Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-05-2024 14:02

General

  • Target

    fnfree.exe

  • Size

    2.5MB

  • MD5

    6ba1a478a0e5f61d6394aba252c1a13b

  • SHA1

    caa8705c38084facd231914cc9adf72ad26f74aa

  • SHA256

    c3a6fa449ef70565a6b5eba1deb4bf069098d9e6dd4706937a9df4418bc08b07

  • SHA512

    e9c7d2fef0b52ee949fa378143d48c9f52c1f94426109b21a2452ca8d579343788e6592ab3eaf046d5604bc3132637c12457088a65a0e0cbf644be08bbff2091

  • SSDEEP

    49152:mQDgok30M5ROmcDQEOrQ+FTKKioIRh9UXEKJWl4yNP6grg:mQU/JbglOkwTKHPjUEKJWh13rg

Malware Config

Extracted

Family

darkcomet

Botnet

Cap

C2

91.93.172.78:1604

Mutex

DC_MUTEX-CG4P2XS

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    to2DGe4wqYwK

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    Runtime Broker

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 7 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 52 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fnfree.exe
    "C:\Users\Admin\AppData\Local\Temp\fnfree.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4356
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\fnfree.exe" +s +h
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp\fnfree.exe" +s +h
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:1956
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4640
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:4108
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\UNRARELYLOL.WAV"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:3564
    • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
      "C:\Windows\system32\MSDCSC\msdcsc.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:8
      • C:\Windows\SysWOW64\notepad.exe
        notepad
        3⤵
          PID:1352
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x2ec 0x2f4
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2264
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /7
      1⤵
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:3948
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3196

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\UNRARELYLOL.WAV

        Filesize

        1.8MB

        MD5

        cf9a94b3dd9d22d501789789b1076a46

        SHA1

        60c76b8b3731e9094106cb9fbf2e1f3a644c050b

        SHA256

        247a70fa86cbad1bc05681e64d0de186f41220fcf64ebc9af90720ba6a79b08c

        SHA512

        40cf25b62c183940816ab10b8b47660371011b833c5a9b66ff5461eb26920c19e2d6e383056449e9d7b673c7725b34900ad6348ac9d985be0913d489bd8b0dcf

      • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe

        Filesize

        2.5MB

        MD5

        6ba1a478a0e5f61d6394aba252c1a13b

        SHA1

        caa8705c38084facd231914cc9adf72ad26f74aa

        SHA256

        c3a6fa449ef70565a6b5eba1deb4bf069098d9e6dd4706937a9df4418bc08b07

        SHA512

        e9c7d2fef0b52ee949fa378143d48c9f52c1f94426109b21a2452ca8d579343788e6592ab3eaf046d5604bc3132637c12457088a65a0e0cbf644be08bbff2091

      • memory/8-96-0x0000000000400000-0x0000000000693000-memory.dmp

        Filesize

        2.6MB

      • memory/8-121-0x0000000000400000-0x0000000000693000-memory.dmp

        Filesize

        2.6MB

      • memory/8-119-0x0000000000400000-0x0000000000693000-memory.dmp

        Filesize

        2.6MB

      • memory/8-117-0x0000000000400000-0x0000000000693000-memory.dmp

        Filesize

        2.6MB

      • memory/8-114-0x0000000000400000-0x0000000000693000-memory.dmp

        Filesize

        2.6MB

      • memory/8-113-0x0000000000400000-0x0000000000693000-memory.dmp

        Filesize

        2.6MB

      • memory/1352-69-0x00000000003C0000-0x00000000003C1000-memory.dmp

        Filesize

        4KB

      • memory/3564-95-0x00007FFE31650000-0x00007FFE31661000-memory.dmp

        Filesize

        68KB

      • memory/3564-86-0x00007FFE31770000-0x00007FFE3178D000-memory.dmp

        Filesize

        116KB

      • memory/3564-85-0x00007FFE31790000-0x00007FFE317A1000-memory.dmp

        Filesize

        68KB

      • memory/3564-84-0x00007FFE36EA0000-0x00007FFE36EB7000-memory.dmp

        Filesize

        92KB

      • memory/3564-83-0x00007FFE3FA10000-0x00007FFE3FA21000-memory.dmp

        Filesize

        68KB

      • memory/3564-82-0x00007FFE3FA30000-0x00007FFE3FA47000-memory.dmp

        Filesize

        92KB

      • memory/3564-81-0x00007FFE3FB20000-0x00007FFE3FB38000-memory.dmp

        Filesize

        96KB

      • memory/3564-78-0x00007FF6E8320000-0x00007FF6E8418000-memory.dmp

        Filesize

        992KB

      • memory/3564-94-0x00007FFE31670000-0x00007FFE31681000-memory.dmp

        Filesize

        68KB

      • memory/3564-89-0x00007FFE2DF80000-0x00007FFE2F030000-memory.dmp

        Filesize

        16.7MB

      • memory/3564-88-0x00007FFE2FC50000-0x00007FFE2FE5B000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-93-0x00007FFE31690000-0x00007FFE316A1000-memory.dmp

        Filesize

        68KB

      • memory/3564-92-0x00007FFE316B0000-0x00007FFE316C8000-memory.dmp

        Filesize

        96KB

      • memory/3564-91-0x00007FFE316D0000-0x00007FFE316F1000-memory.dmp

        Filesize

        132KB

      • memory/3564-90-0x00007FFE31700000-0x00007FFE31741000-memory.dmp

        Filesize

        260KB

      • memory/3564-109-0x00007FFE2FE60000-0x00007FFE30116000-memory.dmp

        Filesize

        2.7MB

      • memory/3564-108-0x00007FFE3FB40000-0x00007FFE3FB74000-memory.dmp

        Filesize

        208KB

      • memory/3564-107-0x00007FF6E8320000-0x00007FF6E8418000-memory.dmp

        Filesize

        992KB

      • memory/3564-110-0x00007FFE2DF80000-0x00007FFE2F030000-memory.dmp

        Filesize

        16.7MB

      • memory/3564-80-0x00007FFE2FE60000-0x00007FFE30116000-memory.dmp

        Filesize

        2.7MB

      • memory/3564-87-0x00007FFE31750000-0x00007FFE31761000-memory.dmp

        Filesize

        68KB

      • memory/3564-79-0x00007FFE3FB40000-0x00007FFE3FB74000-memory.dmp

        Filesize

        208KB

      • memory/3948-118-0x0000021B22BD0000-0x0000021B22D24000-memory.dmp

        Filesize

        1.3MB

      • memory/4356-0-0x0000000002350000-0x0000000002351000-memory.dmp

        Filesize

        4KB

      • memory/4356-75-0x0000000000400000-0x0000000000693000-memory.dmp

        Filesize

        2.6MB