Analysis

  • max time kernel
    78s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-11-2023 18:59

General

  • Target

    0710f721a99065dfb692e62996c0681172acfc256c230f1676ebb646e94f2cca.exe

  • Size

    1.6MB

  • MD5

    ccbde79e9dcbb71a79820b1f5d0fe6f5

  • SHA1

    d83fbc9fa5aa59aa093891b599659e6fb7bbcc7d

  • SHA256

    0710f721a99065dfb692e62996c0681172acfc256c230f1676ebb646e94f2cca

  • SHA512

    362fdc897419de502228b7673a9613eedec2baeed7dd10a2462840ab049819882ad29d75964df5c9da7a6f549ba9ff48a86f64515caa79ce8fe38ab3f7000751

  • SSDEEP

    49152:Ealn/I+qq1qhOHU7qYcBl6nTh/+VN3m9YK:1IlPTEV4+K

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0710f721a99065dfb692e62996c0681172acfc256c230f1676ebb646e94f2cca.exe
    "C:\Users\Admin\AppData\Local\Temp\0710f721a99065dfb692e62996c0681172acfc256c230f1676ebb646e94f2cca.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Users\Admin\AppData\Local\Temp\winini.exe
      "C:\Users\Admin\AppData\Local\Temp\winini.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Users\Admin\AppData\Local\Temp\winhost.exe
        C:\Users\Admin\AppData\Local\Temp\winhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4208
    • C:\Users\Admin\AppData\Local\Temp\ÍÈùÒÇû.exe
      "C:\Users\Admin\AppData\Local\Temp\ÍÈùÒÇû.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\winhost.exe

    Filesize

    34KB

    MD5

    e118330b4629b12368d91b9df6488be0

    SHA1

    ce90218c7e3b90df2a3409ec253048bb6472c2fd

    SHA256

    3a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9

    SHA512

    ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0

  • C:\Users\Admin\AppData\Local\Temp\winhost.exe

    Filesize

    34KB

    MD5

    e118330b4629b12368d91b9df6488be0

    SHA1

    ce90218c7e3b90df2a3409ec253048bb6472c2fd

    SHA256

    3a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9

    SHA512

    ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0

  • C:\Users\Admin\AppData\Local\Temp\winini.exe

    Filesize

    520KB

    MD5

    a8590dc96290e160b7518cfbc2b60bba

    SHA1

    e1f2ad4c512f33e5232d15f700d3850b947aa9ab

    SHA256

    9869f7a1218218380c9f05f0d50b2c0fc7a2c153cf1a9a238651236767c2e252

    SHA512

    2381a5cfa84b321a27832072cc514adcf1ee52864b105fe205a308afbde71c7606e80527e1f0ec8fb12c87f834ee4cfada7c2f731f7eeed92070df23aaed5aa0

  • C:\Users\Admin\AppData\Local\Temp\winini.exe

    Filesize

    520KB

    MD5

    a8590dc96290e160b7518cfbc2b60bba

    SHA1

    e1f2ad4c512f33e5232d15f700d3850b947aa9ab

    SHA256

    9869f7a1218218380c9f05f0d50b2c0fc7a2c153cf1a9a238651236767c2e252

    SHA512

    2381a5cfa84b321a27832072cc514adcf1ee52864b105fe205a308afbde71c7606e80527e1f0ec8fb12c87f834ee4cfada7c2f731f7eeed92070df23aaed5aa0

  • C:\Users\Admin\AppData\Local\Temp\winini.exe

    Filesize

    520KB

    MD5

    a8590dc96290e160b7518cfbc2b60bba

    SHA1

    e1f2ad4c512f33e5232d15f700d3850b947aa9ab

    SHA256

    9869f7a1218218380c9f05f0d50b2c0fc7a2c153cf1a9a238651236767c2e252

    SHA512

    2381a5cfa84b321a27832072cc514adcf1ee52864b105fe205a308afbde71c7606e80527e1f0ec8fb12c87f834ee4cfada7c2f731f7eeed92070df23aaed5aa0

  • C:\Users\Admin\AppData\Local\Temp\ÍÈùÒÇû.exe

    Filesize

    968KB

    MD5

    32cbecf1c0b588ef3ab1c700f5bd7c8d

    SHA1

    1ef6254aa8fbfd0e0be522540937b673f292a339

    SHA256

    d4aa281ba3424b4160c40a898e314d0ba4a7bd2532a10f5ba965f90b98f64294

    SHA512

    65201ccfa400454d34916faba7238ae315e00b029a8a213a4990aa302c9512bdcd8982038f06435cd5f62d107c5f2e1de9149da14437d09686b7fd7a4b4ee882

  • C:\Users\Admin\AppData\Local\Temp\ÍÈùÒÇû.exe

    Filesize

    968KB

    MD5

    32cbecf1c0b588ef3ab1c700f5bd7c8d

    SHA1

    1ef6254aa8fbfd0e0be522540937b673f292a339

    SHA256

    d4aa281ba3424b4160c40a898e314d0ba4a7bd2532a10f5ba965f90b98f64294

    SHA512

    65201ccfa400454d34916faba7238ae315e00b029a8a213a4990aa302c9512bdcd8982038f06435cd5f62d107c5f2e1de9149da14437d09686b7fd7a4b4ee882

  • C:\Users\Admin\AppData\Local\Temp\ÍÈùÒÇû.exe

    Filesize

    968KB

    MD5

    32cbecf1c0b588ef3ab1c700f5bd7c8d

    SHA1

    1ef6254aa8fbfd0e0be522540937b673f292a339

    SHA256

    d4aa281ba3424b4160c40a898e314d0ba4a7bd2532a10f5ba965f90b98f64294

    SHA512

    65201ccfa400454d34916faba7238ae315e00b029a8a213a4990aa302c9512bdcd8982038f06435cd5f62d107c5f2e1de9149da14437d09686b7fd7a4b4ee882

  • memory/1328-49-0x000000001BE30000-0x000000001BECC000-memory.dmp

    Filesize

    624KB

  • memory/1328-46-0x0000000000CD0000-0x0000000000CE0000-memory.dmp

    Filesize

    64KB

  • memory/1328-50-0x00007FFF7D9E0000-0x00007FFF7E381000-memory.dmp

    Filesize

    9.6MB

  • memory/1328-61-0x0000000000CD0000-0x0000000000CE0000-memory.dmp

    Filesize

    64KB

  • memory/1328-53-0x000000001BF90000-0x000000001BFDC000-memory.dmp

    Filesize

    304KB

  • memory/1328-45-0x000000001B8C0000-0x000000001BD8E000-memory.dmp

    Filesize

    4.8MB

  • memory/1328-52-0x0000000000CC0000-0x0000000000CC8000-memory.dmp

    Filesize

    32KB

  • memory/1328-54-0x0000000000CD0000-0x0000000000CE0000-memory.dmp

    Filesize

    64KB

  • memory/1328-59-0x00007FFF7D9E0000-0x00007FFF7E381000-memory.dmp

    Filesize

    9.6MB

  • memory/1328-57-0x00007FFF7D9E0000-0x00007FFF7E381000-memory.dmp

    Filesize

    9.6MB

  • memory/1328-43-0x00007FFF7D9E0000-0x00007FFF7E381000-memory.dmp

    Filesize

    9.6MB

  • memory/1328-58-0x0000000000CD0000-0x0000000000CE0000-memory.dmp

    Filesize

    64KB

  • memory/1328-42-0x000000001B2B0000-0x000000001B356000-memory.dmp

    Filesize

    664KB

  • memory/1672-41-0x0000000074FD0000-0x0000000075581000-memory.dmp

    Filesize

    5.7MB

  • memory/1672-14-0x0000000074FD0000-0x0000000075581000-memory.dmp

    Filesize

    5.7MB

  • memory/1672-15-0x0000000000D70000-0x0000000000D80000-memory.dmp

    Filesize

    64KB

  • memory/1672-16-0x0000000074FD0000-0x0000000075581000-memory.dmp

    Filesize

    5.7MB

  • memory/2964-38-0x0000000074FD0000-0x0000000075581000-memory.dmp

    Filesize

    5.7MB

  • memory/2964-1-0x0000000074FD0000-0x0000000075581000-memory.dmp

    Filesize

    5.7MB

  • memory/2964-2-0x0000000001BF0000-0x0000000001C00000-memory.dmp

    Filesize

    64KB

  • memory/2964-0-0x0000000074FD0000-0x0000000075581000-memory.dmp

    Filesize

    5.7MB

  • memory/4208-40-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-62-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-44-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-48-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-55-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-56-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-47-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-28-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-37-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-60-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-35-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-51-0x0000000000800000-0x0000000000801000-memory.dmp

    Filesize

    4KB

  • memory/4208-63-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-64-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-65-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-66-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-67-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-68-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-69-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-70-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-71-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/4208-72-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB