Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-05-2024 04:04

General

  • Target

    New Order.exe

  • Size

    964KB

  • MD5

    ac117adca6eb38e0063d02f6ac8d021f

  • SHA1

    1dc3841438485efadf7604ae3215e2800526868d

  • SHA256

    02f1f6593d82e544a37a26d89e6b882be7722033acf1d95b298b8a44da792f24

  • SHA512

    457ab69e3f894833cb07ea849f3cc461b13bc82bbf3df63ca03181a41335edea77e2a74a8d349e94c4944286f6be09dc9b1b7f49e3180b94bdd030d15f49482b

  • SSDEEP

    24576:xljYTN54L+QagyUW4O058i2He5JUCRiYHk97g:xljYfMOfmxJHp07g

Malware Config

Extracted

Family

darkcomet

Botnet

God Bless me

C2

blackhills.ddns.net:1040

213.183.58.34:1040

Mutex

DC_MUTEX-1L423YQ

Attributes
  • InstallPath

    MSDCSC\svchost.exe

  • gencode

    hxfmXvFjpU5G

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Windows security bypass 2 TTPs 2 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New Order.exe
    "C:\Users\Admin\AppData\Local\Temp\New Order.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Update\conhost" /XML "C:\Users\Admin\AppData\Local\Temp\z214"
      2⤵
      • Creates scheduled task(s)
      PID:1952
    • C:\Users\Admin\AppData\Local\Temp\server.exeserver.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exeserver.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1668
    • C:\Users\Admin\AppData\Local\Temp\New Order.exe
      "C:\Users\Admin\AppData\Local\Temp\New Order.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\New Order.exe" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1704
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp\New Order.exe" +s +h
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:3224
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1820
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:3904
      • C:\Windows\SysWOW64\notepad.exe
        notepad
        3⤵
          PID:3588
        • C:\Users\Admin\AppData\Roaming\MSDCSC\svchost.exe
          "C:\Users\Admin\AppData\Roaming\MSDCSC\svchost.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          PID:3840
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Update\conhost" /XML "C:\Users\Admin\AppData\Local\Temp\z931"
            4⤵
            • Creates scheduled task(s)
            PID:3508
      • C:\Users\Admin\AppData\Local\Temp\New Order.exe
        "C:\Users\Admin\AppData\Local\Temp\New Order.exe"
        2⤵
        • Executes dropped EXE
        PID:3872
      • C:\Users\Admin\AppData\Local\Temp\New Order.exe
        "C:\Users\Admin\AppData\Local\Temp\New Order.exe"
        2⤵
        • Modifies security service
        • Windows security bypass
        • Executes dropped EXE
        • Windows security modification
        • Adds Run key to start application
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1960
        • C:\Windows\SysWOW64\notepad.exe
          notepad
          3⤵
            PID:4144

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\New Order.exe

        Filesize

        964KB

        MD5

        ac117adca6eb38e0063d02f6ac8d021f

        SHA1

        1dc3841438485efadf7604ae3215e2800526868d

        SHA256

        02f1f6593d82e544a37a26d89e6b882be7722033acf1d95b298b8a44da792f24

        SHA512

        457ab69e3f894833cb07ea849f3cc461b13bc82bbf3df63ca03181a41335edea77e2a74a8d349e94c4944286f6be09dc9b1b7f49e3180b94bdd030d15f49482b

      • C:\Users\Admin\AppData\Local\Temp\server.exeserver.exe

        Filesize

        202KB

        MD5

        d1ec545c456123fbf732b150fcd004ad

        SHA1

        ea9bce20767f3cd291da26b50d26169ddbc46260

        SHA256

        f6bd8ce890fb83d0a91d1253f1bdf755ad239c83f9072331d08bc003cc211d70

        SHA512

        3823f6af2282d9ec8052869799c154513a76e34609b5408198c019bd3973437fc03c6c9aa04c4d8347d98fa3f8b5c36a9f6c0754f2b1c87dd049b97d85803690

      • C:\Users\Admin\AppData\Local\Temp\z214

        Filesize

        1KB

        MD5

        22b5fc9f0e16f6461dcd8c723f7080fd

        SHA1

        9ee76ecdc30a66d6ddb655728cfbb5aff50cc9b7

        SHA256

        871860b714b05d0c3065cf2c7cc7bcb5111b735a0e91e3a17a437edce865712b

        SHA512

        d9913a1b7d1a18e61c733e8fa229a5b9626fe1757d1a86875025a9cc3e1cd05e0803a826d28590aa3958b61e7ebe0a9e198de5ec7ea817918c2ca15497618bae

      • memory/1668-25-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/1668-116-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/1668-115-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/1668-30-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/1668-26-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/1676-21-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1676-18-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1676-24-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1676-20-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1676-19-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1676-17-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1676-32-0x0000000002A10000-0x0000000002A11000-memory.dmp

        Filesize

        4KB

      • memory/1676-16-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1676-15-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-104-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-118-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-134-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-133-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-105-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-107-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-132-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-131-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-108-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-109-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-130-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-129-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-128-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-127-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-117-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-126-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-119-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-120-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-121-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-122-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-123-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-124-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1960-125-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/2636-31-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/2636-1-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/2636-2-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/2636-111-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/2636-110-0x0000000074A32000-0x0000000074A33000-memory.dmp

        Filesize

        4KB

      • memory/2636-0-0x0000000074A32000-0x0000000074A33000-memory.dmp

        Filesize

        4KB

      • memory/2636-3-0x0000000074A30000-0x0000000074FE1000-memory.dmp

        Filesize

        5.7MB

      • memory/3588-34-0x0000000000410000-0x0000000000411000-memory.dmp

        Filesize

        4KB

      • memory/4144-106-0x0000000001250000-0x0000000001251000-memory.dmp

        Filesize

        4KB