Analysis

  • max time kernel
    231s
  • max time network
    218s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 14:48

General

  • Target

    9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe

  • Size

    1.3MB

  • MD5

    4e2a96f31aee26f5b857856399c13d06

  • SHA1

    5184d1f42712dec5380dabd325549210e5437253

  • SHA256

    9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b

  • SHA512

    187dc02fc0c9c9090f52921f9ad8f478427b4c40c0eaee680f1e4aba04fd3dc677e06651e005b998c2a1f32bef9b052483e6e017185ffa00060160ebc1830dd9

  • SSDEEP

    24576:ORmJkcoQricOIQxiZY1iaBA0dAQdtvGw6E8jN4vAgDbI4G8ELRGY0+jz:bJZoQrbTFZY1iaBA4AQAE82ZG50Oz

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

enviousegend.no-ip.biz:5555

Mutex

DCMIN_MUTEX-5PYNPYR

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    oTBrCPsCRkpP

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DarkComet RAT

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 4 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe
    "C:\Users\Admin\AppData\Local\Temp\9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Users\Admin\AppData\Local\Temp\9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe
      "C:\Users\Admin\AppData\Local\Temp\9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe
        "C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1476
        • C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe
          "C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\m604561.rcf

    Filesize

    658KB

    MD5

    b5717a8ed3ef57d5c0bb9ec0fab7ec8b

    SHA1

    839aa036575e34775fe53e295f5c11fb58bfa0c2

    SHA256

    4f00fa652c24d6c882cc264970baa5d7a94d5fa61cf91411d1b0b2d3e4ca1bcf

    SHA512

    84d52fe8f1c4d2c93972985e2f2a73c953a4bda704ce0f78eb751ce8a8e5d94a91311123ba27396a6031f4c0dbf87201581390aaa32c9e3aa66beab4a1f99771

  • C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe

    Filesize

    1.3MB

    MD5

    4e2a96f31aee26f5b857856399c13d06

    SHA1

    5184d1f42712dec5380dabd325549210e5437253

    SHA256

    9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b

    SHA512

    187dc02fc0c9c9090f52921f9ad8f478427b4c40c0eaee680f1e4aba04fd3dc677e06651e005b998c2a1f32bef9b052483e6e017185ffa00060160ebc1830dd9

  • C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe

    Filesize

    1.3MB

    MD5

    4e2a96f31aee26f5b857856399c13d06

    SHA1

    5184d1f42712dec5380dabd325549210e5437253

    SHA256

    9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b

    SHA512

    187dc02fc0c9c9090f52921f9ad8f478427b4c40c0eaee680f1e4aba04fd3dc677e06651e005b998c2a1f32bef9b052483e6e017185ffa00060160ebc1830dd9

  • C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe

    Filesize

    1.3MB

    MD5

    4e2a96f31aee26f5b857856399c13d06

    SHA1

    5184d1f42712dec5380dabd325549210e5437253

    SHA256

    9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b

    SHA512

    187dc02fc0c9c9090f52921f9ad8f478427b4c40c0eaee680f1e4aba04fd3dc677e06651e005b998c2a1f32bef9b052483e6e017185ffa00060160ebc1830dd9

  • \Users\Admin\Documents\DCSCMIN\IMDCSC.exe

    Filesize

    1.3MB

    MD5

    4e2a96f31aee26f5b857856399c13d06

    SHA1

    5184d1f42712dec5380dabd325549210e5437253

    SHA256

    9bc3f3a234bffb6b87c67cddec0fbff666a9ef7b22eeef3b97b57cd8a2b21e1b

    SHA512

    187dc02fc0c9c9090f52921f9ad8f478427b4c40c0eaee680f1e4aba04fd3dc677e06651e005b998c2a1f32bef9b052483e6e017185ffa00060160ebc1830dd9

  • memory/532-78-0x00000000000C0000-0x0000000000172000-memory.dmp

    Filesize

    712KB

  • memory/532-77-0x00000000000C0000-0x0000000000172000-memory.dmp

    Filesize

    712KB

  • memory/532-76-0x00000000000C0000-0x0000000000172000-memory.dmp

    Filesize

    712KB

  • memory/560-54-0x00000000757E1000-0x00000000757E3000-memory.dmp

    Filesize

    8KB

  • memory/1688-62-0x00000000000C0000-0x0000000000172000-memory.dmp

    Filesize

    712KB

  • memory/1688-61-0x00000000000C0000-0x0000000000172000-memory.dmp

    Filesize

    712KB

  • memory/1688-59-0x00000000000C0000-0x0000000000172000-memory.dmp

    Filesize

    712KB

  • memory/1688-57-0x00000000000C0000-0x0000000000172000-memory.dmp

    Filesize

    712KB

  • memory/1688-55-0x00000000000C0000-0x0000000000172000-memory.dmp

    Filesize

    712KB