Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 04:10

General

  • Target

    a0e9c48de4b99b90d67b003e9e159447.exe

  • Size

    1.2MB

  • MD5

    a0e9c48de4b99b90d67b003e9e159447

  • SHA1

    b2d59745cdf8b1aa44e46f8ae0857aca4dfb4368

  • SHA256

    ad10bd209a0400769c98b80be60c4eb4962731830d374e7f76ba3455d92c7e67

  • SHA512

    3c6a5cb1b53dbc504f8f49aedd44daa5d9b167072b4dce8ad0a970255d9648e8e0d1b59721fec93c7fec34544aa4b770834309c0dc287f4dd6e94dc945da0b8f

  • SSDEEP

    12288:SF1bx4wVjyTavQOtx7dFXrrnYvIGIFyhLFbSl/WnLqIioAneMnFuCwvbHODHxfuK:SRyG9hdBGol/WOdpruIQIWAGSTDCNM3

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0e9c48de4b99b90d67b003e9e159447.exe
    "C:\Users\Admin\AppData\Local\Temp\a0e9c48de4b99b90d67b003e9e159447.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Users\Admin\AppData\Local\Temp\vbc.exe
      C:\Users\Admin\AppData\Local\Temp\vbc.exe
      2⤵
      • Modifies WinLogon for persistence
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3376
      • C:\Windupdt\winupdate.exe
        "C:\Windupdt\winupdate.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3960
        • C:\Users\Admin\AppData\Local\Temp\vbc.exe
          C:\Users\Admin\AppData\Local\Temp\vbc.exe
          4⤵
          • Modifies WinLogon for persistence
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1640
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Users\Admin\AppData\Local\Temp\vbc.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2080
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1 -n 5
              6⤵
              • Runs ping.exe
              PID:4176
          • C:\Windupdt\winupdate.exe
            "C:\Windupdt\winupdate.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2352
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Users\Admin\AppData\Local\Temp\a0e9c48de4b99b90d67b003e9e159447.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2296
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          4⤵
          • Runs ping.exe
          PID:1360
  • C:\Users\Admin\AppData\Local\Temp\vbc.exe
    C:\Users\Admin\AppData\Local\Temp\vbc.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3796

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\winupdate.exe.log

          Filesize

          411B

          MD5

          b75d63217c5d10a12e60be6d73af5e9a

          SHA1

          d25477a0a74ec499326e7db6c1f962f8fe77b818

          SHA256

          fa5feaf188800d777889d204daa15cff40715badfd65ddf0a818b9d130378e11

          SHA512

          07f390be438c0542b40984ce43b33aac495fe2eb7e564d415ed296783704fc6d3946eea24ec6c86a88e7a742c100c30e56a9c5e4d8eee2a5efe936126a615273

        • C:\Users\Admin\AppData\Local\Temp\vbc.exe

          Filesize

          261KB

          MD5

          d2b89a7355eec9db8b81c667cdbe59c7

          SHA1

          515f86ec82edef5ec4c8f0b848ac5eaf3179936c

          SHA256

          3dbca12e9080f871d6063679ed399911226f9e57b1d7a2bc99d0b4cc29944f17

          SHA512

          c2dab0d2125d0dd01c976028ae9ef0d65f16bf72da5dbf2037da93029b45702a89e6c79889dc567bfd853cadfb291e4ace8e6e34bdf55daef0652607fb44f787

        • C:\Users\Admin\AppData\Local\Temp\vbc.exe

          Filesize

          728KB

          MD5

          4bdb8d5d102bd82812b6fbec60522675

          SHA1

          cf4fd3f6b20d0f9fa41e87e88c6bfcb31a9df072

          SHA256

          a96d0268064e480fdc8b4cabc2c6928897853113d4b92b8d216d8af6d0fc0051

          SHA512

          3045d2ef16b67dc091c7096b9e36b3410f8ee9a8be64e93a81221bb7052f5f32b1b0a72e404a6d0f05f0a28548972e7150b3ffc1ce3dc484ad541861e725c2c0

        • C:\Users\Admin\AppData\Local\Temp\vbc.exe

          Filesize

          29KB

          MD5

          28f12f2d4cfbaa12636ac5997cbec643

          SHA1

          fbf0dd5de954424336d08c78b1d1011875d18f6c

          SHA256

          aef7f944b0293370e2f7d5ac93dc577662c22551fef1dc89a00d507c72b2b09a

          SHA512

          af8ac7fe677c88d2944a85da5ab3d4df180c4ca073a93f37e6c4254d87e878a7dc3ee29e7eb0baab4c65f1abdc9a328fbe1f6a1b76d5cbd26f87b4b6b7cf1c1b

        • C:\Users\Admin\AppData\Local\Temp\vbc.exe

          Filesize

          1.1MB

          MD5

          d881de17aa8f2e2c08cbb7b265f928f9

          SHA1

          08936aebc87decf0af6e8eada191062b5e65ac2a

          SHA256

          b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

          SHA512

          5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

        • C:\Users\Admin\AppData\Local\Temp\vbc.exe

          Filesize

          170KB

          MD5

          2a3e9aa7245e68e0eb8175e74beb84d2

          SHA1

          1af426b344a49d436decb70a822f2e708f8e8561

          SHA256

          262c2aa2dd3c02cf696703b26360534fac184175097445ccd82eeac6b47c09a1

          SHA512

          aaa0cf162779a076edad26145a4ec955b88c549aec6ae9af4b8b035dedefce4e625fbef4fc9383f7c3c34359cf8da8be34afc08957b1cb7fc251d998244f279b

        • C:\Windupdt\winupdate.exe

          Filesize

          1.2MB

          MD5

          a0e9c48de4b99b90d67b003e9e159447

          SHA1

          b2d59745cdf8b1aa44e46f8ae0857aca4dfb4368

          SHA256

          ad10bd209a0400769c98b80be60c4eb4962731830d374e7f76ba3455d92c7e67

          SHA512

          3c6a5cb1b53dbc504f8f49aedd44daa5d9b167072b4dce8ad0a970255d9648e8e0d1b59721fec93c7fec34544aa4b770834309c0dc287f4dd6e94dc945da0b8f

        • C:\Windupdt\winupdate.exe

          Filesize

          500KB

          MD5

          ff9200c2e0df48db171d84825431551f

          SHA1

          e72b57e16ee0a3b9c75ab22994a19b15c7c3e258

          SHA256

          537aaf8e44ff9b6e2561fcd93d9735c1c5e0237b7f7d1e583f18ef1e017cbbd2

          SHA512

          fa9837913afdedaff3c552d3cbb58312d7205843cfa2124f70dc53b7826812a1dba8a30495df4526909309ebe10c999b42fd00932fe4131842da820bfad25acc

        • C:\Windupdt\winupdate.exe

          Filesize

          320KB

          MD5

          0ffdefffb5e96f81c624239fb4f44d28

          SHA1

          65d62be92f134890a6bc2d58225575a0d8ebfa33

          SHA256

          ebab64d917773cfbd259b4d14434ef6f9a7e47e1c9d9432cf279d65e6bc98904

          SHA512

          2b6ca7d0adc518c699368f6ab1289c51baf69ff312ccbb67f6f2c9b3a02fe17c0da7a2f44c3c6fc88bf8ba9c3cfa2a6c56aae47ed600480ddee997ef15fb3d39

        • C:\Windupdt\winupdate.exe

          Filesize

          186KB

          MD5

          7792831cf3fa40859f7a72dbac89a3e0

          SHA1

          a6ac2e8db823c1bf8627ae6fbc4fe16303f2b41c

          SHA256

          f5b2636669c26cecf7742496bf69f5556c70fefad5e42fce76fd6bc4871dff11

          SHA512

          c861afa3085fe40e5cf9b9fa2f5a56759e3046cb9e82cc81eea2108b529f43b0daa21fffef82793e4131d953cfad7341023017b9bde23ae2df5cdc08b50e23ec

        • memory/1640-87-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1640-90-0x00000000022F0000-0x00000000022F1000-memory.dmp

          Filesize

          4KB

        • memory/1640-93-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1640-89-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/2352-106-0x00000000723A0000-0x0000000072951000-memory.dmp

          Filesize

          5.7MB

        • memory/2352-96-0x00000000723A0000-0x0000000072951000-memory.dmp

          Filesize

          5.7MB

        • memory/2352-98-0x00000000723A0000-0x0000000072951000-memory.dmp

          Filesize

          5.7MB

        • memory/2352-97-0x0000000001050000-0x0000000001060000-memory.dmp

          Filesize

          64KB

        • memory/2356-10-0x0000000074970000-0x0000000074F21000-memory.dmp

          Filesize

          5.7MB

        • memory/2356-1-0x0000000074970000-0x0000000074F21000-memory.dmp

          Filesize

          5.7MB

        • memory/2356-2-0x0000000000FD0000-0x0000000000FE0000-memory.dmp

          Filesize

          64KB

        • memory/2356-0-0x0000000074970000-0x0000000074F21000-memory.dmp

          Filesize

          5.7MB

        • memory/3376-11-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/3376-5-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/3376-12-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/3376-16-0x0000000002290000-0x0000000002291000-memory.dmp

          Filesize

          4KB

        • memory/3376-9-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/3376-75-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/3376-7-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/3796-108-0x00000000021B0000-0x00000000021B1000-memory.dmp

          Filesize

          4KB

        • memory/3796-105-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/3796-110-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/3796-109-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/3796-107-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/3796-104-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/3796-111-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/3796-113-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/3796-114-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/3960-76-0x00000000730C0000-0x0000000073671000-memory.dmp

          Filesize

          5.7MB

        • memory/3960-78-0x00000000730C0000-0x0000000073671000-memory.dmp

          Filesize

          5.7MB

        • memory/3960-79-0x0000000000B10000-0x0000000000B20000-memory.dmp

          Filesize

          64KB

        • memory/3960-88-0x00000000730C0000-0x0000000073671000-memory.dmp

          Filesize

          5.7MB