmp
  • memory/1632-121-0x0000000000000000-mapping.dmp
  • memory/1856-96-0x0000000000400000-0x00000000004B7000-memory.dmp
    Filesize

    732KB

  • memory/1856-99-0x0000000000400000-0x00000000004B7000-memory.dmp
    Filesize

    732KB

  • memory/1856-100-0x00000000004B5670-mapping.dmp
  • memory/1856-128-0x0000000000400000-0x00000000004B7000-memory.dmp
    Filesize

    732KB

  • memory/1856-104-0x0000000000400000-0x00000000004B7000-memory.dmp
    Filesize

    732KB

  • memory/1856-129-0x0000000000400000-0x00000000004B7000-memory.dmp
    Filesize

    732KB

  • memory/1856-98-0x0000000000400000-0x00000000004B7000-memory.dmp
    Filesize

    732KB

  • memory/1856-109-0x0000000000400000-0x00000000004B7000-memory.dmp
    Filesize

    732KB

  • memory/1856-110-0x0000000000400000-0x00000000004B7000-memory.dmp
    Filesize

    732KB

  • memory/1856-95-0x0000000000400000-0x00000000004B7000-memory.dmp
    Filesize

    732KB

  • memory/1856-126-0x0000000000400000-0x00000000004B7000-memory.dmp
    Filesize

    732KB

  • memory/1992-122-0x0000000000000000-mapping.dmp
  • memory/1996-65-0x0000000000400000-0x000000000050D000-memory.dmp
    Filesize

    1.1MB

  • memory/1996-62-0x0000000000400000-0x000000000050D000-memory.dmp
    Filesize

    1.1MB

  • memory/1996-114-0x0000000000400000-0x000000000050D000-memory.dmp
    Filesize

    1.1MB

  • memory/1996-61-0x0000000000400000-0x000000000050D000-memory.dmp
    Filesize

    1.1MB

  • memory/1996-60-0x0000000000400000-0x000000000050D000-memory.dmp
    Filesize

    1.1MB

  • memory/1996-63-0x0000000000400000-0x000000000050D000-memory.dmp
    Filesize

    1.1MB

  • memory/1996-66-0x00000000004020CC-mapping.dmp
  • memory/1996-59-0x0000000000400000-0x000000000050D000-memory.dmp
    Filesize

    1.1MB

  • memory/1996-67-0x0000000000400000-0x000000000050D000-memory.dmp
    Filesize

    1.1MB

  • memory/1996-56-0x0000000000400000-0x000000000050D000-memory.dmp
    Filesize

    1.1MB

  • memory/1996-68-0x0000000075511000-0x0000000075513000-memory.dmp
    Filesize

    8KB

  • memory/1996-57-0x0000000000400000-0x000000000050D000-memory.dmp
    Filesize

    1.1MB

  • memory/1996-69-0x0000000000400000-0x000000000050D000-memory.dmp
    Filesize

    1.1MB

  • memory/1996-70-0x0000000000400000-0x000000000050D000-memory.dmp
    Filesize

    1.1MB