Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2024, 12:35

General

  • Target

    8606debb563ac66cda022f4163339ecbcba4ef845d470cda68149fa2a88a05ffN.exe

  • Size

    3.3MB

  • MD5

    87e724f9d94f5aa8007641cd9f59cc00

  • SHA1

    521ab3c3971449d55064acace1b397fb96cf334d

  • SHA256

    8606debb563ac66cda022f4163339ecbcba4ef845d470cda68149fa2a88a05ff

  • SHA512

    b992161dddfebe54f26780262ff4ae7334bbba4585a05325828a35e612eb67ba035139fdf37d6dea26e72a7de73749b161aca57a48e53052433e5ec08f5e3aab

  • SSDEEP

    98304:GQU/lHt2VHrDoIoH9a2qLURFiROdlOvU37EG:GQwQVHv8HXKR6AvU3b

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8606debb563ac66cda022f4163339ecbcba4ef845d470cda68149fa2a88a05ffN.exe
    "C:\Users\Admin\AppData\Local\Temp\8606debb563ac66cda022f4163339ecbcba4ef845d470cda68149fa2a88a05ffN.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\8606debb563ac66cda022f4163339ecbcba4ef845d470cda68149fa2a88a05ffN.exe" +s +h
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp\8606debb563ac66cda022f4163339ecbcba4ef845d470cda68149fa2a88a05ffN.exe" +s +h
        3⤵
        • Sets file to hidden
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2260
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Sets file to hidden
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:1848
    • C:\Windows\SysWOW64\notepad.exe
      notepad
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2724
    • C:\Windows\SysWOW64\SYSTEM32\SystemFile.exe
      "C:\Windows\system32\SYSTEM32\SystemFile.exe"
      2⤵
      • Modifies firewall policy service
      • Modifies security service
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2808
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
          PID:2420
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          3⤵
            PID:896
          • C:\Windows\SysWOW64\notepad.exe
            notepad
            3⤵
            • System Location Discovery: System Language Discovery
            PID:1356
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
        1⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:2400

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IMG_0352.HEIC

        Filesize

        2.3MB

        MD5

        3f347f670450077cc13319b79be5fe10

        SHA1

        938ad033c4f821b1c8f84413969ab307a6bb96bc

        SHA256

        a412ccc720c2416942345a96c682c043fc677fa8fb842e556f9baeefffcda31a

        SHA512

        dd82415003aa450f9cb8b06bc5819530dc51210668f60794facf08f69864ade3cca062626cad985546461322fb9b557429d3328abeaa6203d37eea072244f840

      • C:\Users\Admin\AppData\Local\Temp\ULKU BOZKAYA.JPEG

        Filesize

        172KB

        MD5

        26e58d569343e340f5a5de9d9b200aef

        SHA1

        2710b193732d5980bd5d5425ddd26e468c8310ae

        SHA256

        2a7ac93fc5d66b3b13ca742837215fc748ec6d45283daf62c5a17014c1347a95

        SHA512

        f64c07884b1ac23271c89212c36631c207021fcbcbfacae60a20e2686de4cae10e36c30d73b5cc3acd31b11bbfff256db137240ebf7cc484894f4cac53ff8c26

      • C:\Windows\SysWOW64\SYSTEM32\SystemFile.exe

        Filesize

        3.3MB

        MD5

        87e724f9d94f5aa8007641cd9f59cc00

        SHA1

        521ab3c3971449d55064acace1b397fb96cf334d

        SHA256

        8606debb563ac66cda022f4163339ecbcba4ef845d470cda68149fa2a88a05ff

        SHA512

        b992161dddfebe54f26780262ff4ae7334bbba4585a05325828a35e612eb67ba035139fdf37d6dea26e72a7de73749b161aca57a48e53052433e5ec08f5e3aab

      • memory/2156-0-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/2156-5-0x0000000002010000-0x0000000002012000-memory.dmp

        Filesize

        8KB

      • memory/2400-6-0x00000000001B0000-0x00000000001B2000-memory.dmp

        Filesize

        8KB

      • memory/2724-8-0x0000000000080000-0x0000000000081000-memory.dmp

        Filesize

        4KB

      • memory/2724-36-0x0000000000030000-0x0000000000031000-memory.dmp

        Filesize

        4KB

      • memory/2808-49-0x0000000003CD0000-0x0000000003CD2000-memory.dmp

        Filesize

        8KB