Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 09:24

General

  • Target

    10174037f6bab4969360f655ef10a911e535d19b2c731fbe95623b1855050903.exe

  • Size

    966KB

  • MD5

    22977eaececc124b167967723f591e76

  • SHA1

    b209dc0f7a983c03a80885607b826f3e6879b4bc

  • SHA256

    10174037f6bab4969360f655ef10a911e535d19b2c731fbe95623b1855050903

  • SHA512

    ffd739b82dee5791cf4a932d1d8f7a67d14ec851cc49a433cf404cbc885b785eba67848131365ce38cddd5940dd1174b18ec21572301fcc074f2faed599a40f7

  • SSDEEP

    12288:N3TD4DnRfwKl+znaNpofSsa9Pi+W9iXqpea3wJWIfBT3PGUE0/DrRrPGVJ:FTQuKl+zsUC6J9i+3wJRT3PI0/xGj

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

74.65.183.83:1604

74.65.183.83:25565

74.65.183.83:1122

74.65.183.83:100

Mutex

DC_MUTEX-XH87550

Attributes
  • InstallPath

    WindowsUpdate.exe

  • gencode

    MwBxQSYoXbQb

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    WindoesUpdate.dll

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10174037f6bab4969360f655ef10a911e535d19b2c731fbe95623b1855050903.exe
    "C:\Users\Admin\AppData\Local\Temp\10174037f6bab4969360f655ef10a911e535d19b2c731fbe95623b1855050903.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\dll.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3616
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\BlackWidowV4CrackedBySkullTeam.sfx.exe
        BlackWidowV4CrackedBySkullTeam.sfx -parrow1998 -dC:\Users\Admin\AppData\Roaming
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3036
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\BlackWidowV4CrackedBySkullTeam.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\BlackWidowV4CrackedBySkullTeam.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4268
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\RarSFX1\BlackWidowV4CrackedBySkullTeam.exe" +s +h
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4884
            • C:\Windows\SysWOW64\attrib.exe
              attrib "C:\Users\Admin\AppData\Local\Temp\RarSFX1\BlackWidowV4CrackedBySkullTeam.exe" +s +h
              6⤵
              • Sets file to hidden
              • System Location Discovery: System Language Discovery
              • Views/modifies file attributes
              PID:2520
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\RarSFX1" +s +h
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1792
            • C:\Windows\SysWOW64\attrib.exe
              attrib "C:\Users\Admin\AppData\Local\Temp\RarSFX1" +s +h
              6⤵
              • Sets file to hidden
              • System Location Discovery: System Language Discovery
              • Views/modifies file attributes
              PID:4316
          • C:\Windows\SysWOW64\notepad.exe
            notepad
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1916
          • C:\WindowsUpdate.exe
            "C:\WindowsUpdate.exe"
            5⤵
            • Modifies firewall policy service
            • Modifies security service
            • Windows security bypass
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Windows security modification
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:4076
            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
              "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
              6⤵
                PID:4892
              • C:\Windows\explorer.exe
                "C:\Windows\explorer.exe"
                6⤵
                  PID:2648
                • C:\Windows\SysWOW64\notepad.exe
                  notepad
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:2304

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\BlackWidowV4CrackedBySkullTeam.sfx.exe

        Filesize

        519KB

        MD5

        4b7cf29e9744da36f072c88a9372395a

        SHA1

        c9e206d3d81c8b604860c3dd379ee059676aa409

        SHA256

        00f0d8dd7eb761c34048df8706a526963150d95f592ef7e9bb4caa93947114bb

        SHA512

        418be4347a2cc3a50059d707a5a438f707c1385b013a7409d95139b6b8f22f1416d576c6d1c44eea4e930803a50888e0a109c4b2b23c40c4f96f84e5d6a7e303

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dll.bat

        Filesize

        58B

        MD5

        d2f7f27d6885c2afea6c3ad5bc6c1190

        SHA1

        f2b23abe2f2d90ca61b1b356e7e125b1f7d41798

        SHA256

        1c4d169e0bb2016066e4e545c89426addb0aaaf58240d2740be8d85753b94261

        SHA512

        35d50b0c23725d40b15e0b7627e8228f02cd26b606c1d2815d1f2ff03ee5098877ab52d8527987b46d425ea34ea258d4710a7f48555a70b8afce5863c1442caa

      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\BlackWidowV4CrackedBySkullTeam.exe

        Filesize

        1004KB

        MD5

        997c248b8c1ff1e99aaa40e8384331f4

        SHA1

        ca765e630e0fb9ab4837ea0389c012cf12da02f6

        SHA256

        3a4da5311a97fa8a4e8142b6e4847e9effd69b3d6abe7c3bd0a5922cf1bc3cf2

        SHA512

        19a98ba43953fdb7acd721b1fdc3ee96d6964820b04cea6538fe835d0d0047d38ff76f11d9525eb339c9e489e55c0d752ab6cc2eddf1cd7336772dfb00a90166

      • memory/1916-24-0x00000000010F0000-0x00000000010F1000-memory.dmp

        Filesize

        4KB

      • memory/2304-35-0x0000000000E60000-0x0000000000E61000-memory.dmp

        Filesize

        4KB

      • memory/4076-38-0x0000000000400000-0x0000000000508000-memory.dmp

        Filesize

        1.0MB

      • memory/4076-40-0x0000000000400000-0x0000000000508000-memory.dmp

        Filesize

        1.0MB

      • memory/4268-36-0x0000000000400000-0x0000000000508000-memory.dmp

        Filesize

        1.0MB