Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2024 19:18

General

  • Target

    3da8f6a6e578e2e4a1197cf598aafdac.exe

  • Size

    1.4MB

  • MD5

    3da8f6a6e578e2e4a1197cf598aafdac

  • SHA1

    a655c05a5703f2288ba80aee97e6fc79e1727f33

  • SHA256

    1ad1481cafa95257df237f59f60272ce33d5005f208d7ed61146ae755792473a

  • SHA512

    85786c5df0f6eda252e2d82596d7f64e490dc4deb38367b84cc879e76e7232791eea5859dc1e1d35d2555d8a7e3459ae2643d9a71413bde0de05b1d474bb5ce4

  • SSDEEP

    24576:PXwwIoym3/BDp0tOllNRviWXSY09R1s/vwUMa5c6:PXwwIo5vBGkLCYCSJ5c

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3da8f6a6e578e2e4a1197cf598aafdac.exe
    "C:\Users\Admin\AppData\Local\Temp\3da8f6a6e578e2e4a1197cf598aafdac.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Windows\SysWOW64\notepad.exe
      notepad
      2⤵
      • Adds Run key to start application
      PID:2080
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2592
    • C:\Windupdt\winupdate.exe
      "C:\Windupdt\winupdate.exe"
      2⤵
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2964
    • C:\Windows\SysWOW64\notepad.exe
      C:\Windows\SysWOW64\notepad.exe
      2⤵
      • Deletes itself
      PID:1776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windupdt\winupdate.exe

    Filesize

    92KB

    MD5

    53fb487379f9bad56a4edcb6596cbe42

    SHA1

    e619a13cea5e885443b859595a9f14a51cd7fac0

    SHA256

    de7a6452ba060d48c5c443a12824b2f08079716efef1184780cddc95fe7cd23b

    SHA512

    8b1e4b27bf8f731af4e4f180cab6a81a7f4b12c18c1661cce2331f1bed46821cdb100a9f3990579986d2db9925c608263bac9bfc49f9c514d472f80478cb0f4f

  • memory/1776-108-0x0000000001BE0000-0x0000000001BE1000-memory.dmp

    Filesize

    4KB

  • memory/2080-18-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/2080-40-0x0000000000430000-0x0000000000431000-memory.dmp

    Filesize

    4KB

  • memory/2528-6-0x0000000003FD0000-0x0000000003FD1000-memory.dmp

    Filesize

    4KB

  • memory/2528-4-0x0000000003DE0000-0x0000000003DE2000-memory.dmp

    Filesize

    8KB

  • memory/2528-12-0x0000000003EA0000-0x0000000003EA1000-memory.dmp

    Filesize

    4KB

  • memory/2528-10-0x0000000003E90000-0x0000000003E91000-memory.dmp

    Filesize

    4KB

  • memory/2528-9-0x0000000003F00000-0x0000000003F01000-memory.dmp

    Filesize

    4KB

  • memory/2528-8-0x0000000003F60000-0x0000000003F61000-memory.dmp

    Filesize

    4KB

  • memory/2528-7-0x0000000003EF0000-0x0000000003EF1000-memory.dmp

    Filesize

    4KB

  • memory/2528-0-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2528-5-0x0000000003DD0000-0x0000000003DD1000-memory.dmp

    Filesize

    4KB

  • memory/2528-13-0x0000000003EE0000-0x0000000003EE1000-memory.dmp

    Filesize

    4KB

  • memory/2528-3-0x0000000003DC0000-0x0000000003DC1000-memory.dmp

    Filesize

    4KB

  • memory/2528-2-0x0000000003E20000-0x0000000003E21000-memory.dmp

    Filesize

    4KB

  • memory/2528-16-0x0000000003F50000-0x0000000003F51000-memory.dmp

    Filesize

    4KB

  • memory/2528-44-0x0000000003E00000-0x0000000003E01000-memory.dmp

    Filesize

    4KB

  • memory/2528-43-0x0000000003E10000-0x0000000003E11000-memory.dmp

    Filesize

    4KB

  • memory/2528-14-0x0000000003D10000-0x0000000003D11000-memory.dmp

    Filesize

    4KB

  • memory/2528-15-0x0000000003ED0000-0x0000000003ED1000-memory.dmp

    Filesize

    4KB

  • memory/2528-11-0x0000000003F70000-0x0000000003F71000-memory.dmp

    Filesize

    4KB

  • memory/2528-107-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2528-1-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-80-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-64-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-54-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-57-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-56-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-60-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-63-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-68-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-70-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-75-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-78-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-159-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-155-0x0000000002260000-0x0000000002261000-memory.dmp

    Filesize

    4KB

  • memory/2592-87-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-89-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-51-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-72-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-50-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-156-0x0000000002250000-0x0000000002251000-memory.dmp

    Filesize

    4KB

  • memory/2592-49-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-47-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2592-157-0x0000000002DF0000-0x0000000002DF2000-memory.dmp

    Filesize

    8KB

  • memory/2592-45-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-71-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-69-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-67-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-66-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-52-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-62-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-61-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-59-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-58-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-55-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-53-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-117-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2592-140-0x00000000020A0000-0x00000000020A1000-memory.dmp

    Filesize

    4KB

  • memory/2592-141-0x0000000001F00000-0x0000000001F01000-memory.dmp

    Filesize

    4KB

  • memory/2592-142-0x0000000001F60000-0x0000000001F62000-memory.dmp

    Filesize

    8KB

  • memory/2592-143-0x0000000001F50000-0x0000000001F51000-memory.dmp

    Filesize

    4KB

  • memory/2592-144-0x00000000025C0000-0x00000000025C1000-memory.dmp

    Filesize

    4KB

  • memory/2592-145-0x0000000002270000-0x0000000002271000-memory.dmp

    Filesize

    4KB

  • memory/2592-146-0x00000000024D0000-0x00000000024D1000-memory.dmp

    Filesize

    4KB

  • memory/2592-147-0x0000000002D80000-0x0000000002D82000-memory.dmp

    Filesize

    8KB

  • memory/2592-148-0x00000000022C0000-0x00000000022C1000-memory.dmp

    Filesize

    4KB

  • memory/2592-149-0x0000000001FF0000-0x0000000001FF1000-memory.dmp

    Filesize

    4KB

  • memory/2592-150-0x0000000002160000-0x0000000002161000-memory.dmp

    Filesize

    4KB

  • memory/2592-151-0x00000000024E0000-0x00000000024E1000-memory.dmp

    Filesize

    4KB

  • memory/2592-152-0x00000000024C0000-0x00000000024C1000-memory.dmp

    Filesize

    4KB

  • memory/2592-153-0x0000000000520000-0x0000000000521000-memory.dmp

    Filesize

    4KB

  • memory/2592-154-0x00000000025B0000-0x00000000025B1000-memory.dmp

    Filesize

    4KB

  • memory/2964-106-0x0000000003F50000-0x0000000003F52000-memory.dmp

    Filesize

    8KB

  • memory/2964-105-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2964-86-0x0000000000410000-0x0000000000582000-memory.dmp

    Filesize

    1.4MB

  • memory/2964-84-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2964-160-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB

  • memory/2964-162-0x0000000013140000-0x00000000132B2000-memory.dmp

    Filesize

    1.4MB