Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 23:26

General

  • Target

    1977c2bdcaec144f08371608e0e7ee3a.exe

  • Size

    1.4MB

  • MD5

    1977c2bdcaec144f08371608e0e7ee3a

  • SHA1

    2e98c250c112b6479673c6fac4c130bf1e45287d

  • SHA256

    21e6c4cc8f7785a4d0c8f312cbdf5219d24a0f1176a144d109f91cc427a062f7

  • SHA512

    2be17328024380a1718adcb587485a778e1d463a9b911efeccba881030d9db8f175f4ec511abb562a2d5ea5dc7bce317452eede45e79646c69350fe0e026b1d7

  • SSDEEP

    24576:hh0r/k3pEdZWmRO56tTl6UMs0VbEGZ88TUM+b1ImBsz06xz:k9AGMZZxz

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

testme123.no-ip.biz:82

Mutex

DCMIN_MUTEX-EVANRM5

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    3ozW3J5fvJ1y

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    Update

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1977c2bdcaec144f08371608e0e7ee3a.exe
    "C:\Users\Admin\AppData\Local\Temp\1977c2bdcaec144f08371608e0e7ee3a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3248
    • C:\Users\Admin\AppData\Local\Temp\file1.exe
      C:\Users\Admin\AppData\Local\Temp\\file1.exe
      2⤵
      • Modifies WinLogon for persistence
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe
        "C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2488

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\file1.exe

          Filesize

          658KB

          MD5

          080817d63b20fbe25f84a5ce767ef18a

          SHA1

          8f34c9d2a4446721c5be37cab12ee051f93a391f

          SHA256

          489d5801d6a8ba1863aea1f35e0e61ecab50308a0c6ac531dada72be03d95f5a

          SHA512

          27cac4ee8a4b11512a0857ddccfad9db19551ce667316df11634f36ae0cdceea47854b70df773ba0b939596f9f210d799dbbe4b27967f1123797537b863c0685

        • C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe

          Filesize

          598KB

          MD5

          fe844eef7bd65fe271cfca6148c9285f

          SHA1

          09b3be79c5027433d33a4aa0e6ffb16c7e17fa56

          SHA256

          e466f20da45cdfdae4a8603517bf7ddd12e02a19d1501675927ed235ff508030

          SHA512

          9859f0089b01a9a5c5b2a6953298120af5d26d832712e325cd1172db7b5ce5670c52a8237868ad75b44c2c488cb269fea4d82a9b81b69c41ce70aadd2d8ff9a3

        • memory/1616-31-0x0000000000400000-0x00000000004B2000-memory.dmp

          Filesize

          712KB

        • memory/1616-15-0x00000000024F0000-0x00000000024F1000-memory.dmp

          Filesize

          4KB

        • memory/2488-36-0x0000000000400000-0x00000000004B2000-memory.dmp

          Filesize

          712KB

        • memory/2488-37-0x0000000000400000-0x00000000004B2000-memory.dmp

          Filesize

          712KB

        • memory/2488-38-0x0000000000400000-0x00000000004B2000-memory.dmp

          Filesize

          712KB

        • memory/2488-35-0x0000000000400000-0x00000000004B2000-memory.dmp

          Filesize

          712KB

        • memory/2488-34-0x0000000000400000-0x00000000004B2000-memory.dmp

          Filesize

          712KB

        • memory/2488-33-0x0000000000400000-0x00000000004B2000-memory.dmp

          Filesize

          712KB

        • memory/2488-32-0x0000000000400000-0x00000000004B2000-memory.dmp

          Filesize

          712KB

        • memory/2488-39-0x0000000000400000-0x00000000004B2000-memory.dmp

          Filesize

          712KB

        • memory/2488-40-0x0000000000400000-0x00000000004B2000-memory.dmp

          Filesize

          712KB

        • memory/2488-41-0x0000000000400000-0x00000000004B2000-memory.dmp

          Filesize

          712KB

        • memory/2488-30-0x0000000002390000-0x0000000002391000-memory.dmp

          Filesize

          4KB

        • memory/3248-7-0x000000001C870000-0x000000001C8BC000-memory.dmp

          Filesize

          304KB

        • memory/3248-18-0x00007FF857720000-0x00007FF8580C1000-memory.dmp

          Filesize

          9.6MB

        • memory/3248-16-0x0000000001350000-0x0000000001360000-memory.dmp

          Filesize

          64KB

        • memory/3248-10-0x0000000001350000-0x0000000001360000-memory.dmp

          Filesize

          64KB

        • memory/3248-9-0x00007FF857720000-0x00007FF8580C1000-memory.dmp

          Filesize

          9.6MB

        • memory/3248-8-0x0000000001350000-0x0000000001360000-memory.dmp

          Filesize

          64KB

        • memory/3248-1-0x0000000001350000-0x0000000001360000-memory.dmp

          Filesize

          64KB

        • memory/3248-6-0x0000000001370000-0x0000000001378000-memory.dmp

          Filesize

          32KB

        • memory/3248-5-0x000000001C6D0000-0x000000001C76C000-memory.dmp

          Filesize

          624KB

        • memory/3248-4-0x000000001C160000-0x000000001C62E000-memory.dmp

          Filesize

          4.8MB

        • memory/3248-3-0x000000001BBE0000-0x000000001BC86000-memory.dmp

          Filesize

          664KB

        • memory/3248-2-0x00007FF857720000-0x00007FF8580C1000-memory.dmp

          Filesize

          9.6MB

        • memory/3248-0-0x00007FF857720000-0x00007FF8580C1000-memory.dmp

          Filesize

          9.6MB