Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    21/01/2024, 01:50

General

  • Target

    6c0abc8280a103572f14d9b665c25351.exe

  • Size

    236KB

  • MD5

    6c0abc8280a103572f14d9b665c25351

  • SHA1

    a4a95a532717bcfcb3a09640568b7da1133bbecb

  • SHA256

    18dd3f360bd67de6ffc11ae40ef90bfaea57660b61c541babc459e125ea55352

  • SHA512

    645a5d0ed9bc9f224cb88d469ef47c9f355f4570a1349155fa33cbc3ab4b10e32b2e4dcb2bdbc955444091d6758d6f430353bc2a842484bd090482e3af4bf2f3

  • SSDEEP

    6144:ZS9QWrvbXjEN5IngAtra+6/747Ko6RI6z:ZS9Vv7gSraB7qKS

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c0abc8280a103572f14d9b665c25351.exe
    "C:\Users\Admin\AppData\Local\Temp\6c0abc8280a103572f14d9b665c25351.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Windows\SysWOW64\notepad.exe
      notepad
      2⤵
      • Adds Run key to start application
      PID:2364
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Checks BIOS information in registry
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:2864

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2364-3-0x00000000000C0000-0x00000000000C1000-memory.dmp

          Filesize

          4KB

        • memory/2364-34-0x0000000000830000-0x0000000000831000-memory.dmp

          Filesize

          4KB

        • memory/2864-41-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB

        • memory/2864-37-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB

        • memory/2864-39-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2864-44-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB

        • memory/2864-46-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB

        • memory/2864-45-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB

        • memory/2864-47-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB

        • memory/2864-49-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB

        • memory/2864-48-0x0000000000170000-0x0000000000171000-memory.dmp

          Filesize

          4KB

        • memory/2864-50-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB

        • memory/2876-1-0x00000000002E0000-0x00000000002E1000-memory.dmp

          Filesize

          4KB

        • memory/2876-0-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB

        • memory/2876-43-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB