Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-11-2024 00:30

General

  • Target

    6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe

  • Size

    1.7MB

  • MD5

    7401a33cbb76ea99fa54a8420b3be420

  • SHA1

    6351cae2ac6e773bb6d43618fe47294e48cf6e0c

  • SHA256

    6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1b

  • SHA512

    5632d90652ee1c7c00e7563a488e3403cf91f9ebafd4a43d34ee83a1f04e18ee6a5fe7a1fe0db7de1e398c974c89d212407f7f9711d334fd7057cc919681bab4

  • SSDEEP

    24576:qMyptg5dkAmL8jyLQLNW0yzotcSHVZwMz8gkyJ8fPO:3te3O

Malware Config

Extracted

Family

darkcomet

Botnet

1

C2

anthraxgold.no-ip.info:666

Mutex

DC_MUTEX-169BEXQ

Attributes
  • gencode

    M6QvjZgri1v2

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe
    "C:\Users\Admin\AppData\Local\Temp\6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Users\Admin\AppData\Local\Temp\6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe
      "C:\Users\Admin\AppData\Local\Temp\6f89c8628344cf8f8c8cda716f432b2efa3204b5b7c51492509ee5233cacca1bN.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\CQPBJ.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1912
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svchost" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\test\test.exe" /f
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:664
      • C:\Users\Admin\AppData\Roaming\test\test.exe
        "C:\Users\Admin\AppData\Roaming\test\test.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:828
        • C:\Users\Admin\AppData\Roaming\test\test.exe
          "C:\Users\Admin\AppData\Roaming\test\test.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2736
        • C:\Users\Admin\AppData\Roaming\test\test.exe
          "C:\Users\Admin\AppData\Roaming\test\test.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CQPBJ.bat

    Filesize

    138B

    MD5

    527683c48cc4c7190219814c77b72fe0

    SHA1

    d995878a8f4b9824a0508039eeada5376be9a52d

    SHA256

    bbebf3e66136e700d8e3e2e0c8f461cdd9d7e68fe5a18a235afe86344932fb4b

    SHA512

    408a53b240c23fa34153ccc2b2315f28a9741121ecc9b76d50267ee62d78230e65574327369f83c779c781802c0c28f6c578703c01a67de46c3d44f71b814fa6

  • C:\Users\Admin\AppData\Roaming\test\test.exe

    Filesize

    1.7MB

    MD5

    56fd309287c6207c1c04120ad3f89a05

    SHA1

    e9a63443019055a5b7a383a0049e4fe76afaf4c1

    SHA256

    a5b742bbba6ac9cde01fa9f79a2fedd527eb0ebe4ebf0230959d51f5033f3808

    SHA512

    eabb63c8bf6b8f41e3d7e17108a72d761ea8b8b72979dd942ac2b0a44c8748dd6c9ab1f2a2d4742f2d2868a0341d28149de6e196ab5bb2cf50fae61957b88089

  • memory/2068-462-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2068-455-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2280-13-0x0000000002CD0000-0x0000000002CD1000-memory.dmp

    Filesize

    4KB

  • memory/2280-3-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

    Filesize

    4KB

  • memory/2280-73-0x0000000003060000-0x0000000003061000-memory.dmp

    Filesize

    4KB

  • memory/2280-7-0x00000000027E0000-0x00000000027E1000-memory.dmp

    Filesize

    4KB

  • memory/2280-45-0x0000000002E90000-0x0000000002E91000-memory.dmp

    Filesize

    4KB

  • memory/2280-37-0x00000000027D0000-0x00000000027D1000-memory.dmp

    Filesize

    4KB

  • memory/2280-35-0x00000000027D0000-0x00000000027D1000-memory.dmp

    Filesize

    4KB

  • memory/2280-33-0x0000000002C30000-0x0000000002C31000-memory.dmp

    Filesize

    4KB

  • memory/2280-31-0x0000000002C30000-0x0000000002C31000-memory.dmp

    Filesize

    4KB

  • memory/2280-29-0x0000000002A80000-0x0000000002A81000-memory.dmp

    Filesize

    4KB

  • memory/2280-27-0x0000000002A80000-0x0000000002A81000-memory.dmp

    Filesize

    4KB

  • memory/2280-25-0x0000000002890000-0x0000000002891000-memory.dmp

    Filesize

    4KB

  • memory/2280-23-0x0000000002890000-0x0000000002891000-memory.dmp

    Filesize

    4KB

  • memory/2280-21-0x0000000002AC0000-0x0000000002AC1000-memory.dmp

    Filesize

    4KB

  • memory/2280-19-0x0000000002AC0000-0x0000000002AC1000-memory.dmp

    Filesize

    4KB

  • memory/2280-15-0x0000000002CD0000-0x0000000002CD1000-memory.dmp

    Filesize

    4KB

  • memory/2280-0-0x0000000000400000-0x000000000054B000-memory.dmp

    Filesize

    1.3MB

  • memory/2280-9-0x00000000027E0000-0x00000000027E1000-memory.dmp

    Filesize

    4KB

  • memory/2280-63-0x0000000002A30000-0x0000000002A31000-memory.dmp

    Filesize

    4KB

  • memory/2280-53-0x0000000002E50000-0x0000000002E51000-memory.dmp

    Filesize

    4KB

  • memory/2280-148-0x0000000003820000-0x0000000003821000-memory.dmp

    Filesize

    4KB

  • memory/2280-195-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2280-143-0x0000000000660000-0x0000000000661000-memory.dmp

    Filesize

    4KB

  • memory/2280-135-0x0000000003860000-0x0000000003861000-memory.dmp

    Filesize

    4KB

  • memory/2280-127-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/2280-119-0x0000000003000000-0x0000000003001000-memory.dmp

    Filesize

    4KB

  • memory/2280-109-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/2280-101-0x0000000003030000-0x0000000003031000-memory.dmp

    Filesize

    4KB

  • memory/2280-81-0x00000000027C0000-0x00000000027C1000-memory.dmp

    Filesize

    4KB

  • memory/2280-5-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

    Filesize

    4KB

  • memory/2280-91-0x0000000002BE0000-0x0000000002BE1000-memory.dmp

    Filesize

    4KB

  • memory/2280-99-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2280-100-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2736-453-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2736-461-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2864-458-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2864-209-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB