Analysis
-
max time kernel
156s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 02:56
Behavioral task
behavioral1
Sample
4e3d4f5356be34977d5660cefbb5d150.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e3d4f5356be34977d5660cefbb5d150.exe
Resource
win10v2004-20231215-en
General
-
Target
4e3d4f5356be34977d5660cefbb5d150.exe
-
Size
713KB
-
MD5
4e3d4f5356be34977d5660cefbb5d150
-
SHA1
f920e41c07f2c079085c307e131c66cee8bb9824
-
SHA256
19d84c93d3a8f8e201de408a80fd436acdfa01d0659619510f69459aa8266323
-
SHA512
329bdfc2e13dfd91167c1cba3287bb336881e63823a0441b818e535e395a8f05d1a8257cd926956ce21bdfe0c05fd4539d7c1e7399fc7b5d01a43f81968dd12e
-
SSDEEP
12288:u4IXhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy45p:ufnAw2WWeFcfbP9VPSPMTSPL/rWvzq4R
Malware Config
Extracted
darkcomet
Guest16_min
hackerlua.zapto.org:4444
DCMIN_MUTEX-BD66R76
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
K1rJHsoCQpfG
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
DarkComet RAT
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\DCSCMIN\\IMDCSC.exe" AS.EXE -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 4e3d4f5356be34977d5660cefbb5d150.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation AS.EXE -
Executes dropped EXE 2 IoCs
pid Process 4816 AS.EXE 3876 IMDCSC.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DarkComet RAT = "C:\\Users\\Admin\\Documents\\DCSCMIN\\IMDCSC.exe" AS.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4816 AS.EXE Token: SeSecurityPrivilege 4816 AS.EXE Token: SeTakeOwnershipPrivilege 4816 AS.EXE Token: SeLoadDriverPrivilege 4816 AS.EXE Token: SeSystemProfilePrivilege 4816 AS.EXE Token: SeSystemtimePrivilege 4816 AS.EXE Token: SeProfSingleProcessPrivilege 4816 AS.EXE Token: SeIncBasePriorityPrivilege 4816 AS.EXE Token: SeCreatePagefilePrivilege 4816 AS.EXE Token: SeBackupPrivilege 4816 AS.EXE Token: SeRestorePrivilege 4816 AS.EXE Token: SeShutdownPrivilege 4816 AS.EXE Token: SeDebugPrivilege 4816 AS.EXE Token: SeSystemEnvironmentPrivilege 4816 AS.EXE Token: SeChangeNotifyPrivilege 4816 AS.EXE Token: SeRemoteShutdownPrivilege 4816 AS.EXE Token: SeUndockPrivilege 4816 AS.EXE Token: SeManageVolumePrivilege 4816 AS.EXE Token: SeImpersonatePrivilege 4816 AS.EXE Token: SeCreateGlobalPrivilege 4816 AS.EXE Token: 33 4816 AS.EXE Token: 34 4816 AS.EXE Token: 35 4816 AS.EXE Token: 36 4816 AS.EXE Token: SeIncreaseQuotaPrivilege 3876 IMDCSC.exe Token: SeSecurityPrivilege 3876 IMDCSC.exe Token: SeTakeOwnershipPrivilege 3876 IMDCSC.exe Token: SeLoadDriverPrivilege 3876 IMDCSC.exe Token: SeSystemProfilePrivilege 3876 IMDCSC.exe Token: SeSystemtimePrivilege 3876 IMDCSC.exe Token: SeProfSingleProcessPrivilege 3876 IMDCSC.exe Token: SeIncBasePriorityPrivilege 3876 IMDCSC.exe Token: SeCreatePagefilePrivilege 3876 IMDCSC.exe Token: SeBackupPrivilege 3876 IMDCSC.exe Token: SeRestorePrivilege 3876 IMDCSC.exe Token: SeShutdownPrivilege 3876 IMDCSC.exe Token: SeDebugPrivilege 3876 IMDCSC.exe Token: SeSystemEnvironmentPrivilege 3876 IMDCSC.exe Token: SeChangeNotifyPrivilege 3876 IMDCSC.exe Token: SeRemoteShutdownPrivilege 3876 IMDCSC.exe Token: SeUndockPrivilege 3876 IMDCSC.exe Token: SeManageVolumePrivilege 3876 IMDCSC.exe Token: SeImpersonatePrivilege 3876 IMDCSC.exe Token: SeCreateGlobalPrivilege 3876 IMDCSC.exe Token: 33 3876 IMDCSC.exe Token: 34 3876 IMDCSC.exe Token: 35 3876 IMDCSC.exe Token: 36 3876 IMDCSC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3876 IMDCSC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2512 wrote to memory of 4816 2512 4e3d4f5356be34977d5660cefbb5d150.exe 91 PID 2512 wrote to memory of 4816 2512 4e3d4f5356be34977d5660cefbb5d150.exe 91 PID 2512 wrote to memory of 4816 2512 4e3d4f5356be34977d5660cefbb5d150.exe 91 PID 4816 wrote to memory of 3876 4816 AS.EXE 92 PID 4816 wrote to memory of 3876 4816 AS.EXE 92 PID 4816 wrote to memory of 3876 4816 AS.EXE 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e3d4f5356be34977d5660cefbb5d150.exe"C:\Users\Admin\AppData\Local\Temp\4e3d4f5356be34977d5660cefbb5d150.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\AS.EXE"C:\Users\Admin\AppData\Local\Temp\AS.EXE"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
660KB
MD5d0216ec3d286dbefe7c39b55e80db00b
SHA1df25fbc81dda5467cf95a504c8a1b61f5a8fc992
SHA256d9013b4fe771be8f5556bf94e803a8cb20c5598a026e9c3b062a8f4afea38423
SHA512ed64e68354d0277d286fb8dc3aeba7d06bee60bd0b5844f306216a960a0d47a3eb05c525d14288af6a44b199823190e1bab7337a40671ab9a67016de6d392fb1