Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 22:34

General

  • Target

    547b5f8fa22536e6ef421540f6f2308e02e09f841e17676dd16db35f3a01853c.exe

  • Size

    1.3MB

  • MD5

    e30c9b8c07eb6bb88f16c6084879391d

  • SHA1

    09cbc8d0fc7024bc1d413537b2e56265809a8f45

  • SHA256

    547b5f8fa22536e6ef421540f6f2308e02e09f841e17676dd16db35f3a01853c

  • SHA512

    47bdc5c82e5886d57bc8e67307c7e6a21ff47e111dd0f04bb85aafb5d672a5b243f19eae23658e70fc3279cffb89468114015e4b44d21b3001dfb1e2118718e4

  • SSDEEP

    12288:xiemWOmVwMiT1GHu8btht2NziYTSDvcFlRShkyObS4:seOmVwMiToHuAt6ziY6GlRSAO

Malware Config

Extracted

Family

darkcomet

Botnet

route

C2

mkidech.zapto.org:1604

Mutex

DC_MUTEX-MFYHLY2

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    oys3ZZzt6sGy

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\547b5f8fa22536e6ef421540f6f2308e02e09f841e17676dd16db35f3a01853c.exe
    "C:\Users\Admin\AppData\Local\Temp\547b5f8fa22536e6ef421540f6f2308e02e09f841e17676dd16db35f3a01853c.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Local\Temp\GameLauncher.exe
      "C:\Users\Admin\AppData\Local\Temp\GameLauncher.exe"
      2⤵
      • Executes dropped EXE
      PID:2756
    • C:\Users\Admin\AppData\Local\Temp\route.exe
      "C:\Users\Admin\AppData\Local\Temp\route.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
        "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\GameLauncher.exe

    Filesize

    696KB

    MD5

    7adfa5e4db889dafb6849a75bb4dc746

    SHA1

    87f6bcda764ff0c76527ef982af8d3d284fb7e51

    SHA256

    347a8fdb6f338405d08f24ed02be2b7deee891291f827aaaf52709fe738089c3

    SHA512

    b31f47edc94ca6b5468e0f3682fd822d0b81dcb087858fc7de100aecd2280e7c499666d8179b6a4050e2395ee766c79134385c2eff2b2db3cd329bd0fd06656e

  • \Users\Admin\AppData\Local\Temp\route.exe

    Filesize

    333KB

    MD5

    255030cfbfff58432ba7c7e15512047f

    SHA1

    2ec66866e791d094f202d669cc6025dd6434315f

    SHA256

    00d718bc93719b81b487474baf3cdf54ca474abbdc24a57b6f13faa6ea4a02f5

    SHA512

    de3435aef2f1fd1822e9c4ab21cc7f8e67e7fcf4b73359bfee9827a278ac0605dbd827f5e2f59915d8f2ece1a4d12e4266664e4798611c47c9283121a3c68238

  • memory/2232-16-0x0000000002DF0000-0x0000000002ED9000-memory.dmp

    Filesize

    932KB

  • memory/2232-14-0x0000000000400000-0x0000000000553000-memory.dmp

    Filesize

    1.3MB

  • memory/2824-17-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/2824-18-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2824-29-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/2896-31-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/2896-32-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/2896-33-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/2896-35-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB