Analysis

  • max time kernel
    91s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2022 17:36

General

  • Target

    cb2ba9ccdb9029771747844d79baa1cffdf68239a25396f9641b70eb52f1ddf8.exe

  • Size

    825KB

  • MD5

    8ee96064220b9576479c458e2ad51411

  • SHA1

    ef27c1347df38df970d6d0ac9c3330c60d032dbb

  • SHA256

    cb2ba9ccdb9029771747844d79baa1cffdf68239a25396f9641b70eb52f1ddf8

  • SHA512

    74658cad0d8b38191e90e068e3e7bb7429e7e3a41555a5fadf33b6118ac36e8f4f1b8e5de20c17a340985285e7899c104d1eb5f5e8074c5dc193b934dc016f8a

  • SSDEEP

    12288:GPcF55DQMSjPaiibTKQZEHi3usCJbGwVHxxhqW+yeGUqG2RKSC:GPGUVPanKMZ35CJCw3rY41n

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb2ba9ccdb9029771747844d79baa1cffdf68239a25396f9641b70eb52f1ddf8.exe
    "C:\Users\Admin\AppData\Local\Temp\cb2ba9ccdb9029771747844d79baa1cffdf68239a25396f9641b70eb52f1ddf8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      2⤵
      • Modifies WinLogon for persistence
      • Adds Run key to start application
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4760
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3420
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h
          4⤵
          • Sets file to hidden
          • Drops file in Windows directory
          • Views/modifies file attributes
          PID:1320
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:64
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h
          4⤵
          • Sets file to hidden
          • Drops file in Windows directory
          • Views/modifies file attributes
          PID:5116
      • C:\Windows\SysWOW64\WidnowsUpdate\msdcsc.exe
        "C:\Windows\system32\WidnowsUpdate\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        PID:4044

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Hidden Files and Directories

2
T1158

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat
    Filesize

    62B

    MD5

    c6abd7a109bb37ab773b9e79b91b7741

    SHA1

    7933b8795914b27483d2afed35b3830e8bf5bdb6

    SHA256

    8bc84b3ddfd9c295f555926bf1c311be423732423c585ca90796cdee7a245629

    SHA512

    35d14c9b7366a4737e3685223d55d85c583c7fbe73274577424dc8d9960cc78c79a80a8b42a62f6d9d9962ddd60cf2a332411d4ac18196258dc9d5b0b575e3dc

  • C:\Windows\SysWOW64\WidnowsUpdate\msdcsc.exe
    Filesize

    57KB

    MD5

    454501a66ad6e85175a6757573d79f8b

    SHA1

    8ca96c61f26a640a5b1b1152d055260b9d43e308

    SHA256

    7fd4f35aff4a0d4bfaae3a5dfb14b94934276df0e96d1a417a8f3693915e72c8

    SHA512

    9dc3b9a9b7e661acc3ac9a0ff4fd764097fc41ccbc2e7969cae9805cc693a87e8255e459ea5f315271825e7e517a46649acc8d42122a8018264cc3f2efa34fb7

  • C:\Windows\SysWOW64\WidnowsUpdate\msdcsc.exe
    Filesize

    57KB

    MD5

    454501a66ad6e85175a6757573d79f8b

    SHA1

    8ca96c61f26a640a5b1b1152d055260b9d43e308

    SHA256

    7fd4f35aff4a0d4bfaae3a5dfb14b94934276df0e96d1a417a8f3693915e72c8

    SHA512

    9dc3b9a9b7e661acc3ac9a0ff4fd764097fc41ccbc2e7969cae9805cc693a87e8255e459ea5f315271825e7e517a46649acc8d42122a8018264cc3f2efa34fb7

  • memory/64-139-0x0000000000000000-mapping.dmp
  • memory/1320-141-0x0000000000000000-mapping.dmp
  • memory/3420-138-0x0000000000000000-mapping.dmp
  • memory/4044-143-0x0000000000000000-mapping.dmp
  • memory/4760-136-0x0000000000400000-0x00000000004CB000-memory.dmp
    Filesize

    812KB

  • memory/4760-135-0x0000000000400000-0x00000000004CB000-memory.dmp
    Filesize

    812KB

  • memory/4760-134-0x0000000000400000-0x00000000004CB000-memory.dmp
    Filesize

    812KB

  • memory/4760-133-0x0000000000000000-mapping.dmp
  • memory/4864-132-0x0000000074B50000-0x0000000075101000-memory.dmp
    Filesize

    5.7MB

  • memory/4864-137-0x0000000074B50000-0x0000000075101000-memory.dmp
    Filesize

    5.7MB

  • memory/5116-142-0x0000000000000000-mapping.dmp