Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-03-2024 12:35

General

  • Target

    de065a8341b7a637be0107ceef17b4d7.exe

  • Size

    755KB

  • MD5

    de065a8341b7a637be0107ceef17b4d7

  • SHA1

    9587a1c776cb833f0b012930b473f88bd1363062

  • SHA256

    31a73247f851ee3026ea9d4037a210aa915d422dc6622e3df88af5b5b7e0579e

  • SHA512

    378d6c8f123283f3a29a59d8f97b121df1b7d5a5a468d1555ebd616c2a78309493d568e4db7b499601518c04467601e9fa4dc30a8191c472289ba15a6c3eb41a

  • SSDEEP

    12288:p5eGs/77oay7+D5y4eq6/Okz7+KP/GVHA/bORHPe59PW/b+LUM29yeI4SRcW:0UBaD44e5LP1bSenPN2OCW

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

142.4.223.94:443

Mutex

DC_MUTEX-2N3MUT2

Attributes
  • gencode

    tlBxLk56TrBk

  • install

    false

  • offline_keylogger

    true

  • password

    azerty123

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de065a8341b7a637be0107ceef17b4d7.exe
    "C:\Users\Admin\AppData\Local\Temp\de065a8341b7a637be0107ceef17b4d7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Users\Admin\AppData\Local\Temp\de065a8341b7a637be0107ceef17b4d7.exe
      "C:\Users\Admin\AppData\Local\Temp\de065a8341b7a637be0107ceef17b4d7.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Users\Admin\AppData\Roaming\Addblocke\addblocke.exe
        "C:\Users\Admin\AppData\Roaming\Addblocke\addblocke.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Users\Admin\AppData\Roaming\Addblocke\addblocke.exe
          "C:\Users\Admin\AppData\Roaming\Addblocke\addblocke.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2592
          • C:\Windows\SysWOW64\ipconfig.exe
            "C:\Windows\system32\ipconfig.exe"
            5⤵
            • Gathers network information
            • Suspicious use of WriteProcessMemory
            PID:1788
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\VBUEQ.bat" "
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1976
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Addblocke" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Addblocke\addblocke.exe" /f
                7⤵
                • Adds Run key to start application
                PID:348
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2596
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    336a669b2bf8337b89aa34f2315d7e97

    SHA1

    fba05906b4d752bf5da6f03c0fb4db4459bec4d2

    SHA256

    c9d65beed0af2b3939990d65fc86f25aa6b4c8b764ebb27fa903211c3fb21544

    SHA512

    97164992713789b1330afd80e2596e5959dbeb9f50ea2695052eb4e25875ede4ef1e6833afd2c6917b273380870fd22c17b287f8aad0f9084aa85d11461b9d50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    fb335839001042e77204e1ef11a85d2b

    SHA1

    0238365f5b3fc6053579ebbd038b3262542278f7

    SHA256

    e1bf11ae07d17bdf7efc81377d663bef5e69ef61b6dea175042ef385f261979f

    SHA512

    77d71edc5c068bf9d6ef97256ab7e3a8c9b2dc09760d25b2c48107b6cf0f51b7371e30657c8fab274b015ac5599640b0c0bd962d5b101135c5d8b6207d942dac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    73ca54a40cd6c38911d3e4b97a745697

    SHA1

    1746c4d30f657e5363b931526985ecb092f54c4a

    SHA256

    5f530a8c3df2b050daf71613dd028f059b710ec83b2aeb0d413f31ba78e53180

    SHA512

    a14a42b0e8a20205097c7e4c75574bbbd8a7982a7f016b5f9cf4af7e958b935f156355b8e1c68592bc3df85e50c6aad41f5dca59e2d3cc8caabe1db395b9fa4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    3af80b09b739c36e3279dde93288f1f1

    SHA1

    32751280ec9f613a32b889fb870686a50705b189

    SHA256

    14f0e1a895fc790c42abdc16720a03b1c9993b9502ec3f675db63507da450fa1

    SHA512

    b52b2033abbdaceb397596eea028dcf5c324d28db7152d4e3cb81b50dc83e49bc88f74cc69f85774606cad512010b61dc4e3a28e015d655a5a39db7727a39e17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    fd7e7938afbade7cb02554a1fcdc44a7

    SHA1

    3b58852326276870828c6d27ed90afa688066716

    SHA256

    1bbe09e850f89a08ca63bf6dc61ca3360931c659687efa91c5ac48f77357dcda

    SHA512

    a0bc797845505eb8f03ccc5fcbbc334c1a22aada0abf8146f311a1c0b32adca5904c895cadbbc83eb8e5ee300fde139d1bfa2478fa5326068557ce4af3bcfc2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    3ad6a25325e56e836bcabc77642c62d0

    SHA1

    7fd0f382428c5e6b1bf29a4e88a4943fe58f4a04

    SHA256

    a296d32592b67af176005ff07b1791059c3d1e12d8107e90e1d6858012f2e9fa

    SHA512

    96602bedf6c8e2497f1e7a69456185889b8cac3febd4174e3aa5f3d7cb5653a70145513f38edb2130747538e32dbed66fb81c07743a9c1b1f2984ecf69bc11a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    84b1d2226cf929018eb4cd6617b3313a

    SHA1

    fa43e469f5a31d961c799ab8103a1ce200c77378

    SHA256

    85e72f9a35a691d732c9760bdfbadcf0a0a02ed2c7bef873bbcfc79d573a2793

    SHA512

    c881f627c0a444f18fdc47a3a019adbc4d0ef76c93bc3950f31561849571319d7d85be1dbd8a69102ec30b7075fc590056ad3b75d43b669e47297ecaccac5fcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    87942a8baa9bfb62c1ee49b793ca25b9

    SHA1

    4f6a94e028636f8c8057c6d4ef195ef13dad8608

    SHA256

    c86f2916762cc8018f91448c9ed91c8a5d5a14550822e2c8d40b0b6f33e5c84f

    SHA512

    81f79817472defe1acf7d6afbdbfddde40d141c3bbd9174a933868eb36c5549f65dee48fbccd5190a55118fedb2535ea4023f4e2e3273cc2ac849f51697717af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    265d9e318e74026fb76a5afbfb497dd4

    SHA1

    533bcd7ca34bb8c3a47d425e64bf1738398ae211

    SHA256

    ce8bd74ef48fa7e22884f3ef655981265ab9d6c5dfc5528589292f2d64865929

    SHA512

    001e5e885a58328c8c60b56440528f9d6430484c707eff2dad10203613ba0c65fa3576d4ff0bcf4a8b7b03a8c479c435a9bb47fc7a0731ba062bfa4b26a0ca80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    63605d7b577dfada6bd8c37f998d589b

    SHA1

    c643b77e233bbb6095538eb3b74637b31458f805

    SHA256

    bea66eb3d3697f9c8e04079fe68dcc0cce153a5fad8235eff6ee2f7c1dca8788

    SHA512

    b9dafefad3d8810e47e48830abecebcb3fc49a3a72892359b622da58bf2c6e35932d2e70b7a5fd646685dd5c47dc9e686dd962675b396ea35403a3ccf0216838

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    23ede0a53cee9f22ca1e1fadfb5d22e1

    SHA1

    47e0b9ee4524821d894498b3576ba1da0a4a690d

    SHA256

    0cf9b64e25416acc461c445566d372a4fa452db431769533169d3e11bf2b1f62

    SHA512

    5dadbd5fbb8118b048b0bc71841634937d5e62929d0dc0a045b56bac9307f52cfda2c08418b21c097baacf5fda85a1a09fdb5fae91713d4ec48fc526db7af2ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c89754a1beef0b3ee1d44543e89e582b

    SHA1

    f15761fa070074e2d9663acd347cfcef2c143e2c

    SHA256

    08d07c6ef68cbb09bd1029d99a55aba12a6e8edbdfffc94be15bf597893c45ee

    SHA512

    d7ab3435d36fd6c60bda79406e491b4d718ac16b5723b2f0b4c8348ba16e190398502156058e07bb18d74c1fa094919372608583892b34f5742c3990c4046e64

  • C:\Users\Admin\AppData\Local\Temp\Cab5B2D.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar5B82.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • C:\Users\Admin\AppData\Local\Temp\VBUEQ.bat

    Filesize

    150B

    MD5

    6e2f02676c8efc5fd47263ef863d5ceb

    SHA1

    d2ceb6cf33d5897cb14691c5d026428032a1151c

    SHA256

    520115e29a7903e85324b7da7cbfb69a95be6996713408d90970c908274be677

    SHA512

    c9530d20c16b3d71f19ee02bc027ba1f70a4959b5c6620fcd2de838f04cfde9b317fd26261171fde8bca4964829d19a1110a0eb13ab4881315dfcbaf8e4778cc

  • C:\Users\Admin\AppData\Roaming\Addblocke\addblocke.exe

    Filesize

    755KB

    MD5

    c97865337182ba050e309d52cb88059b

    SHA1

    612153fea0f09b9752bad8cbb2e9876cfe2bbefe

    SHA256

    27a8d1390ec4fbdb347840eda479a620aaab28a8c75e3aa34cbbfc047bcf7fba

    SHA512

    acda757efdde57aa098f2f173a691afd1e80065499fb9345e7ad8423e4e71a8923d47c2897398c7159b820775885874d104a51133008f098636d1f476b2cc8c0

  • memory/1728-15-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1728-13-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1728-5-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1728-7-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1728-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1728-37-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1728-16-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1728-3-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1728-11-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1788-67-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/2580-44-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2580-59-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2592-425-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2592-54-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2596-56-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2756-14-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2756-2-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB