Analysis

  • max time kernel
    599s
  • max time network
    459s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03-05-2024 18:55

General

  • Target

    FivemFreeUpdated.exe

  • Size

    756KB

  • MD5

    507d6f31d2798d62caf36db241b42421

  • SHA1

    f0ac3a0f5c1edc91cf78d713400a0d3a0aba5844

  • SHA256

    32c5cdbbd37c34c5d38ceed5bbf657f74b2629596e8b8635e8e888bb51117a0e

  • SHA512

    ae39793b5312fffea3a68684bffb3800a6dd7cb2327e9da0470cfb05fa4e1a7457ec394da9c7ccea2ec44a01a05fddacc14f4430ba0d63e9766d32d4e2c8d270

  • SSDEEP

    12288:Q9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/h5i:0Z1xuVVjfFoynPaVBUR8f+kN10EBO

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

fivemexternal.ddns.net:5529

Mutex

DC_MUTEX-RULX6G9

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    qMSWXMpj99bp

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Disables Task Manager via registry modification
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FivemFreeUpdated.exe
    "C:\Users\Admin\AppData\Local\Temp\FivemFreeUpdated.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
      "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3696
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
          PID:776
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          3⤵
            PID:1300

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      2
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Winlogon Helper DLL

      1
      T1547.004

      Privilege Escalation

      Boot or Logon Autostart Execution

      2
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Winlogon Helper DLL

      1
      T1547.004

      Defense Evasion

      Modify Registry

      2
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
        Filesize

        756KB

        MD5

        507d6f31d2798d62caf36db241b42421

        SHA1

        f0ac3a0f5c1edc91cf78d713400a0d3a0aba5844

        SHA256

        32c5cdbbd37c34c5d38ceed5bbf657f74b2629596e8b8635e8e888bb51117a0e

        SHA512

        ae39793b5312fffea3a68684bffb3800a6dd7cb2327e9da0470cfb05fa4e1a7457ec394da9c7ccea2ec44a01a05fddacc14f4430ba0d63e9766d32d4e2c8d270

      • memory/3696-62-0x0000000002240000-0x0000000002241000-memory.dmp
        Filesize

        4KB

      • memory/3696-64-0x0000000000400000-0x00000000004CA000-memory.dmp
        Filesize

        808KB

      • memory/3696-66-0x0000000000400000-0x00000000004CA000-memory.dmp
        Filesize

        808KB

      • memory/3704-0-0x0000000002490000-0x0000000002491000-memory.dmp
        Filesize

        4KB

      • memory/3704-63-0x0000000000400000-0x00000000004CA000-memory.dmp
        Filesize

        808KB