Analysis

  • max time kernel
    154s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/01/2024, 16:07

General

  • Target

    680e9c3f35d592e5bb67970823e35252.exe

  • Size

    761KB

  • MD5

    680e9c3f35d592e5bb67970823e35252

  • SHA1

    02ee1040fba1b643d5d0e5ff9e5974269d6b8f66

  • SHA256

    14a6bd1c424617202ef7c0c2fd0110be91aa582d729b094a6c7313d8ebaac21b

  • SHA512

    8ba0c46e8582ae01e935e515e1100eb5f31f9fa82daea351ec41779cbc1ea40d62eea8ef832e84c9e4a8fc4001edd7df75c8ab06f89db7b052b6be78dc355bdf

  • SSDEEP

    12288:XikXBz7TsdZtk5QviGzWILqUsjDGQ1fTjw1/ICteJV2/Y/R468AWcga03U:M1K/IeUG/XwKCtiVCARH8ABl

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\680e9c3f35d592e5bb67970823e35252.exe
    "C:\Users\Admin\AppData\Local\Temp\680e9c3f35d592e5bb67970823e35252.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4688
    • C:\Users\Admin\AppData\Local\Temp\680e9c3f35d592e5bb67970823e35252.exe
      C:\Users\Admin\AppData\Local\Temp\680e9c3f35d592e5bb67970823e35252.exe
      2⤵
      • Modifies WinLogon for persistence
      • Checks computer location settings
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3088
      • C:\Windupdt\winupdate.exe
        "C:\Windupdt\winupdate.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5080
        • C:\Windupdt\winupdate.exe
          C:\Windupdt\winupdate.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:4316
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Users\Admin\AppData\Local\Temp\680e9c3f35d592e5bb67970823e35252.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1644
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          4⤵
          • Runs ping.exe
          PID:460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windupdt\winupdate.exe

    Filesize

    761KB

    MD5

    680e9c3f35d592e5bb67970823e35252

    SHA1

    02ee1040fba1b643d5d0e5ff9e5974269d6b8f66

    SHA256

    14a6bd1c424617202ef7c0c2fd0110be91aa582d729b094a6c7313d8ebaac21b

    SHA512

    8ba0c46e8582ae01e935e515e1100eb5f31f9fa82daea351ec41779cbc1ea40d62eea8ef832e84c9e4a8fc4001edd7df75c8ab06f89db7b052b6be78dc355bdf

  • C:\Windupdt\winupdate.exe

    Filesize

    640KB

    MD5

    1a250b56a5c9ed9da3d6f766c03e8d50

    SHA1

    4b379493a4017516668420e1a1e715d2613b1b0c

    SHA256

    a67ffc6a6ca9270eb2ad5bb716bfb9f22ab5d041766374be904683c96d74dec3

    SHA512

    0779310df9c1e1a33f03f66727aaf8c9a68198c2b28910aae9ba19937a02eccbfc295f565d92d642953614e2c562462f57a1d46c3fb62cceef37cc2e2cd231cf

  • C:\Windupdt\winupdate.exe

    Filesize

    384KB

    MD5

    43c1abbed1bde91f680f3676ab6b55d2

    SHA1

    142a284566294ec66f34cecffaaa90d5428ffc22

    SHA256

    168347e83ed4309e3f81dddb4e94b7d61069c6ea97ca664561a10b2eb3986714

    SHA512

    c8a48d271f5e66d1e91b358f43ff5421fd08c9e45f5435a317b2770dacee098f7ff2429f3ed530ef0cc7c73848ff1a19bbdf7e2fca40543421e8c98671df7fbe

  • memory/3088-70-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/3088-6-0x00000000024E0000-0x00000000024E1000-memory.dmp

    Filesize

    4KB

  • memory/3088-5-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/3088-4-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/3088-3-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/3088-2-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/4316-76-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/4316-75-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/4316-77-0x0000000002170000-0x0000000002171000-memory.dmp

    Filesize

    4KB

  • memory/4316-78-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/4316-79-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/4316-80-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/4316-81-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/4316-82-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/4316-84-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB