Analysis

  • max time kernel
    144s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 04:10

General

  • Target

    a0e9c48de4b99b90d67b003e9e159447.exe

  • Size

    1.2MB

  • MD5

    a0e9c48de4b99b90d67b003e9e159447

  • SHA1

    b2d59745cdf8b1aa44e46f8ae0857aca4dfb4368

  • SHA256

    ad10bd209a0400769c98b80be60c4eb4962731830d374e7f76ba3455d92c7e67

  • SHA512

    3c6a5cb1b53dbc504f8f49aedd44daa5d9b167072b4dce8ad0a970255d9648e8e0d1b59721fec93c7fec34544aa4b770834309c0dc287f4dd6e94dc945da0b8f

  • SSDEEP

    12288:SF1bx4wVjyTavQOtx7dFXrrnYvIGIFyhLFbSl/WnLqIioAneMnFuCwvbHODHxfuK:SRyG9hdBGol/WOdpruIQIWAGSTDCNM3

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0e9c48de4b99b90d67b003e9e159447.exe
    "C:\Users\Admin\AppData\Local\Temp\a0e9c48de4b99b90d67b003e9e159447.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\AppData\Local\Temp\vbc.exe
      C:\Users\Admin\AppData\Local\Temp\vbc.exe
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Users\Admin\AppData\Local\Temp\a0e9c48de4b99b90d67b003e9e159447.exe"
        3⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:2580
      • C:\Windupdt\winupdate.exe
        "C:\Windupdt\winupdate.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2464
  • C:\Windows\SysWOW64\PING.EXE
    ping 127.0.0.1 -n 5
    1⤵
    • Runs ping.exe
    PID:1452
  • C:\Users\Admin\AppData\Local\Temp\vbc.exe
    C:\Users\Admin\AppData\Local\Temp\vbc.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2556

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\vbc.exe

          Filesize

          64KB

          MD5

          fad38e27c34fe8326760d0a671c90df6

          SHA1

          69704cd33db8fa242e41af632e7a4da46497e40d

          SHA256

          9fc9dd394fb27ddab47e22dbbc76b0a644043ad9a818fb4f339134c429cae394

          SHA512

          818a6833e1a57cd54e325a344cf1719311009853b506475eb319be951c56cbe5b9193446b3d8e59b6fd41d2bd37ee196bbeb08dba4b2980e727d2dcbc9e0f1f6

        • C:\Users\Admin\AppData\Local\Temp\vbc.exe

          Filesize

          704KB

          MD5

          0976f2ca37196e8541e5244f0d0cf5a1

          SHA1

          ad103a93d9428c082624a44cde505d8c94d87a26

          SHA256

          8be138c97a705884740cd2e8077b9f6ec5b9dab6b37643d04a122f0856100a8f

          SHA512

          53f6d0e2391952fb60a9ea061893fa85a8f6ca8b07fc5546f2643e83edc5e0ebf3d6266b0ee770f35ed1371d90bdafa0845b09c631c018a5202b29502aa20a18

        • C:\Windupdt\winupdate.exe

          Filesize

          1.2MB

          MD5

          a0e9c48de4b99b90d67b003e9e159447

          SHA1

          b2d59745cdf8b1aa44e46f8ae0857aca4dfb4368

          SHA256

          ad10bd209a0400769c98b80be60c4eb4962731830d374e7f76ba3455d92c7e67

          SHA512

          3c6a5cb1b53dbc504f8f49aedd44daa5d9b167072b4dce8ad0a970255d9648e8e0d1b59721fec93c7fec34544aa4b770834309c0dc287f4dd6e94dc945da0b8f

        • \Users\Admin\AppData\Local\Temp\vbc.exe

          Filesize

          1.1MB

          MD5

          5ff2482aaf89a0abae4bbc81d3472568

          SHA1

          39b9ccc060292cf4968e5154d8e6c7ec0c5b9596

          SHA256

          1489b71d830b774f0edf3e8d4422018c107e4505bbf7e71d199e42709ab45162

          SHA512

          87471d6f0f3503d064ceb5cf7df6d1ac0a24c537eed2b850eb2e48388253ebc11f2b05fbf77aa6328fcb9c07a3765489d2c0681e6a829f547e711195094f525f

        • \Users\Admin\AppData\Local\Temp\vbc.exe

          Filesize

          1004KB

          MD5

          fe6e8f9736bade905e66447436520126

          SHA1

          742bb436bc2c22df57948b6919d483435821adc1

          SHA256

          c9cf89a758ef4b6efd2ac2d60dcae59c2f781b9689b73dc803721980785204ed

          SHA512

          f9fc7f179c574b9057456bffb3ee79db94d5a616a35cae1f1c45ffb2de9a91edc876bb7ea8484a3923137c1169e8928e51589c9e7cef72880c971d2ad68294e8

        • \Users\Admin\AppData\Local\Temp\vbc.exe

          Filesize

          1.1MB

          MD5

          34aa912defa18c2c129f1e09d75c1d7e

          SHA1

          9c3046324657505a30ecd9b1fdb46c05bde7d470

          SHA256

          6df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386

          SHA512

          d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98

        • \Windupdt\winupdate.exe

          Filesize

          819KB

          MD5

          d13a77ebead844bcbcdf7b4623b83630

          SHA1

          20a775519e6eb7ccab6ff7099b1c5c329454ee29

          SHA256

          5b23a90796158c1ac01a17ec35a395f34dabe27617fe759d77b594d9ab27d55b

          SHA512

          2dfeb7cd3494439922a91033c314977e7997e7755b4e0ceb526a5e9571a37893eb6796c8f3bb3c0a3920c9bdd215e27cb03e293c09246234e4c87ce37b41defe

        • \Windupdt\winupdate.exe

          Filesize

          775KB

          MD5

          4d7d2d8248e5d5b317067aceeb969a80

          SHA1

          4d07db171f84dff1469efb5d723ed8ce722d7884

          SHA256

          0b4c2ede50b8a3f2edcc7a56d35d43d6f669b7e3e88327566a2477e71415c713

          SHA512

          59db8335883131e1ddb5122af7fbac62f7735100e46130683a0151aa5fb68c3f45c538c7aa711ee70c60dde90af38a1b10eb27c5f8f9eb01c92478a742510255

        • \Windupdt\winupdate.exe

          Filesize

          760KB

          MD5

          314c5e16e371ba1c762eecb3fd657d62

          SHA1

          fdd60c9406b7bc3dd6bea3d18ddd735f8a51457e

          SHA256

          cd8f901783c414ddc4717a2de27e261f707708884b23ab943d7f1a418cf66cb6

          SHA512

          a68e6ab2ef10acd6ce5cfcf8c6570b91060552d4e1d7516537fdafb8c6243e7c7749e91636be7590c965390bbf2d14884d6f6ce9f382a41ec7199623f18f3cd0

        • memory/756-33-0x0000000074960000-0x0000000074F0B000-memory.dmp

          Filesize

          5.7MB

        • memory/756-2-0x0000000002030000-0x0000000002070000-memory.dmp

          Filesize

          256KB

        • memory/756-0-0x0000000074960000-0x0000000074F0B000-memory.dmp

          Filesize

          5.7MB

        • memory/756-1-0x0000000074960000-0x0000000074F0B000-memory.dmp

          Filesize

          5.7MB

        • memory/1636-21-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1636-11-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1636-23-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1636-32-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1636-28-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1636-34-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1636-35-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1636-36-0x0000000000290000-0x0000000000291000-memory.dmp

          Filesize

          4KB

        • memory/1636-25-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1636-19-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1636-7-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1636-48-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1636-17-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1636-15-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1636-13-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1636-27-0x0000000000010000-0x0000000000011000-memory.dmp

          Filesize

          4KB

        • memory/1636-9-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/2464-53-0x0000000072980000-0x0000000072F2B000-memory.dmp

          Filesize

          5.7MB

        • memory/2464-60-0x0000000072980000-0x0000000072F2B000-memory.dmp

          Filesize

          5.7MB

        • memory/2464-85-0x0000000072980000-0x0000000072F2B000-memory.dmp

          Filesize

          5.7MB

        • memory/2556-86-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/2556-83-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/2556-78-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/2556-71-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2556-84-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/2556-87-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/2556-88-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/2556-89-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/2556-90-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/2556-91-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB