Analysis

  • max time kernel
    156s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 02:56

General

  • Target

    4e3d4f5356be34977d5660cefbb5d150.exe

  • Size

    713KB

  • MD5

    4e3d4f5356be34977d5660cefbb5d150

  • SHA1

    f920e41c07f2c079085c307e131c66cee8bb9824

  • SHA256

    19d84c93d3a8f8e201de408a80fd436acdfa01d0659619510f69459aa8266323

  • SHA512

    329bdfc2e13dfd91167c1cba3287bb336881e63823a0441b818e535e395a8f05d1a8257cd926956ce21bdfe0c05fd4539d7c1e7399fc7b5d01a43f81968dd12e

  • SSDEEP

    12288:u4IXhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy45p:ufnAw2WWeFcfbP9VPSPMTSPL/rWvzq4R

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

hackerlua.zapto.org:4444

Mutex

DCMIN_MUTEX-BD66R76

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    K1rJHsoCQpfG

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DarkComet RAT

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e3d4f5356be34977d5660cefbb5d150.exe
    "C:\Users\Admin\AppData\Local\Temp\4e3d4f5356be34977d5660cefbb5d150.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\AS.EXE
      "C:\Users\Admin\AppData\Local\Temp\AS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4816
      • C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe
        "C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AS.EXE

    Filesize

    660KB

    MD5

    d0216ec3d286dbefe7c39b55e80db00b

    SHA1

    df25fbc81dda5467cf95a504c8a1b61f5a8fc992

    SHA256

    d9013b4fe771be8f5556bf94e803a8cb20c5598a026e9c3b062a8f4afea38423

    SHA512

    ed64e68354d0277d286fb8dc3aeba7d06bee60bd0b5844f306216a960a0d47a3eb05c525d14288af6a44b199823190e1bab7337a40671ab9a67016de6d392fb1

  • memory/3876-29-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/3876-31-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/3876-24-0x00000000023C0000-0x00000000023C1000-memory.dmp

    Filesize

    4KB

  • memory/3876-25-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/3876-26-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/3876-27-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/3876-37-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/3876-28-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/3876-30-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/3876-36-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/3876-32-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/3876-33-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/3876-34-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/3876-35-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/4816-11-0x00000000022C0000-0x00000000022C1000-memory.dmp

    Filesize

    4KB

  • memory/4816-23-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB