Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/01/2024, 01:50

General

  • Target

    6c0abc8280a103572f14d9b665c25351.exe

  • Size

    236KB

  • MD5

    6c0abc8280a103572f14d9b665c25351

  • SHA1

    a4a95a532717bcfcb3a09640568b7da1133bbecb

  • SHA256

    18dd3f360bd67de6ffc11ae40ef90bfaea57660b61c541babc459e125ea55352

  • SHA512

    645a5d0ed9bc9f224cb88d469ef47c9f355f4570a1349155fa33cbc3ab4b10e32b2e4dcb2bdbc955444091d6758d6f430353bc2a842484bd090482e3af4bf2f3

  • SSDEEP

    6144:ZS9QWrvbXjEN5IngAtra+6/747Ko6RI6z:ZS9Vv7gSraB7qKS

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c0abc8280a103572f14d9b665c25351.exe
    "C:\Users\Admin\AppData\Local\Temp\6c0abc8280a103572f14d9b665c25351.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:888
    • C:\Windows\SysWOW64\notepad.exe
      notepad
      2⤵
      • Adds Run key to start application
      PID:4840
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Checks BIOS information in registry
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:864

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Windupdt\winupdate.exe

          Filesize

          236KB

          MD5

          6c0abc8280a103572f14d9b665c25351

          SHA1

          a4a95a532717bcfcb3a09640568b7da1133bbecb

          SHA256

          18dd3f360bd67de6ffc11ae40ef90bfaea57660b61c541babc459e125ea55352

          SHA512

          645a5d0ed9bc9f224cb88d469ef47c9f355f4570a1349155fa33cbc3ab4b10e32b2e4dcb2bdbc955444091d6758d6f430353bc2a842484bd090482e3af4bf2f3

        • memory/864-11-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB

        • memory/864-13-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB

        • memory/864-12-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB

        • memory/864-14-0x0000000002CD0000-0x0000000002CD1000-memory.dmp

          Filesize

          4KB

        • memory/864-16-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB

        • memory/864-15-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB

        • memory/864-17-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB

        • memory/888-0-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB

        • memory/888-1-0x00000000027C0000-0x00000000027C1000-memory.dmp

          Filesize

          4KB

        • memory/888-10-0x0000000013140000-0x00000000131FF000-memory.dmp

          Filesize

          764KB

        • memory/4840-3-0x00000000007D0000-0x00000000007D1000-memory.dmp

          Filesize

          4KB