Malware Analysis Report

2024-08-06 17:11

Sample ID 240417-p6pgeagb63
Target ce6c774bcbcb08ee2e11a539a45e70afc1282d04970d52b42020d8c761173b49
SHA256 ce6c774bcbcb08ee2e11a539a45e70afc1282d04970d52b42020d8c761173b49
Tags
darkcomet guest16 evasion persistence rat trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ce6c774bcbcb08ee2e11a539a45e70afc1282d04970d52b42020d8c761173b49

Threat Level: Known bad

The file ce6c774bcbcb08ee2e11a539a45e70afc1282d04970d52b42020d8c761173b49 was found to be: Known bad.

Malicious Activity Summary

darkcomet guest16 evasion persistence rat trojan upx

Modifies WinLogon for persistence

Darkcomet

Sets file to hidden

Loads dropped DLL

UPX packed file

Checks computer location settings

Executes dropped EXE

Adds Run key to start application

Enumerates physical storage devices

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Views/modifies file attributes

Suspicious use of SetWindowsHookEx

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-04-17 12:56

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-17 12:56

Reported

2024-04-17 13:00

Platform

win7-20240221-en

Max time kernel

192s

Max time network

218s

Command Line

"C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 33 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 34 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 35 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2444 wrote to memory of 2448 N/A C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE
PID 2444 wrote to memory of 2448 N/A C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE
PID 2444 wrote to memory of 2448 N/A C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE
PID 2444 wrote to memory of 2448 N/A C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE
PID 2444 wrote to memory of 3032 N/A C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe C:\Users\Admin\AppData\Local\Temp\ZBYTE2.0.EXE
PID 2444 wrote to memory of 3032 N/A C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe C:\Users\Admin\AppData\Local\Temp\ZBYTE2.0.EXE
PID 2444 wrote to memory of 3032 N/A C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe C:\Users\Admin\AppData\Local\Temp\ZBYTE2.0.EXE
PID 2444 wrote to memory of 3032 N/A C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe C:\Users\Admin\AppData\Local\Temp\ZBYTE2.0.EXE
PID 2448 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Windows\SysWOW64\cmd.exe
PID 2448 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Windows\SysWOW64\cmd.exe
PID 2448 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Windows\SysWOW64\cmd.exe
PID 2448 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Windows\SysWOW64\cmd.exe
PID 2448 wrote to memory of 784 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Windows\SysWOW64\cmd.exe
PID 2448 wrote to memory of 784 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Windows\SysWOW64\cmd.exe
PID 2448 wrote to memory of 784 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Windows\SysWOW64\cmd.exe
PID 2448 wrote to memory of 784 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Windows\SysWOW64\cmd.exe
PID 2448 wrote to memory of 576 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2448 wrote to memory of 576 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2448 wrote to memory of 576 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2448 wrote to memory of 576 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 684 wrote to memory of 2800 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 684 wrote to memory of 2800 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 684 wrote to memory of 2800 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 684 wrote to memory of 2800 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 784 wrote to memory of 2572 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 784 wrote to memory of 2572 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 784 wrote to memory of 2572 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 784 wrote to memory of 2572 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 576 wrote to memory of 2944 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe

"C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe"

C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE

"C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE"

C:\Users\Admin\AppData\Local\Temp\ZBYTE2.0.EXE

"C:\Users\Admin\AppData\Local\Temp\ZBYTE2.0.EXE"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE" +s +h

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE" +s +h

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

C:\Windows\SysWOW64\notepad.exe

notepad

Network

Country Destination Domain Proto
US 8.8.8.8:53 sussynv83dj893.duckdns.org udp
TR 78.169.2.131:1604 sussynv83dj893.duckdns.org tcp
TR 78.169.2.131:1604 sussynv83dj893.duckdns.org tcp
TR 78.169.2.131:1604 sussynv83dj893.duckdns.org tcp
US 8.8.8.8:53 sussynv83dj893.duckdns.org udp
TR 78.169.2.131:1604 sussynv83dj893.duckdns.org tcp
TR 78.169.2.131:1604 sussynv83dj893.duckdns.org tcp
TR 78.169.2.131:1604 sussynv83dj893.duckdns.org tcp
US 8.8.8.8:53 sussynv83dj893.duckdns.org udp
TR 78.169.2.131:1604 sussynv83dj893.duckdns.org tcp

Files

\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE

MD5 0055ec3943749262735d79fcb4f04119
SHA1 b2c2dce19536c945785534f9fa4b5062ec43d541
SHA256 85bfcf8f009f442c997e9aa5ddb9430fd8e55b98c1c6108e248d9aa901f15c0b
SHA512 72b1873565f9fe8c8ae273df2805f2f1a126581f67bdead56c6818637c9026d6ff7f36bc4280de58b18e9670b209006db404ee7122cd5fd830e6464590f3b807

memory/2444-8-0x0000000000F40000-0x0000000000FF7000-memory.dmp

memory/2448-12-0x0000000000400000-0x00000000004B7000-memory.dmp

\Users\Admin\AppData\Local\Temp\ZBYTE2.0.EXE

MD5 fc90c2fb06b099a072bd23f4722c591d
SHA1 69c2f9af2391b3311ce344a922ac650b0f3456b9
SHA256 e0df4445f3486b15b57da921ddc15b3137a5f2eb035f34130bc51f6be16d747e
SHA512 c3e87df8217d421abe951492809c7a89a5aaae341242c03428731362cb4907801e21da4bc6271d455ca7280131c59f2cb0137b829556d9c2f2a944be471cd619

memory/2448-18-0x0000000000240000-0x0000000000241000-memory.dmp

memory/3032-30-0x00000000000A0000-0x00000000000B4000-memory.dmp

memory/2944-61-0x00000000002C0000-0x00000000002C1000-memory.dmp

memory/2944-32-0x0000000000080000-0x0000000000081000-memory.dmp

memory/3032-62-0x0000000073CA0000-0x000000007438E000-memory.dmp

memory/2448-63-0x00000000031D0000-0x0000000003287000-memory.dmp

memory/576-64-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/576-65-0x00000000001D0000-0x00000000001D1000-memory.dmp

memory/2448-66-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/3032-67-0x0000000004B50000-0x0000000004B90000-memory.dmp

memory/576-68-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/3032-69-0x0000000073CA0000-0x000000007438E000-memory.dmp

memory/3032-71-0x0000000004B50000-0x0000000004B90000-memory.dmp

memory/3032-72-0x0000000004B50000-0x0000000004B90000-memory.dmp

memory/576-73-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/576-74-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/3032-76-0x0000000004B50000-0x0000000004B90000-memory.dmp

memory/576-80-0x0000000000400000-0x00000000004B7000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-17 12:56

Reported

2024-04-17 12:59

Platform

win10v2004-20240412-en

Max time kernel

150s

Max time network

158s

Command Line

"C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-553605503-2331009851-2137262461-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-553605503-2331009851-2137262461-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-553605503-2331009851-2137262461-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 33 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 34 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 35 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 36 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4168 wrote to memory of 3324 N/A C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE
PID 4168 wrote to memory of 3324 N/A C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE
PID 4168 wrote to memory of 3324 N/A C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE
PID 4168 wrote to memory of 4752 N/A C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe C:\Users\Admin\AppData\Local\Temp\ZBYTE2.0.EXE
PID 4168 wrote to memory of 4752 N/A C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe C:\Users\Admin\AppData\Local\Temp\ZBYTE2.0.EXE
PID 4168 wrote to memory of 4752 N/A C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe C:\Users\Admin\AppData\Local\Temp\ZBYTE2.0.EXE
PID 3324 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Windows\SysWOW64\cmd.exe
PID 3324 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Windows\SysWOW64\cmd.exe
PID 3324 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Windows\SysWOW64\cmd.exe
PID 3324 wrote to memory of 2440 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Windows\SysWOW64\cmd.exe
PID 3324 wrote to memory of 2440 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Windows\SysWOW64\cmd.exe
PID 3324 wrote to memory of 2440 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Windows\SysWOW64\cmd.exe
PID 3324 wrote to memory of 1472 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 3324 wrote to memory of 1472 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 3324 wrote to memory of 1472 N/A C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2240 wrote to memory of 868 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2240 wrote to memory of 868 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2240 wrote to memory of 868 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 1472 wrote to memory of 4388 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2440 wrote to memory of 4508 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2440 wrote to memory of 4508 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2440 wrote to memory of 4508 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe

"C:\Users\Admin\AppData\Local\Temp\eddb245a5dc0d8f70ffb66c033cbaa38ea4639d900739c5580bc37d86f258816.exe"

C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE

"C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE"

C:\Users\Admin\AppData\Local\Temp\ZBYTE2.0.EXE

"C:\Users\Admin\AppData\Local\Temp\ZBYTE2.0.EXE"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE" +s +h

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE" +s +h

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

Network

Country Destination Domain Proto
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 sussynv83dj893.duckdns.org udp
TR 78.169.2.131:1604 sussynv83dj893.duckdns.org tcp
US 8.8.8.8:53 18.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
NL 23.62.61.57:443 www.bing.com tcp
US 8.8.8.8:53 57.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
TR 78.169.2.131:1604 sussynv83dj893.duckdns.org tcp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 65.139.73.23.in-addr.arpa udp
TR 78.169.2.131:1604 sussynv83dj893.duckdns.org tcp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 sussynv83dj893.duckdns.org udp
TR 78.169.2.131:1604 sussynv83dj893.duckdns.org tcp
TR 78.169.2.131:1604 sussynv83dj893.duckdns.org tcp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 203.142.123.92.in-addr.arpa udp
TR 78.169.2.131:1604 sussynv83dj893.duckdns.org tcp
US 8.8.8.8:53 sussynv83dj893.duckdns.org udp
TR 78.169.2.131:1604 sussynv83dj893.duckdns.org tcp
US 8.8.8.8:53 10.179.89.13.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\ASDKODGS.EXE

MD5 0055ec3943749262735d79fcb4f04119
SHA1 b2c2dce19536c945785534f9fa4b5062ec43d541
SHA256 85bfcf8f009f442c997e9aa5ddb9430fd8e55b98c1c6108e248d9aa901f15c0b
SHA512 72b1873565f9fe8c8ae273df2805f2f1a126581f67bdead56c6818637c9026d6ff7f36bc4280de58b18e9670b209006db404ee7122cd5fd830e6464590f3b807

memory/3324-14-0x0000000000400000-0x00000000004B7000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ZBYTE2.0.EXE

MD5 fc90c2fb06b099a072bd23f4722c591d
SHA1 69c2f9af2391b3311ce344a922ac650b0f3456b9
SHA256 e0df4445f3486b15b57da921ddc15b3137a5f2eb035f34130bc51f6be16d747e
SHA512 c3e87df8217d421abe951492809c7a89a5aaae341242c03428731362cb4907801e21da4bc6271d455ca7280131c59f2cb0137b829556d9c2f2a944be471cd619

memory/3324-23-0x0000000000B10000-0x0000000000B11000-memory.dmp

memory/1472-37-0x00000000008D0000-0x00000000008D1000-memory.dmp

memory/1472-40-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/4388-39-0x0000000000C70000-0x0000000000C71000-memory.dmp

memory/4752-38-0x0000000000CE0000-0x0000000000CF4000-memory.dmp

memory/4752-36-0x0000000073990000-0x0000000074140000-memory.dmp

memory/4752-41-0x00000000056F0000-0x000000000578C000-memory.dmp

memory/4752-42-0x0000000005D40000-0x00000000062E4000-memory.dmp

memory/4752-43-0x0000000005830000-0x00000000058C2000-memory.dmp

memory/4752-44-0x0000000005A50000-0x0000000005A60000-memory.dmp

memory/3324-45-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/4752-46-0x0000000005790000-0x000000000579A000-memory.dmp

memory/4752-47-0x00000000059F0000-0x0000000005A46000-memory.dmp

memory/4752-48-0x0000000005A50000-0x0000000005A60000-memory.dmp

memory/1472-49-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/4752-50-0x0000000073990000-0x0000000074140000-memory.dmp

memory/4752-52-0x0000000005A50000-0x0000000005A60000-memory.dmp

memory/4752-53-0x0000000005A50000-0x0000000005A60000-memory.dmp

memory/1472-54-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/1472-56-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/1472-58-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/1472-60-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/1472-62-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/1472-64-0x0000000000400000-0x00000000004B7000-memory.dmp