Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 00:06

General

  • Target

    218189c3a94be13dc3fc46ce0583159aa4e4f57f136b3283435d70890e2dacefN.exe

  • Size

    966KB

  • MD5

    6c3c1088500350d9ff8c0869177ef5f0

  • SHA1

    3da4fdd97fe1264bf1da9c14b24abdad3bc741ce

  • SHA256

    218189c3a94be13dc3fc46ce0583159aa4e4f57f136b3283435d70890e2dacef

  • SHA512

    52425e86bc82802c858a5ae954aeafb47f4f6dafbcf8c5aecc40ce560007de090a02a8ca5a83dfbaca396428f852022d07bed08419183a0a9a62c1d30e5b16dd

  • SSDEEP

    12288:N3TD4DnRfwKl+znaNpofSsa9Pi+W9iXqpea3wJWIfBT3PGUE0/DrRrPGVz:FTQuKl+zsUC6J9i+3wJRT3PI0/xGx

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

74.65.183.83:1604

74.65.183.83:25565

74.65.183.83:1122

74.65.183.83:100

Mutex

DC_MUTEX-XH87550

Attributes
  • InstallPath

    WindowsUpdate.exe

  • gencode

    MwBxQSYoXbQb

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    WindoesUpdate.dll

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 6 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables Task Manager via registry modification
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\218189c3a94be13dc3fc46ce0583159aa4e4f57f136b3283435d70890e2dacefN.exe
    "C:\Users\Admin\AppData\Local\Temp\218189c3a94be13dc3fc46ce0583159aa4e4f57f136b3283435d70890e2dacefN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\dll.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4432
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\BlackWidowV4CrackedBySkullTeam.sfx.exe
        BlackWidowV4CrackedBySkullTeam.sfx -parrow1998 -dC:\Users\Admin\AppData\Roaming
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\BlackWidowV4CrackedBySkullTeam.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\BlackWidowV4CrackedBySkullTeam.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4000
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\RarSFX1\BlackWidowV4CrackedBySkullTeam.exe" +s +h
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:208
            • C:\Windows\SysWOW64\attrib.exe
              attrib "C:\Users\Admin\AppData\Local\Temp\RarSFX1\BlackWidowV4CrackedBySkullTeam.exe" +s +h
              6⤵
              • Sets file to hidden
              • System Location Discovery: System Language Discovery
              • Views/modifies file attributes
              PID:1428
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\RarSFX1" +s +h
            5⤵
            • System Location Discovery: System Language Discovery
            PID:180
            • C:\Windows\SysWOW64\attrib.exe
              attrib "C:\Users\Admin\AppData\Local\Temp\RarSFX1" +s +h
              6⤵
              • Sets file to hidden
              • System Location Discovery: System Language Discovery
              • Views/modifies file attributes
              PID:648
          • C:\Windows\SysWOW64\notepad.exe
            notepad
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2188
          • C:\WindowsUpdate.exe
            "C:\WindowsUpdate.exe"
            5⤵
            • Modifies firewall policy service
            • Modifies security service
            • Windows security bypass
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Windows security modification
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:1208
            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
              "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
              6⤵
              • Modifies firewall policy service
              • Modifies security service
              • Windows security bypass
              • Disables RegEdit via registry modification
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3472
              • C:\Windows\SysWOW64\notepad.exe
                notepad
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\BlackWidowV4CrackedBySkullTeam.sfx.exe

    Filesize

    519KB

    MD5

    4b7cf29e9744da36f072c88a9372395a

    SHA1

    c9e206d3d81c8b604860c3dd379ee059676aa409

    SHA256

    00f0d8dd7eb761c34048df8706a526963150d95f592ef7e9bb4caa93947114bb

    SHA512

    418be4347a2cc3a50059d707a5a438f707c1385b013a7409d95139b6b8f22f1416d576c6d1c44eea4e930803a50888e0a109c4b2b23c40c4f96f84e5d6a7e303

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dll.bat

    Filesize

    58B

    MD5

    d2f7f27d6885c2afea6c3ad5bc6c1190

    SHA1

    f2b23abe2f2d90ca61b1b356e7e125b1f7d41798

    SHA256

    1c4d169e0bb2016066e4e545c89426addb0aaaf58240d2740be8d85753b94261

    SHA512

    35d50b0c23725d40b15e0b7627e8228f02cd26b606c1d2815d1f2ff03ee5098877ab52d8527987b46d425ea34ea258d4710a7f48555a70b8afce5863c1442caa

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\BlackWidowV4CrackedBySkullTeam.exe

    Filesize

    1004KB

    MD5

    997c248b8c1ff1e99aaa40e8384331f4

    SHA1

    ca765e630e0fb9ab4837ea0389c012cf12da02f6

    SHA256

    3a4da5311a97fa8a4e8142b6e4847e9effd69b3d6abe7c3bd0a5922cf1bc3cf2

    SHA512

    19a98ba43953fdb7acd721b1fdc3ee96d6964820b04cea6538fe835d0d0047d38ff76f11d9525eb339c9e489e55c0d752ab6cc2eddf1cd7336772dfb00a90166

  • memory/1208-36-0x0000000000400000-0x0000000000508000-memory.dmp

    Filesize

    1.0MB

  • memory/2188-24-0x0000000000570000-0x0000000000571000-memory.dmp

    Filesize

    4KB

  • memory/3472-35-0x0000000000400000-0x0000000000508000-memory.dmp

    Filesize

    1.0MB

  • memory/4000-38-0x0000000000400000-0x0000000000508000-memory.dmp

    Filesize

    1.0MB

  • memory/4676-37-0x00000000004F0000-0x00000000004F1000-memory.dmp

    Filesize

    4KB