Analysis

  • max time kernel
    153s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 06:37

General

  • Target

    fb71775ac35d04fb3af796ecb2ef8a0353b05b8c749d75b9b79c9bcb74619457.exe

  • Size

    482KB

  • MD5

    03c94216e10c0e05ee22c6c9202e5b50

  • SHA1

    84fbd8c41074760c20250c39caa8ee003813a1b6

  • SHA256

    fb71775ac35d04fb3af796ecb2ef8a0353b05b8c749d75b9b79c9bcb74619457

  • SHA512

    30e2828aecd3b16149e6728dbc9dbf2b0dc189f417182c2d4c165c12e919b1df2cfa112e62fb089a58efefa8938f65b63c36093325d6c4dbef3ce2f6b863f16b

  • SSDEEP

    12288:sbx4fwbr8eoEFKUZVpzyq6U9UKQGqDBQf30:+5NFdvVyIqa

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

mc123server.no-ip.biz:1604

Mutex

DC_MUTEX-4W96M4L

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    rX2dkt0kRKju

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb71775ac35d04fb3af796ecb2ef8a0353b05b8c749d75b9b79c9bcb74619457.exe
    "C:\Users\Admin\AppData\Local\Temp\fb71775ac35d04fb3af796ecb2ef8a0353b05b8c749d75b9b79c9bcb74619457.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:916
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d explorer.exe,"C:\Users\Admin\AppData\Local\Temp\winini.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3776
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d explorer.exe,"C:\Users\Admin\AppData\Local\Temp\winini.exe"
        3⤵
        • Modifies WinLogon for persistence
        PID:1668
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5100
      • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
        "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        PID:1360

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

    Filesize

    45KB

    MD5

    b7c999040d80e5bf87886d70d992c51e

    SHA1

    a8ed9a51cc14ccf99b670e60ebbc110756504929

    SHA256

    5c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e

    SHA512

    71ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309

  • memory/916-132-0x0000000074E30000-0x00000000753E1000-memory.dmp

    Filesize

    5.7MB

  • memory/916-138-0x0000000074E30000-0x00000000753E1000-memory.dmp

    Filesize

    5.7MB

  • memory/1360-140-0x0000000000000000-mapping.dmp

  • memory/1668-134-0x0000000000000000-mapping.dmp

  • memory/3776-133-0x0000000000000000-mapping.dmp

  • memory/5100-135-0x0000000000000000-mapping.dmp

  • memory/5100-136-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5100-137-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5100-139-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5100-142-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB