Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 12:09

General

  • Target

    74a9f7ac76250c6eb9d0c674a4249c92.exe

  • Size

    426KB

  • MD5

    74a9f7ac76250c6eb9d0c674a4249c92

  • SHA1

    8c544f4df935bbb9c13e8c88359497f134e47abd

  • SHA256

    45f13c2ef9560816343176cce689c89e8a1fcd48e021b71093b56d19cb3c947b

  • SHA512

    e4476f5c1792f9361ee5f53968b3f1abbd8b012c3f0cc47580565a54b5b41d12edb29aa0cd4fbe5e08e7d20a1175b891c37e58fa908aa5737c84cbb8bbdb2d25

  • SSDEEP

    12288:6Tij6aV7gcz/cWCrR46sYjtyW3Ydi7N0+u21j6c769k:66lNcWCtpsYjtyOwgF1OK6W

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

basel1234.no-ip.biz:81

Mutex

DC_MUTEX-F54S21D

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    LSspVhv0MBT2

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74a9f7ac76250c6eb9d0c674a4249c92.exe
    "C:\Users\Admin\AppData\Local\Temp\74a9f7ac76250c6eb9d0c674a4249c92.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Admin\AppData\Local\Temp\74a9f7ac76250c6eb9d0c674a4249c92.exe
      C:\Users\Admin\AppData\Local\Temp\74a9f7ac76250c6eb9d0c674a4249c92.exe
      2⤵
      • Modifies WinLogon for persistence
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
        "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2920
        • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
          C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\Documents\MSDCSC\msdcsc.exe

    Filesize

    426KB

    MD5

    74a9f7ac76250c6eb9d0c674a4249c92

    SHA1

    8c544f4df935bbb9c13e8c88359497f134e47abd

    SHA256

    45f13c2ef9560816343176cce689c89e8a1fcd48e021b71093b56d19cb3c947b

    SHA512

    e4476f5c1792f9361ee5f53968b3f1abbd8b012c3f0cc47580565a54b5b41d12edb29aa0cd4fbe5e08e7d20a1175b891c37e58fa908aa5737c84cbb8bbdb2d25

  • memory/1652-2-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/1652-3-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/1652-5-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/1652-7-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/1652-15-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2360-4-0x0000000000400000-0x00000000006BE000-memory.dmp

    Filesize

    2.7MB

  • memory/2600-36-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2600-44-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2600-33-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2600-34-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2600-35-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2600-49-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2600-37-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2600-38-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2600-39-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2600-40-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2600-41-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2600-42-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2600-43-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2600-28-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2600-45-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2600-46-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2600-47-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2600-48-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2920-27-0x0000000000400000-0x00000000006BE000-memory.dmp

    Filesize

    2.7MB