Resubmissions
21-06-2024 08:55
240621-kvt6astdkh 10Analysis
-
max time kernel
155s -
max time network
85s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-06-2024 08:55
General
-
Target
Darkcomet RAT 5.3.1.zip
-
Size
14.6MB
-
MD5
9f9347ecf2cc6541fb64acd6fc0a5749
-
SHA1
6c0d454ec2068d1c7d502a167ca02c8dafd0b244
-
SHA256
bfe9a76229e6e502b7c542007cd976dd3b5e0d26190cdf7cc8a5e5aab0a63f7d
-
SHA512
f0367a7c7265d38e52936bac40e0a18236d6544827da7dcdd1f2b19d2d3193b0039f5860a61a30f4e28bca3d2ef06a9c51f1b2c7f05927fad6ba37741ff015f3
-
SSDEEP
393216:Yia1rsEqp8mxBktqBEH3JM/qbxhbRLEJt5RXtW3hg:Yl1rsEqJxChH3coxhbePK3hg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
upnp.exepid process 3276 upnp.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\upnp.exe upx behavioral1/memory/3276-47-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/3276-52-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
DarkComet.exepid process 4824 DarkComet.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
DarkComet.exepid process 4824 DarkComet.exe 4824 DarkComet.exe 4824 DarkComet.exe 4824 DarkComet.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
DarkComet.exepid process 4824 DarkComet.exe 4824 DarkComet.exe 4824 DarkComet.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
DarkComet.exepid process 4824 DarkComet.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
DarkComet.exedescription pid process target process PID 4824 wrote to memory of 3276 4824 DarkComet.exe upnp.exe PID 4824 wrote to memory of 3276 4824 DarkComet.exe upnp.exe PID 4824 wrote to memory of 3276 4824 DarkComet.exe upnp.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\Darkcomet RAT 5.3.1.zip"1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Desktop\Darkcomet RAT 5.3.1\DarkComet.exe"C:\Users\Admin\Desktop\Darkcomet RAT 5.3.1\DarkComet.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\upnp.exe"C:\Users\Admin\AppData\Local\Temp\upnp.exe" -a 10.127.0.232 1604 1604 TCP2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\upnp.exeFilesize
12KB
MD513804f8dc4e72ba103d5e34de895c9db
SHA103d7a0500ccb2fef3222ed1eb55f2cbedbb8b8c5
SHA256da659d8c05cfcb5f0abe167191665359123643000d12140836c28d204294ceb6
SHA5129abb98795a1b1c142c50c7c110966b4249972de5b1f40445b27d70c3127140b0ddaaada1d92297e96ffd71177b12cd87749953ffdcf6e5da7803b9f9527d7652
-
C:\Users\Admin\Desktop\Darkcomet RAT 5.3.1\config.iniFilesize
522B
MD50a5baccb60ddf613c9ef2b18e0b1863f
SHA139bb75213fab1a7b9ab51089ef54f43086d8b1f3
SHA25621a222e00ea35f663dc6c397c0a0aa6d80e52187644b170cee9e186892a22f4e
SHA512b24b4e15fc975f81e5e5216cc098f8a34faeb5f7b3f10fe8f9f4a19157abe62f293b4687440434744e5c5284736a9a472fc5d04f5fda72e94fe5e7140b36de9b
-
memory/3276-52-0x0000000000400000-0x000000000040D000-memory.dmpFilesize
52KB
-
memory/3276-47-0x0000000000400000-0x000000000040D000-memory.dmpFilesize
52KB
-
memory/4824-51-0x0000000005B00000-0x0000000005B01000-memory.dmpFilesize
4KB
-
memory/4824-55-0x0000000000400000-0x0000000000F67000-memory.dmpFilesize
11.4MB
-
memory/4824-50-0x0000000002E90000-0x0000000002E91000-memory.dmpFilesize
4KB
-
memory/4824-49-0x0000000000400000-0x0000000000F67000-memory.dmpFilesize
11.4MB
-
memory/4824-0-0x0000000002E90000-0x0000000002E91000-memory.dmpFilesize
4KB
-
memory/4824-1-0x0000000005B00000-0x0000000005B01000-memory.dmpFilesize
4KB
-
memory/4824-53-0x0000000000400000-0x0000000000F67000-memory.dmpFilesize
11.4MB
-
memory/4824-39-0x0000000000400000-0x0000000000F67000-memory.dmpFilesize
11.4MB
-
memory/4824-57-0x0000000000400000-0x0000000000F67000-memory.dmpFilesize
11.4MB
-
memory/4824-58-0x0000000000400000-0x0000000000F67000-memory.dmpFilesize
11.4MB
-
memory/4824-59-0x0000000000400000-0x0000000000F67000-memory.dmpFilesize
11.4MB
-
memory/4824-60-0x0000000000400000-0x0000000000F67000-memory.dmpFilesize
11.4MB
-
memory/4824-61-0x0000000000400000-0x0000000000F67000-memory.dmpFilesize
11.4MB
-
memory/4824-62-0x0000000000400000-0x0000000000F67000-memory.dmpFilesize
11.4MB