Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 10:25

General

  • Target

    1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe

  • Size

    1.7MB

  • MD5

    4a45eda053a2e6ca140a58d2dcba5ff0

  • SHA1

    fa5bcdcb373d8dce86ae6bcc4ed4770ab4498b5d

  • SHA256

    1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11

  • SHA512

    89fdba17a8750c85b3488492e1968a2ae7bc876552a558f84cd6ecee6582ee360112abe580fa0dab0005824f09695b4f8b114a4e2f09e12bad4f7030c14a416b

  • SSDEEP

    49152:kOBuzw/nMVpcq/2ELfWum/+kD+MKklDvjao:kOuzwMobEKpDVKabjao

Malware Config

Extracted

Family

darkcomet

Botnet

093012DE

C2

hosting.servegame.com:8085

Mutex

DC_MUTEX-NPS90EE

Attributes
  • gencode

    Sjl07Y5gccaE

  • install

    false

  • offline_keylogger

    true

  • password

    Michemicalromance

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Possible privilege escalation attempt 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 9 IoCs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 24 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe
    "C:\Users\Admin\AppData\Local\Temp\1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Users\Admin\AppData\Local\Temp\1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe
      "C:\Users\Admin\AppData\Local\Temp\1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Users\Admin\AppData\Roaming\HCMH78.exe
        "C:\Users\Admin\AppData\Roaming\HCMH78.exe"
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2940
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /A /C "cmd.exe /c takeown /f C:\ldrscan\bootwin"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1576
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c takeown /f C:\ldrscan\bootwin
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2580
            • C:\Windows\SysWOW64\takeown.exe
              takeown /f C:\ldrscan\bootwin
              6⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:676
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /A /C "icacls C:\ldrscan\bootwin /grant *S-1-1-0:(F)"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1696
          • C:\Windows\SysWOW64\icacls.exe
            icacls C:\ldrscan\bootwin /grant *S-1-1-0:(F)
            5⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            • System Location Discovery: System Language Discovery
            PID:2372
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /A /C "cmd.exe /c takeown /f C:\ldrscan\bootwin"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:904
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c takeown /f C:\ldrscan\bootwin
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1464
            • C:\Windows\SysWOW64\takeown.exe
              takeown /f C:\ldrscan\bootwin
              6⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:2300
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /A /C "icacls C:\ldrscan\bootwin /grant *S-1-1-0:(F)"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2104
          • C:\Windows\SysWOW64\icacls.exe
            icacls C:\ldrscan\bootwin /grant *S-1-1-0:(F)
            5⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            • System Location Discovery: System Language Discovery
            PID:2456
        • C:\Windows\system32\cmd.exe
          cmd.exe /A /C "C:\Windows\System32\cscript.exe //nologo C:\Windows\System32\slmgr.vbs -ilc "C:\Acer.XRM-MS""
          4⤵
            PID:1984
            • C:\Windows\System32\cscript.exe
              C:\Windows\System32\cscript.exe //nologo C:\Windows\System32\slmgr.vbs -ilc "C:\Acer.XRM-MS"
              5⤵
                PID:308
            • C:\Windows\system32\cmd.exe
              cmd.exe /A /C "C:\Windows\System32\cscript.exe //nologo C:\Windows\System32\slmgr.vbs -ipk FJGCP-4DFJD-GJY49-VJBQ7-HYRR2"
              4⤵
                PID:2424
                • C:\Windows\System32\cscript.exe
                  C:\Windows\System32\cscript.exe //nologo C:\Windows\System32\slmgr.vbs -ipk FJGCP-4DFJD-GJY49-VJBQ7-HYRR2
                  5⤵
                    PID:3068
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /A /C "compact /u \\?\Volume{367eaf83-3d79-11ef-ac21-806e6f6e6963}\MHJCS"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:2916
                  • C:\Windows\SysWOW64\compact.exe
                    compact /u \\?\Volume{367eaf83-3d79-11ef-ac21-806e6f6e6963}\MHJCS
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:2892
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /A /C "C:\bootsect.exe /nt60 SYS /force"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:1920
                  • C:\bootsect.exe
                    C:\bootsect.exe /nt60 SYS /force
                    5⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:2364
            • C:\Users\Admin\AppData\Local\Temp\1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe
              "C:\Users\Admin\AppData\Local\Temp\1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe"
              2⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2816
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\LTHRH.bat" "
                3⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2792
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "AdobeDLL" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe" /f
                  4⤵
                  • Adds Run key to start application
                  • System Location Discovery: System Language Discovery
                  PID:1648
              • C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe
                "C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:2592
                • C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe
                  "C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"
                  4⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2720
                • C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe
                  "C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"
                  4⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:2700
                • C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe
                  "C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"
                  4⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:2644

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Acer.XRM-MS

            Filesize

            2KB

            MD5

            f25832af6a684360950dbb15589de34a

            SHA1

            17ff1d21005c1695ae3dcbdc3435017c895fff5d

            SHA256

            266d64637cf12ff961165a018f549ff41002dc59380605b36d65cf1b8127c96f

            SHA512

            e0cf23351c02f4afa85eedc72a86b9114f539595cbd6bcd220e8b8d70fa6a7379dcd947ea0d59332ba672f36ebda6bd98892d9b6b20eedafc8be168387a3dd5f

          • C:\Users\Admin\AppData\Local\Temp\LTHRH.bat

            Filesize

            149B

            MD5

            4b05d1e57e68c984b22080ba52141cf6

            SHA1

            e24e2b20367bb2344ffe5f003ecc93e7d4f63882

            SHA256

            3d287de92ac4dcb4f85dc66770f9d13be5775980f75b82da44a3e1f77ed8c884

            SHA512

            bbc7f57d56478018f5f607d4e43eacbd4ced26b85fd06a760ec3bb7726ba8874f918709733a05821fdd2dc645face265752c6884b36e5c804b18914a71eaf816

          • C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe

            Filesize

            1.7MB

            MD5

            9f9ff50f2fcb8ebe36f2d7ab3c4cd07a

            SHA1

            5d0852438ec222bc89c401a59afc536a047c5de3

            SHA256

            1fb78daf06a8749a2919be9b7d0c07cfcbfe8db6bb4b81377b5d8c9a563a2491

            SHA512

            1e709c0970a610c1b58e9e02a49455c85feff2a983162e46df73cb3f175d2c5dfd304f16a6f42f05a8e4a9b64da291fca95fd72520b95566fc89015eb42a83cb

          • C:\bootsect.exe

            Filesize

            95KB

            MD5

            900afcdb6923b58798566101a957809c

            SHA1

            72f4a66de64d6745ceb86ecc123bc958c51b6067

            SHA256

            0f759cd6cf30b90336e9523ba42892b6221144cf0ea38ac49e2f2e1242643180

            SHA512

            722d899668974f36a6b1fe4a10fc7e67d945e6d97ad491d83d036eec2b27126156461673753b3997307b407fac0ab562500acbe7d135e5eecc30002e1ccdf38b

          • \??\Volume{367eaf83-3d79-11ef-ac21-806e6f6e6963}\MHJCS

            Filesize

            314KB

            MD5

            590ca01034604734a72b616a00c082a0

            SHA1

            aa0742708b74a4ca25e9a2bf35374da2ccb6fb35

            SHA256

            ec4f793f3fa5d93106064857cbaf79c39ff76bf776e3c4f9af1257477a3b6424

            SHA512

            7744bef754aa9fb5acc1d94b226a0525df27b8b17a443b7481a500084daf6b678a84a95cd9040a88d7b70c657c4c911c743bf6915b4d47267e0b540dc7c335ea

          • \Users\Admin\AppData\Roaming\HCMH78.exe

            Filesize

            3.6MB

            MD5

            54687dfbd4e31c206ea4036fcad32738

            SHA1

            ff30aea6c549943815418399d389fd179a24b505

            SHA256

            fc761228d8892545e813e763deac19105c3fce15ebd642f5332ad12217402ceb

            SHA512

            7bf3d91fa4a83ab2ff28a8c6c422d113df439be2000a02e878f713a24cb2e2aa98caea3416d141ce519666e96b9a4662afb1d75c7a64118884f868738e379613

          • memory/1312-46-0x0000000002940000-0x0000000002AA2000-memory.dmp

            Filesize

            1.4MB

          • memory/1312-28-0x0000000000230000-0x0000000000231000-memory.dmp

            Filesize

            4KB

          • memory/2644-355-0x0000000000400000-0x00000000004B7000-memory.dmp

            Filesize

            732KB

          • memory/2644-325-0x0000000000400000-0x00000000004B7000-memory.dmp

            Filesize

            732KB

          • memory/2700-352-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2700-318-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2720-317-0x0000000000400000-0x00000000007AD000-memory.dmp

            Filesize

            3.7MB

          • memory/2720-336-0x0000000000400000-0x00000000007AD000-memory.dmp

            Filesize

            3.7MB

          • memory/2816-333-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2816-89-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2816-83-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2816-81-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2816-79-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2816-91-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2816-226-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2816-92-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2816-93-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2816-97-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2940-150-0x00000000002D0000-0x00000000002E1000-memory.dmp

            Filesize

            68KB

          • memory/2940-142-0x0000000010000000-0x0000000010021000-memory.dmp

            Filesize

            132KB

          • memory/2940-134-0x00000000002B0000-0x00000000002C2000-memory.dmp

            Filesize

            72KB

          • memory/2940-129-0x00000000002A0000-0x00000000002B0000-memory.dmp

            Filesize

            64KB

          • memory/2940-121-0x0000000000280000-0x0000000000293000-memory.dmp

            Filesize

            76KB

          • memory/2940-119-0x0000000000400000-0x0000000000623000-memory.dmp

            Filesize

            2.1MB

          • memory/2940-348-0x0000000000400000-0x0000000000623000-memory.dmp

            Filesize

            2.1MB

          • memory/2940-324-0x0000000000400000-0x0000000000623000-memory.dmp

            Filesize

            2.1MB

          • memory/3020-85-0x0000000000400000-0x00000000007AD000-memory.dmp

            Filesize

            3.7MB

          • memory/3020-117-0x0000000003CF0000-0x0000000003F13000-memory.dmp

            Filesize

            2.1MB

          • memory/3020-227-0x0000000003CF0000-0x0000000003F13000-memory.dmp

            Filesize

            2.1MB

          • memory/3020-225-0x0000000000400000-0x00000000007AD000-memory.dmp

            Filesize

            3.7MB

          • memory/3020-86-0x0000000000400000-0x00000000007AD000-memory.dmp

            Filesize

            3.7MB

          • memory/3020-316-0x0000000003CF0000-0x0000000003F13000-memory.dmp

            Filesize

            2.1MB

          • memory/3020-70-0x0000000000400000-0x00000000007AD000-memory.dmp

            Filesize

            3.7MB

          • memory/3020-107-0x0000000003CF0000-0x0000000003F13000-memory.dmp

            Filesize

            2.1MB

          • memory/3020-72-0x0000000000400000-0x00000000007AD000-memory.dmp

            Filesize

            3.7MB

          • memory/3020-73-0x0000000000400000-0x00000000007AD000-memory.dmp

            Filesize

            3.7MB

          • memory/3020-96-0x0000000000400000-0x00000000007AD000-memory.dmp

            Filesize

            3.7MB

          • memory/3020-98-0x0000000000400000-0x00000000007AD000-memory.dmp

            Filesize

            3.7MB

          • memory/3020-116-0x0000000003CF0000-0x0000000003F13000-memory.dmp

            Filesize

            2.1MB

          • memory/3020-351-0x0000000000400000-0x00000000007AD000-memory.dmp

            Filesize

            3.7MB

          • memory/3020-99-0x0000000000400000-0x00000000007AD000-memory.dmp

            Filesize

            3.7MB

          • memory/3020-74-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB