Analysis

  • max time kernel
    119s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2022 02:31

General

  • Target

    c2a89abace500e1cd78481e2590c0403f0dd1eb5df4ef0120f51e4d89fb20203.exe

  • Size

    1.8MB

  • MD5

    89783ca33e2fbe4f121c7784a18ce693

  • SHA1

    47d727f35c802fa9a66713fff0a43b6fc1db73e8

  • SHA256

    c2a89abace500e1cd78481e2590c0403f0dd1eb5df4ef0120f51e4d89fb20203

  • SHA512

    cde04a8c32247c444df0fabc1c25c663fdda7d2e96a6799f5adf16c499e1f0006771a63de1decc7a6f1d44515d455ccb32123d2bcbf0972abfde682626b60209

  • SSDEEP

    49152:fiDQLla9zhTig0+8FDHIu3i3+u9R0u+MMp7OE:qDQYrmHxi3+uX3+MwZ

Score
10/10

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2a89abace500e1cd78481e2590c0403f0dd1eb5df4ef0120f51e4d89fb20203.exe
    "C:\Users\Admin\AppData\Local\Temp\c2a89abace500e1cd78481e2590c0403f0dd1eb5df4ef0120f51e4d89fb20203.exe"
    1⤵
    • Checks BIOS information in registry
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\Users\Admin\AppData\Local\Temp\c2a89abace500e1cd78481e2590c0403f0dd1eb5df4ef0120f51e4d89fb20203.exe
      C:\Users\Admin\AppData\Local\Temp\c2a89abace500e1cd78481e2590c0403f0dd1eb5df4ef0120f51e4d89fb20203.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4444
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
          PID:1644

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4444-157-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/4444-155-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/4444-148-0x0000000000000000-mapping.dmp

    • memory/4444-163-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/4444-149-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/4444-160-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/4444-156-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/4444-150-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/4444-153-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/4444-161-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/4444-151-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/5028-147-0x0000000000400000-0x00000000005E0000-memory.dmp

      Filesize

      1.9MB

    • memory/5028-164-0x0000000000400000-0x00000000005E0000-memory.dmp

      Filesize

      1.9MB

    • memory/5028-134-0x0000000002180000-0x0000000002285000-memory.dmp

      Filesize

      1.0MB

    • memory/5028-144-0x0000000000401000-0x0000000000468000-memory.dmp

      Filesize

      412KB

    • memory/5028-132-0x0000000000400000-0x00000000005E0000-memory.dmp

      Filesize

      1.9MB

    • memory/5028-143-0x0000000000400000-0x00000000005E0000-memory.dmp

      Filesize

      1.9MB

    • memory/5028-142-0x0000000000400000-0x00000000005E0000-memory.dmp

      Filesize

      1.9MB

    • memory/5028-141-0x0000000000400000-0x00000000005E0000-memory.dmp

      Filesize

      1.9MB

    • memory/5028-140-0x0000000002181000-0x0000000002243000-memory.dmp

      Filesize

      776KB