Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 22:24

General

  • Target

    547b5f8fa22536e6ef421540f6f2308e02e09f841e17676dd16db35f3a01853c.exe

  • Size

    1.3MB

  • MD5

    e30c9b8c07eb6bb88f16c6084879391d

  • SHA1

    09cbc8d0fc7024bc1d413537b2e56265809a8f45

  • SHA256

    547b5f8fa22536e6ef421540f6f2308e02e09f841e17676dd16db35f3a01853c

  • SHA512

    47bdc5c82e5886d57bc8e67307c7e6a21ff47e111dd0f04bb85aafb5d672a5b243f19eae23658e70fc3279cffb89468114015e4b44d21b3001dfb1e2118718e4

  • SSDEEP

    12288:xiemWOmVwMiT1GHu8btht2NziYTSDvcFlRShkyObS4:seOmVwMiToHuAt6ziY6GlRSAO

Malware Config

Extracted

Family

darkcomet

Botnet

route

C2

mkidech.zapto.org:1604

Mutex

DC_MUTEX-MFYHLY2

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    oys3ZZzt6sGy

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\547b5f8fa22536e6ef421540f6f2308e02e09f841e17676dd16db35f3a01853c.exe
    "C:\Users\Admin\AppData\Local\Temp\547b5f8fa22536e6ef421540f6f2308e02e09f841e17676dd16db35f3a01853c.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\GameLauncher.exe
      "C:\Users\Admin\AppData\Local\Temp\GameLauncher.exe"
      2⤵
      • Executes dropped EXE
      PID:1820
    • C:\Users\Admin\AppData\Local\Temp\route.exe
      "C:\Users\Admin\AppData\Local\Temp\route.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1020
      • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
        "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\GameLauncher.exe

    Filesize

    696KB

    MD5

    7adfa5e4db889dafb6849a75bb4dc746

    SHA1

    87f6bcda764ff0c76527ef982af8d3d284fb7e51

    SHA256

    347a8fdb6f338405d08f24ed02be2b7deee891291f827aaaf52709fe738089c3

    SHA512

    b31f47edc94ca6b5468e0f3682fd822d0b81dcb087858fc7de100aecd2280e7c499666d8179b6a4050e2395ee766c79134385c2eff2b2db3cd329bd0fd06656e

  • C:\Users\Admin\AppData\Local\Temp\route.exe

    Filesize

    333KB

    MD5

    255030cfbfff58432ba7c7e15512047f

    SHA1

    2ec66866e791d094f202d669cc6025dd6434315f

    SHA256

    00d718bc93719b81b487474baf3cdf54ca474abbdc24a57b6f13faa6ea4a02f5

    SHA512

    de3435aef2f1fd1822e9c4ab21cc7f8e67e7fcf4b73359bfee9827a278ac0605dbd827f5e2f59915d8f2ece1a4d12e4266664e4798611c47c9283121a3c68238

  • memory/1020-22-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/1020-23-0x00000000021B0000-0x00000000021B1000-memory.dmp

    Filesize

    4KB

  • memory/1020-36-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/1948-21-0x0000000000400000-0x0000000000553000-memory.dmp

    Filesize

    1.3MB

  • memory/3952-37-0x0000000002090000-0x0000000002091000-memory.dmp

    Filesize

    4KB

  • memory/3952-38-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/3952-39-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/3952-41-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/3952-43-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/3952-45-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/3952-49-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/3952-51-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB