Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 21:14

General

  • Target

    3cffc7f6b4348cb2dfa4c853f46d974c.exe

  • Size

    950KB

  • MD5

    3cffc7f6b4348cb2dfa4c853f46d974c

  • SHA1

    6cb57a4bd75bbea231b52ea57d19dff657a74131

  • SHA256

    27dc3db12cc3ab888b6603b1030fde1980d371a4c5c51f66ac0c0c8b3df8e57e

  • SHA512

    2284a38e26298150b2ee0d769e9bee2e4776842f853b0b5fd6a165531d88c33d7fc16d44a6448e693b06e41b21136471964af8ac8f045306ee9e2222c7ce9adf

  • SSDEEP

    24576:5cwSVhrNLH609ntlQAHiBKeJlJWNvk4kt434mt:IJhhpo+vkhb+

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cffc7f6b4348cb2dfa4c853f46d974c.exe
    "C:\Users\Admin\AppData\Local\Temp\3cffc7f6b4348cb2dfa4c853f46d974c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3568
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • Modifies WinLogon for persistence
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4344
      • C:\Users\Admin\Documents\Java\jusched.exe
        "C:\Users\Admin\Documents\Java\jusched.exe"
        3⤵
        • Executes dropped EXE
        PID:1240

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\Documents\Java\jusched.exe

          Filesize

          32KB

          MD5

          50a915722200ecbadfaf9a1cff586694

          SHA1

          40120d5fa1ce932562e905a1aeef772c4d839455

          SHA256

          0db368599932dfba2a3c10a37acb4122cdbf88fa8f15fec252954c51187229e5

          SHA512

          3eece77e747881cb9573ef3bad5a0ae55bcf950da802ece732d823efe025256f4b83692ca5784c54d3ff419d429a22ed5bbd2796b66b108f102bc6c3fe6ebf2f

        • C:\Users\Admin\Documents\Java\jusched.exe

          Filesize

          92KB

          MD5

          9b801e44bbf63dafca93f850a9d9d51e

          SHA1

          6b3415f645d35810333bdf66182433ba91bf3224

          SHA256

          29eb6bf28d74d11f3ee25f8bacb42ffa4dff12762af46cf0398a0eb5f606e768

          SHA512

          acd30db7236bb74d1114366ba1b1bba036a6f6c59b89dc77bcd52447286c2e192acabe2ad1d871696690d3af7e308216fa42f552403b72992b5151084d5b387e

        • memory/3568-2-0x0000000001350000-0x0000000001360000-memory.dmp

          Filesize

          64KB

        • memory/3568-1-0x0000000074600000-0x0000000074BB1000-memory.dmp

          Filesize

          5.7MB

        • memory/3568-0-0x0000000074600000-0x0000000074BB1000-memory.dmp

          Filesize

          5.7MB

        • memory/3568-8-0x0000000074600000-0x0000000074BB1000-memory.dmp

          Filesize

          5.7MB

        • memory/4344-3-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/4344-7-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/4344-6-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/4344-69-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/4344-9-0x00000000022D0000-0x00000000022D1000-memory.dmp

          Filesize

          4KB

        • memory/4344-4-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB