Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 14:40

General

  • Target

    196b46719d806782360be5b38c06d69ea585e2bf313b2af6fc2fafa65df34136N.exe

  • Size

    1.2MB

  • MD5

    c9f7c23a4105e1269d9aeea7f3ff6a70

  • SHA1

    3dbcac66eee0330000d7644aafcddc83280c8c22

  • SHA256

    196b46719d806782360be5b38c06d69ea585e2bf313b2af6fc2fafa65df34136

  • SHA512

    caa3607cc4555ce22c9f96da7c8863d00905dd4126df49c0c0d58239c4840eb65c34be2ca05f423a15a5d28f9b4881632d3488b9f9e7bb9ec5766cc9b6d6da5e

  • SSDEEP

    12288:f2FRv2FRN2FRh2FRIuI0Q5idun7RE529VLgoSf9dyFVuIQ/jLNp1c9LZ4VC:IuI08idO1EG/zuRW6VC

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

marcel.no-ip.org:1604

Mutex

DC_MUTEX-J9U2RA3

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    kk6imTnrgZfJ

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\196b46719d806782360be5b38c06d69ea585e2bf313b2af6fc2fafa65df34136N.exe
    "C:\Users\Admin\AppData\Local\Temp\196b46719d806782360be5b38c06d69ea585e2bf313b2af6fc2fafa65df34136N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\196b46719d806782360be5b38c06d69ea585e2bf313b2af6fc2fafa65df34136N.exe
      "C:\Users\Admin\AppData\Local\Temp\196b46719d806782360be5b38c06d69ea585e2bf313b2af6fc2fafa65df34136N.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\GEHEIM.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:2796
      • C:\Users\Admin\AppData\Local\Temp\VIRUS.EXE
        "C:\Users\Admin\AppData\Local\Temp\VIRUS.EXE"
        3⤵
        • Modifies WinLogon for persistence
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2364
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\VIRUS.EXE" +s +h
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Users\Admin\AppData\Local\Temp\VIRUS.EXE" +s +h
            5⤵
            • Sets file to hidden
            • System Location Discovery: System Language Discovery
            • Views/modifies file attributes
            PID:2888
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3004
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
            5⤵
            • Sets file to hidden
            • System Location Discovery: System Language Discovery
            • Views/modifies file attributes
            PID:1932
        • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
          "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2600
          • C:\Windows\SysWOW64\notepad.exe
            notepad
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\GEHEIM.TXT

    Filesize

    18B

    MD5

    5ae58a6fc8b238e8838c1a49e8557eaf

    SHA1

    df81e6640eb11fc475de52aa1763dc781fc67365

    SHA256

    0cf2be8e4311df50eb2b7cd229af8687c0ab117313cecc3a10ff28a85e3723db

    SHA512

    59862e38437d46e1e697f1460d3df8f1c24c4b5485d28fcddd009c4995cc8f8987a9eb615ec4e9f8b245943039713c505258b4c33193dd41ad0949082aec54c0

  • \Users\Admin\AppData\Local\Temp\VIRUS.EXE

    Filesize

    690KB

    MD5

    529c8a0b5954c4d030d9107794b65d0c

    SHA1

    b9d91ee857529f17b33f9ea49141e41e73562085

    SHA256

    781859c0b39a5773a0e706bd87506bd1867de6678d87a61b0a4c64aba75d7410

    SHA512

    0a91b8f1a1a70d2cac32822d13f5b133bb16a29352de95898ba70c4ac34b9f59a0e9eecb86952be53939af237fe1856e7ef97694904ee0e3007a7c096dc6b3eb

  • memory/1948-84-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/1948-46-0x00000000000C0000-0x00000000000C1000-memory.dmp

    Filesize

    4KB

  • memory/2052-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2052-17-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/2052-10-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/2052-8-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/2052-6-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/2052-4-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/2052-15-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/2052-32-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/2052-19-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/2052-2-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/2052-12-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/2364-85-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2600-86-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2600-87-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2600-88-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2600-89-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2600-90-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2600-91-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB