Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 15:58

General

  • Target

    29df8c87af90d416babb87ade425c500_NeikiAnalytics.exe

  • Size

    645KB

  • MD5

    29df8c87af90d416babb87ade425c500

  • SHA1

    28b34f9f22cce993f9fb4afb01c68d2ddce70a72

  • SHA256

    892b68f736e2cf9fb804607dad54e6e4ea8e68718fff55be8564dc4a45b39c9f

  • SHA512

    66b6d1a1fe9b1b94e2d1ce4f5f252bc0db553b59d3d55e47eb395a8364b4072623b8b2225b0f6d584a8d96b422c3d53a9bd310e5089bf6eef2bbe6a64bea6ca7

  • SSDEEP

    12288:Jz3CC5MJncGC3ZE+Nf0YhTXotLPOjO15rMMHreBG/W8BTN7FyXYsIHZM:JDX52cGCpE++YoPjHrMr2BTjIYF5M

Malware Config

Extracted

Family

darkcomet

Botnet

Fresh++Victim

C2

flushedcorp.zapto.org:1604

Mutex

DC_MUTEX-5VQDKPY

Attributes
  • gencode

    UiefLW7J45WC

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Extracted

Family

latentbot

C2

flushedcorp.zapto.org

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29df8c87af90d416babb87ade425c500_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\29df8c87af90d416babb87ade425c500_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Local\Temp\AppLunch\Vbc.exe
      C:\Users\Admin\AppData\Local\Temp\\AppLunch\Vbc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AppLunch\Vbc.exe

    Filesize

    1.1MB

    MD5

    d881de17aa8f2e2c08cbb7b265f928f9

    SHA1

    08936aebc87decf0af6e8eada191062b5e65ac2a

    SHA256

    b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

    SHA512

    5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

  • memory/2924-0-0x00000000747A2000-0x00000000747A3000-memory.dmp

    Filesize

    4KB

  • memory/2924-1-0x00000000747A0000-0x0000000074D51000-memory.dmp

    Filesize

    5.7MB

  • memory/2924-2-0x00000000747A0000-0x0000000074D51000-memory.dmp

    Filesize

    5.7MB

  • memory/2924-23-0x00000000747A0000-0x0000000074D51000-memory.dmp

    Filesize

    5.7MB

  • memory/2924-21-0x00000000747A2000-0x00000000747A3000-memory.dmp

    Filesize

    4KB

  • memory/4092-16-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-26-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-17-0x0000000002260000-0x0000000002261000-memory.dmp

    Filesize

    4KB

  • memory/4092-19-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-18-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-20-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-13-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-22-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-9-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-24-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-25-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-14-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-27-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-28-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-29-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-30-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-31-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-32-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-33-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-34-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4092-35-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB