Analysis

  • max time kernel
    98s
  • max time network
    102s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2024, 10:43

General

  • Target

    BootstrapperV1.24.exe

  • Size

    1.4MB

  • MD5

    f930308eca6abad4f340bb4f7497cbe9

  • SHA1

    a785c5b157c4ac9e6355fd4037b5815bd012d3a5

  • SHA256

    18e1d4a98fba8563fe525e6a739811a73e8bb2aeb149bd27185dddcf4e1acf0b

  • SHA512

    2fa502615cc662ac0b0df085f371244fe7566292549fed1f23b0fb830fe3b9cda0cb931c81ae8e9b63818f59ab214a4abd06b2e3829265dd424477d578529e51

  • SSDEEP

    24576:+Z1xuVVjfFoynPaVBUR8f+kN10EBJp5vgHWjTwAlocaKjyyItHDzZ:eQDgok30srLocaKjGD

Malware Config

Extracted

Family

darkcomet

Botnet

Robox

C2

tm6bqni.localto.net:1511

Mutex

DC_MUTEX-Y4ZY6S9

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    zoY9mkixxMwi

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Disables Task Manager via registry modification
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.24.exe
    "C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.24.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.24.exe" +s +h
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.24.exe" +s +h
        3⤵
        • Sets file to hidden
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2832
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Sets file to hidden
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2864
    • C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.22.EXE
      "C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.22.EXE"
      2⤵
      • Executes dropped EXE
      PID:2912
      • C:\Windows\system32\cmd.exe
        "cmd" /c ipconfig /all
        3⤵
          PID:3040
          • C:\Windows\system32\ipconfig.exe
            ipconfig /all
            4⤵
            • Gathers network information
            PID:2104
        • C:\Windows\system32\cmd.exe
          "cmd" /c wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
          3⤵
            PID:1216
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2060
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 2912 -s 1156
            3⤵
            • Loads dropped DLL
            PID:2132
        • C:\Windows\SysWOW64\notepad.exe
          notepad
          2⤵
          • Deletes itself
          • System Location Discovery: System Language Discovery
          PID:2840
        • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
          "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1512
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            3⤵
              PID:2476
            • C:\Windows\explorer.exe
              "C:\Windows\explorer.exe"
              3⤵
                PID:2456
              • C:\Windows\SysWOW64\notepad.exe
                notepad
                3⤵
                • System Location Discovery: System Language Discovery
                PID:1640

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

            Filesize

            1.4MB

            MD5

            f930308eca6abad4f340bb4f7497cbe9

            SHA1

            a785c5b157c4ac9e6355fd4037b5815bd012d3a5

            SHA256

            18e1d4a98fba8563fe525e6a739811a73e8bb2aeb149bd27185dddcf4e1acf0b

            SHA512

            2fa502615cc662ac0b0df085f371244fe7566292549fed1f23b0fb830fe3b9cda0cb931c81ae8e9b63818f59ab214a4abd06b2e3829265dd424477d578529e51

          • \Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.22.EXE

            Filesize

            800KB

            MD5

            2a4dcf20b82896be94eb538260c5fb93

            SHA1

            21f232c2fd8132f8677e53258562ad98b455e679

            SHA256

            ebbcb489171abfcfce56554dbaeacd22a15838391cbc7c756db02995129def5a

            SHA512

            4f1164b2312fb94b7030d6eb6aa9f3502912ffa33505f156443570fc964bfd3bb21ded3cf84092054e07346d2dce83a0907ba33f4ba39ad3fe7a78e836efe288

          • memory/1592-0-0x0000000000240000-0x0000000000241000-memory.dmp

            Filesize

            4KB

          • memory/2840-39-0x00000000001C0000-0x00000000001C1000-memory.dmp

            Filesize

            4KB

          • memory/2840-11-0x0000000000080000-0x0000000000081000-memory.dmp

            Filesize

            4KB

          • memory/2912-10-0x0000000000ED0000-0x0000000000F9E000-memory.dmp

            Filesize

            824KB