Analysis

  • max time kernel
    119s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2024 12:35

General

  • Target

    8606debb563ac66cda022f4163339ecbcba4ef845d470cda68149fa2a88a05ffN.exe

  • Size

    3.3MB

  • MD5

    87e724f9d94f5aa8007641cd9f59cc00

  • SHA1

    521ab3c3971449d55064acace1b397fb96cf334d

  • SHA256

    8606debb563ac66cda022f4163339ecbcba4ef845d470cda68149fa2a88a05ff

  • SHA512

    b992161dddfebe54f26780262ff4ae7334bbba4585a05325828a35e612eb67ba035139fdf37d6dea26e72a7de73749b161aca57a48e53052433e5ec08f5e3aab

  • SSDEEP

    98304:GQU/lHt2VHrDoIoH9a2qLURFiROdlOvU37EG:GQwQVHv8HXKR6AvU3b

Malware Config

Extracted

Family

darkcomet

Botnet

kayýtt

C2

2.tcp.eu.ngrok.io:18550

Mutex

DC_MUTEX-V53K8NY

Attributes
  • InstallPath

    SYSTEM32\SystemFile.exe

  • gencode

    psEo3E8tuBWk

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    SystemFile

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 7 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8606debb563ac66cda022f4163339ecbcba4ef845d470cda68149fa2a88a05ffN.exe
    "C:\Users\Admin\AppData\Local\Temp\8606debb563ac66cda022f4163339ecbcba4ef845d470cda68149fa2a88a05ffN.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5008
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\8606debb563ac66cda022f4163339ecbcba4ef845d470cda68149fa2a88a05ffN.exe" +s +h
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp\8606debb563ac66cda022f4163339ecbcba4ef845d470cda68149fa2a88a05ffN.exe" +s +h
        3⤵
        • Sets file to hidden
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:4112
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3120
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Sets file to hidden
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:1232
    • C:\Windows\SysWOW64\notepad.exe
      notepad
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:1248
    • C:\Windows\SysWOW64\SYSTEM32\SystemFile.exe
      "C:\Windows\system32\SYSTEM32\SystemFile.exe"
      2⤵
      • Modifies firewall policy service
      • Modifies security service
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4844
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
          PID:3464
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          3⤵
            PID:1148
          • C:\Windows\SysWOW64\notepad.exe
            notepad
            3⤵
            • System Location Discovery: System Language Discovery
            PID:372
      • C:\Windows\system32\OpenWith.exe
        C:\Windows\system32\OpenWith.exe -Embedding
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3272
      • C:\Windows\system32\OpenWith.exe
        C:\Windows\system32\OpenWith.exe -Embedding
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2480

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IMG_0352.HEIC

        Filesize

        2.3MB

        MD5

        3f347f670450077cc13319b79be5fe10

        SHA1

        938ad033c4f821b1c8f84413969ab307a6bb96bc

        SHA256

        a412ccc720c2416942345a96c682c043fc677fa8fb842e556f9baeefffcda31a

        SHA512

        dd82415003aa450f9cb8b06bc5819530dc51210668f60794facf08f69864ade3cca062626cad985546461322fb9b557429d3328abeaa6203d37eea072244f840

      • C:\Users\Admin\AppData\Local\Temp\ULKU BOZKAYA.JPEG

        Filesize

        172KB

        MD5

        26e58d569343e340f5a5de9d9b200aef

        SHA1

        2710b193732d5980bd5d5425ddd26e468c8310ae

        SHA256

        2a7ac93fc5d66b3b13ca742837215fc748ec6d45283daf62c5a17014c1347a95

        SHA512

        f64c07884b1ac23271c89212c36631c207021fcbcbfacae60a20e2686de4cae10e36c30d73b5cc3acd31b11bbfff256db137240ebf7cc484894f4cac53ff8c26

      • C:\Windows\SysWOW64\SYSTEM32\SystemFile.exe

        Filesize

        3.3MB

        MD5

        87e724f9d94f5aa8007641cd9f59cc00

        SHA1

        521ab3c3971449d55064acace1b397fb96cf334d

        SHA256

        8606debb563ac66cda022f4163339ecbcba4ef845d470cda68149fa2a88a05ff

        SHA512

        b992161dddfebe54f26780262ff4ae7334bbba4585a05325828a35e612eb67ba035139fdf37d6dea26e72a7de73749b161aca57a48e53052433e5ec08f5e3aab

      • memory/372-76-0x0000000000D90000-0x0000000000D91000-memory.dmp

        Filesize

        4KB

      • memory/1248-9-0x0000000000B30000-0x0000000000B31000-memory.dmp

        Filesize

        4KB

      • memory/4844-79-0x0000000000400000-0x000000000074F000-memory.dmp

        Filesize

        3.3MB

      • memory/5008-0-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

        Filesize

        4KB

      • memory/5008-77-0x0000000000400000-0x000000000074F000-memory.dmp

        Filesize

        3.3MB