Analysis

  • max time kernel
    47s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 02:31

General

  • Target

    c2a89abace500e1cd78481e2590c0403f0dd1eb5df4ef0120f51e4d89fb20203.exe

  • Size

    1.8MB

  • MD5

    89783ca33e2fbe4f121c7784a18ce693

  • SHA1

    47d727f35c802fa9a66713fff0a43b6fc1db73e8

  • SHA256

    c2a89abace500e1cd78481e2590c0403f0dd1eb5df4ef0120f51e4d89fb20203

  • SHA512

    cde04a8c32247c444df0fabc1c25c663fdda7d2e96a6799f5adf16c499e1f0006771a63de1decc7a6f1d44515d455ccb32123d2bcbf0972abfde682626b60209

  • SSDEEP

    49152:fiDQLla9zhTig0+8FDHIu3i3+u9R0u+MMp7OE:qDQYrmHxi3+uX3+MwZ

Score
10/10

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies registry class 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2a89abace500e1cd78481e2590c0403f0dd1eb5df4ef0120f51e4d89fb20203.exe
    "C:\Users\Admin\AppData\Local\Temp\c2a89abace500e1cd78481e2590c0403f0dd1eb5df4ef0120f51e4d89fb20203.exe"
    1⤵
    • Checks BIOS information in registry
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\c2a89abace500e1cd78481e2590c0403f0dd1eb5df4ef0120f51e4d89fb20203.exe
      C:\Users\Admin\AppData\Local\Temp\c2a89abace500e1cd78481e2590c0403f0dd1eb5df4ef0120f51e4d89fb20203.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
          PID:1876

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1052-88-0x0000000000400000-0x00000000004AF000-memory.dmp

            Filesize

            700KB

          • memory/1052-91-0x0000000000400000-0x00000000004AF000-memory.dmp

            Filesize

            700KB

          • memory/1052-97-0x0000000000400000-0x00000000004AF000-memory.dmp

            Filesize

            700KB

          • memory/1052-94-0x0000000000400000-0x00000000004AF000-memory.dmp

            Filesize

            700KB

          • memory/1052-78-0x0000000000400000-0x00000000004AF000-memory.dmp

            Filesize

            700KB

          • memory/1052-85-0x0000000000400000-0x00000000004AF000-memory.dmp

            Filesize

            700KB

          • memory/1052-82-0x0000000000400000-0x00000000004AF000-memory.dmp

            Filesize

            700KB

          • memory/1052-69-0x0000000000400000-0x00000000004AF000-memory.dmp

            Filesize

            700KB

          • memory/1052-70-0x0000000000400000-0x00000000004AF000-memory.dmp

            Filesize

            700KB

          • memory/1052-72-0x0000000000400000-0x00000000004AF000-memory.dmp

            Filesize

            700KB

          • memory/1052-75-0x0000000000400000-0x00000000004AF000-memory.dmp

            Filesize

            700KB

          • memory/2028-55-0x0000000002050000-0x0000000002155000-memory.dmp

            Filesize

            1.0MB

          • memory/2028-66-0x0000000000401000-0x0000000000468000-memory.dmp

            Filesize

            412KB

          • memory/2028-65-0x0000000000400000-0x00000000005E0000-memory.dmp

            Filesize

            1.9MB

          • memory/2028-54-0x00000000767B1000-0x00000000767B3000-memory.dmp

            Filesize

            8KB

          • memory/2028-64-0x0000000000400000-0x00000000005E0000-memory.dmp

            Filesize

            1.9MB

          • memory/2028-63-0x0000000000400000-0x00000000005E0000-memory.dmp

            Filesize

            1.9MB

          • memory/2028-62-0x0000000002051000-0x0000000002113000-memory.dmp

            Filesize

            776KB

          • memory/2028-96-0x0000000000400000-0x00000000005E0000-memory.dmp

            Filesize

            1.9MB

          • memory/2028-61-0x0000000000400000-0x00000000005E0000-memory.dmp

            Filesize

            1.9MB