Analysis

  • max time kernel
    41s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 17:36

General

  • Target

    cb2ba9ccdb9029771747844d79baa1cffdf68239a25396f9641b70eb52f1ddf8.exe

  • Size

    825KB

  • MD5

    8ee96064220b9576479c458e2ad51411

  • SHA1

    ef27c1347df38df970d6d0ac9c3330c60d032dbb

  • SHA256

    cb2ba9ccdb9029771747844d79baa1cffdf68239a25396f9641b70eb52f1ddf8

  • SHA512

    74658cad0d8b38191e90e068e3e7bb7429e7e3a41555a5fadf33b6118ac36e8f4f1b8e5de20c17a340985285e7899c104d1eb5f5e8074c5dc193b934dc016f8a

  • SSDEEP

    12288:GPcF55DQMSjPaiibTKQZEHi3usCJbGwVHxxhqW+yeGUqG2RKSC:GPGUVPanKMZ35CJCw3rY41n

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb2ba9ccdb9029771747844d79baa1cffdf68239a25396f9641b70eb52f1ddf8.exe
    "C:\Users\Admin\AppData\Local\Temp\cb2ba9ccdb9029771747844d79baa1cffdf68239a25396f9641b70eb52f1ddf8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      2⤵
      • Modifies WinLogon for persistence
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h
          4⤵
          • Sets file to hidden
          • Drops file in Windows directory
          • Views/modifies file attributes
          PID:520
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1768
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h
          4⤵
          • Sets file to hidden
          • Drops file in Windows directory
          • Views/modifies file attributes
          PID:700
      • C:\Windows\SysWOW64\WidnowsUpdate\msdcsc.exe
        "C:\Windows\system32\WidnowsUpdate\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        PID:384

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Hidden Files and Directories

2
T1158

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat
    Filesize

    62B

    MD5

    c6abd7a109bb37ab773b9e79b91b7741

    SHA1

    7933b8795914b27483d2afed35b3830e8bf5bdb6

    SHA256

    8bc84b3ddfd9c295f555926bf1c311be423732423c585ca90796cdee7a245629

    SHA512

    35d14c9b7366a4737e3685223d55d85c583c7fbe73274577424dc8d9960cc78c79a80a8b42a62f6d9d9962ddd60cf2a332411d4ac18196258dc9d5b0b575e3dc

  • C:\Windows\SysWOW64\WidnowsUpdate\msdcsc.exe
    Filesize

    54KB

    MD5

    0f01571a3e4c71eb4313175aae86488e

    SHA1

    2ba648afe2cd52edf5f25e304f77d457abf7ac0e

    SHA256

    8cc51c4c2efc8c6a401aa83a0aeced0925d5d9d2a43192f35561893cdf704022

    SHA512

    159dfbb7d385bf92f4fc48ca389b89d69f6c2616e90dfa056e725d7da78a3702694a28f9c5cab7b55adc4d4dbd7bfe5d272c8b1c9931e3ac95f6326d74576794

  • C:\Windows\SysWOW64\WidnowsUpdate\msdcsc.exe
    Filesize

    54KB

    MD5

    0f01571a3e4c71eb4313175aae86488e

    SHA1

    2ba648afe2cd52edf5f25e304f77d457abf7ac0e

    SHA256

    8cc51c4c2efc8c6a401aa83a0aeced0925d5d9d2a43192f35561893cdf704022

    SHA512

    159dfbb7d385bf92f4fc48ca389b89d69f6c2616e90dfa056e725d7da78a3702694a28f9c5cab7b55adc4d4dbd7bfe5d272c8b1c9931e3ac95f6326d74576794

  • \Windows\SysWOW64\WidnowsUpdate\msdcsc.exe
    Filesize

    54KB

    MD5

    0f01571a3e4c71eb4313175aae86488e

    SHA1

    2ba648afe2cd52edf5f25e304f77d457abf7ac0e

    SHA256

    8cc51c4c2efc8c6a401aa83a0aeced0925d5d9d2a43192f35561893cdf704022

    SHA512

    159dfbb7d385bf92f4fc48ca389b89d69f6c2616e90dfa056e725d7da78a3702694a28f9c5cab7b55adc4d4dbd7bfe5d272c8b1c9931e3ac95f6326d74576794

  • memory/384-87-0x0000000000000000-mapping.dmp
  • memory/520-83-0x0000000000000000-mapping.dmp
  • memory/700-82-0x0000000000000000-mapping.dmp
  • memory/1768-78-0x0000000000000000-mapping.dmp
  • memory/1964-74-0x0000000074970000-0x0000000074F1B000-memory.dmp
    Filesize

    5.7MB

  • memory/1964-54-0x0000000076411000-0x0000000076413000-memory.dmp
    Filesize

    8KB

  • memory/1964-92-0x0000000074970000-0x0000000074F1B000-memory.dmp
    Filesize

    5.7MB

  • memory/2004-77-0x0000000000000000-mapping.dmp
  • memory/2016-65-0x0000000000400000-0x00000000004CB000-memory.dmp
    Filesize

    812KB

  • memory/2016-62-0x0000000000400000-0x00000000004CB000-memory.dmp
    Filesize

    812KB

  • memory/2016-76-0x0000000000400000-0x00000000004CB000-memory.dmp
    Filesize

    812KB

  • memory/2016-71-0x0000000000400000-0x00000000004CB000-memory.dmp
    Filesize

    812KB

  • memory/2016-67-0x0000000000400000-0x00000000004CB000-memory.dmp
    Filesize

    812KB

  • memory/2016-69-0x0000000000400000-0x00000000004CB000-memory.dmp
    Filesize

    812KB

  • memory/2016-64-0x0000000000400000-0x00000000004CB000-memory.dmp
    Filesize

    812KB

  • memory/2016-73-0x0000000000400000-0x00000000004CB000-memory.dmp
    Filesize

    812KB

  • memory/2016-60-0x0000000000400000-0x00000000004CB000-memory.dmp
    Filesize

    812KB

  • memory/2016-58-0x0000000000400000-0x00000000004CB000-memory.dmp
    Filesize

    812KB

  • memory/2016-56-0x0000000000400000-0x00000000004CB000-memory.dmp
    Filesize

    812KB

  • memory/2016-55-0x0000000000400000-0x00000000004CB000-memory.dmp
    Filesize

    812KB

  • memory/2016-90-0x0000000000401000-0x000000000049F000-memory.dmp
    Filesize

    632KB

  • memory/2016-70-0x000000000049F92C-mapping.dmp