Analysis

  • max time kernel
    0s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 13:44

General

  • Target

    387e8c87ac61853543b43747feff0897.exe

  • Size

    515KB

  • MD5

    387e8c87ac61853543b43747feff0897

  • SHA1

    6505a260581d6d78b3c8ca0501b56e266ac25d4f

  • SHA256

    23ff4eb48f2c98a3868ee8abbfcd28427f877864759e0d84c82895b51f78e8d0

  • SHA512

    5451d60875562cf41bcdd703edd7a1efde19b1ed86f7a78f69a52e8d05b34b437e9704ed1c576d54e364c55a66274922f09138d220d30d675c17418967a16e29

  • SSDEEP

    12288:wf2QkXEU9Nha3ZqyBPoMrliN/ddRAe8CT:QxeEo+LBPorzRAe7T

Malware Config

Extracted

Family

darkcomet

Botnet

DC

C2

rsguide.no-ip.biz:1604

Mutex

DC_MUTEX-9USF8JU

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    RvWB7ovy3Ji4

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    rundll32

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\387e8c87ac61853543b43747feff0897.exe
    "C:\Users\Admin\AppData\Local\Temp\387e8c87ac61853543b43747feff0897.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Users\Admin\AppData\Local\Temp\RSbot.exe
      "C:\Users\Admin\AppData\Local\Temp\RSbot.exe"
      2⤵
        PID:2756
        • C:\Users\Admin\AppData\Roaming\Microsoft\WinUpdater.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\WinUpdater.exe"
          3⤵
            PID:1704
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          C:\Users\Admin\AppData\Local\Temp\svchost.exe
          2⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          PID:2396
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\j.vbs"
          2⤵
            PID:1856
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
          1⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:2596
        • C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe
          "C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"
          1⤵
            PID:2628
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Users\Admin\AppData\Local\Temp\svchost.exe" +s +h
            1⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:2652
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
            1⤵
              PID:2632
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\svchost.exe" +s +h
              1⤵
                PID:2760

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • memory/1428-2-0x0000000000590000-0x00000000005D0000-memory.dmp

                      Filesize

                      256KB

                    • memory/1428-1-0x0000000074950000-0x0000000074EFB000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1428-0-0x0000000074950000-0x0000000074EFB000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1428-3-0x0000000000590000-0x00000000005D0000-memory.dmp

                      Filesize

                      256KB

                    • memory/1428-58-0x0000000074950000-0x0000000074EFB000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1428-60-0x0000000000590000-0x00000000005D0000-memory.dmp

                      Filesize

                      256KB

                    • memory/1428-42-0x0000000000590000-0x00000000005D0000-memory.dmp

                      Filesize

                      256KB

                    • memory/1428-67-0x0000000074950000-0x0000000074EFB000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1704-70-0x000007FEF5CA0000-0x000007FEF663D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/1704-68-0x0000000000AA0000-0x0000000000B20000-memory.dmp

                      Filesize

                      512KB

                    • memory/1704-71-0x0000000000AA0000-0x0000000000B20000-memory.dmp

                      Filesize

                      512KB

                    • memory/1704-72-0x000007FEF5CA0000-0x000007FEF663D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/1704-56-0x000007FEF5CA0000-0x000007FEF663D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/1704-73-0x0000000000AA0000-0x0000000000B20000-memory.dmp

                      Filesize

                      512KB

                    • memory/1704-59-0x000007FEF5CA0000-0x000007FEF663D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/1704-57-0x0000000000AA0000-0x0000000000B20000-memory.dmp

                      Filesize

                      512KB

                    • memory/2396-18-0x0000000000400000-0x00000000004B2000-memory.dmp

                      Filesize

                      712KB

                    • memory/2396-28-0x0000000000400000-0x00000000004B2000-memory.dmp

                      Filesize

                      712KB

                    • memory/2396-14-0x0000000000400000-0x00000000004B2000-memory.dmp

                      Filesize

                      712KB

                    • memory/2396-12-0x0000000000400000-0x00000000004B2000-memory.dmp

                      Filesize

                      712KB

                    • memory/2396-10-0x0000000000400000-0x00000000004B2000-memory.dmp

                      Filesize

                      712KB

                    • memory/2396-8-0x0000000000400000-0x00000000004B2000-memory.dmp

                      Filesize

                      712KB

                    • memory/2396-20-0x0000000000400000-0x00000000004B2000-memory.dmp

                      Filesize

                      712KB

                    • memory/2396-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                      Filesize

                      4KB

                    • memory/2396-24-0x0000000000400000-0x00000000004B2000-memory.dmp

                      Filesize

                      712KB

                    • memory/2396-16-0x0000000000400000-0x00000000004B2000-memory.dmp

                      Filesize

                      712KB

                    • memory/2396-11-0x0000000000400000-0x00000000004B2000-memory.dmp

                      Filesize

                      712KB

                    • memory/2396-52-0x0000000000400000-0x00000000004B2000-memory.dmp

                      Filesize

                      712KB

                    • memory/2396-29-0x0000000000270000-0x0000000000271000-memory.dmp

                      Filesize

                      4KB

                    • memory/2396-26-0x0000000000400000-0x00000000004B2000-memory.dmp

                      Filesize

                      712KB

                    • memory/2756-47-0x000007FEF5CA0000-0x000007FEF663D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2756-45-0x000007FEF5CA0000-0x000007FEF663D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2756-43-0x0000000000980000-0x0000000000A00000-memory.dmp

                      Filesize

                      512KB

                    • memory/2756-55-0x000007FEF5CA0000-0x000007FEF663D000-memory.dmp

                      Filesize

                      9.6MB