Analysis

  • max time kernel
    51s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2024, 02:22

General

  • Target

    3fa712fa1f5fd57eeceaadfe61e4caa9.exe

  • Size

    691KB

  • MD5

    3fa712fa1f5fd57eeceaadfe61e4caa9

  • SHA1

    2c34c4c3ee37493af7e130023c69dbc6829b0cff

  • SHA256

    4055f66b00029901a2c4d135c126185bbabf7393e06e24b4fbc183cfce4406ec

  • SHA512

    b8ef4a5f96ca3f99e2acb15f7e0d70b3d0e1a9f02875a6c15df760ef934a4589a04db7e409f359d594d579df4bf57cca75d5b66f61fbfb99704e42f98063eb9d

  • SSDEEP

    12288:wxeC6+2dW+m5XwneFYCMFY7vEwYadHT/VGyE4Q661qlVoULVsBu:kQ8we/AYiadHMa61qlVsU

Malware Config

Extracted

Family

darkcomet

Botnet

Slaves

C2

ratrololol.no-ip.biz:1604

Mutex

DC_MUTEX-4TN56C8

Attributes
  • gencode

    eoH57CKDnAQ1

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fa712fa1f5fd57eeceaadfe61e4caa9.exe
    "C:\Users\Admin\AppData\Local\Temp\3fa712fa1f5fd57eeceaadfe61e4caa9.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\SysWOW64\notepad.exe
        notepad
        3⤵
          PID:2676
      • C:\Windows\SysWOW64\cmd.exe
        "cmd"
        2⤵
        • NTFS ADS
        PID:2160
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        2⤵
        • Adds Run key to start application
        • Suspicious use of SetWindowsHookEx
        PID:2884

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\fp.txt

      Filesize

      70B

      MD5

      c26ae3314265abcaeb8e4329912a9925

      SHA1

      94abaa02240eec2798ef7bbffc417f90e523595b

      SHA256

      370c4bd674dee18edde2cd8e28441353c58d73a71e848c02ee739eb3a709a5ef

      SHA512

      17116763b0a31419f958af521463eee07fbc0b6dd7eb55c14021f42cff5bf329029d0872fb7de92b1d3ea19ede5df03d66fbc729d96a406552c1ab744da90ce8

    • memory/2652-2-0x0000000000D60000-0x0000000000DA0000-memory.dmp

      Filesize

      256KB

    • memory/2652-1-0x0000000074D20000-0x00000000752CB000-memory.dmp

      Filesize

      5.7MB

    • memory/2652-0-0x0000000074D20000-0x00000000752CB000-memory.dmp

      Filesize

      5.7MB

    • memory/2652-44-0x0000000074D20000-0x00000000752CB000-memory.dmp

      Filesize

      5.7MB

    • memory/2676-77-0x00000000003E0000-0x00000000003E1000-memory.dmp

      Filesize

      4KB

    • memory/2676-48-0x00000000000B0000-0x00000000000B1000-memory.dmp

      Filesize

      4KB

    • memory/2884-14-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2884-8-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2884-6-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2884-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2884-16-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2884-4-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2884-24-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2884-20-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/3020-42-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB

    • memory/3020-34-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB

    • memory/3020-32-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB

    • memory/3020-31-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB

    • memory/3020-30-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB

    • memory/3020-28-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB

    • memory/3020-26-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB

    • memory/3020-36-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB

    • memory/3020-43-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB

    • memory/3020-46-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB

    • memory/3020-47-0x0000000000290000-0x0000000000291000-memory.dmp

      Filesize

      4KB

    • memory/3020-78-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB

    • memory/3020-45-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB

    • memory/3020-38-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB

    • memory/3020-82-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB