Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2024 19:35

General

  • Target

    D075589CD45380AAB929C10CE82BABF63533A5025527B1F7F30B55059C5D0AD2.exe

  • Size

    3.0MB

  • MD5

    c5e77ee2c96212dcb64b9ead1b746dd8

  • SHA1

    816610afe4151c9fe59449f30922f68babd665fc

  • SHA256

    d075589cd45380aab929c10ce82babf63533a5025527b1f7f30b55059c5d0ad2

  • SHA512

    2e8418f8b82686a76f83bcf4890909fa2678f7b97c49b02de84f27af2dd503260047983fde4a99a69421dada89caf7db033ade27b1d457e227cc208c02544446

  • SSDEEP

    49152:LAI+iYFsw8ob4+vrrQtgKNnZj/Y4JneyOLHgmk7V5Pz8IF+8Ieg9uRKcT2MOmZuY:LAI+irwbVrsgKrxOLAmk3IIsuIcT2MOg

Malware Config

Extracted

Family

darkcomet

Botnet

THEOLDBACK

C2

cosrem.ddns.net:2301

cosrem.ddnsgeek.com:2301

cosrem.dyndns.org:2301

Mutex

DC_MUTEX-T4DJK1T

Attributes
  • gencode

    cRqpT889gMa4

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\D075589CD45380AAB929C10CE82BABF63533A5025527B1F7F30B55059C5D0AD2.exe
    "C:\Users\Admin\AppData\Local\Temp\D075589CD45380AAB929C10CE82BABF63533A5025527B1F7F30B55059C5D0AD2.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Program Files (x86)\PC Helpsoft\PC Cleaner\PCCleaner.exe
      "C:\Program Files (x86)\PC Helpsoft\PC Cleaner\PCCleaner.exe"
      2⤵
      • Executes dropped EXE
      PID:2312
    • C:\Users\Admin\AppData\Roaming\dllhost.exe
      "C:\Users\Admin\AppData\Roaming\dllhost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hnjVqgcvxF" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD20E.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2944
      • C:\Users\Admin\AppData\Roaming\dllhost.exe
        "C:\Users\Admin\AppData\Roaming\dllhost.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpD20E.tmp

    Filesize

    1KB

    MD5

    a6d44ab190fbbd66eb691544189031fe

    SHA1

    94073a8eaf35e9a84adda5e3e41810b0e28e2e6d

    SHA256

    3848e85a844f15118234f1083d5d218a0ffafc052965e7730a9aeb85eb1ae63e

    SHA512

    8b1afb892d7a9caf36b74b32a4071c0718a8e04798373848f0287df7a7cb1f6a83db9db94221dbe07af7d3ac52e96756a5d62076b85308f62c8ce2892d277944

  • C:\Users\Admin\AppData\Roaming\dllhost.exe

    Filesize

    1.0MB

    MD5

    010b1d2cd7f379d8444180fb1ad1a721

    SHA1

    5798a89f64dbeac6b25d9e1410bfb11467e9c282

    SHA256

    fd553f69d456b3dd2454f4e4ed4a68e74e833db7455081ef110c15fbdc7444a4

    SHA512

    1a78ac744b3649b2e65c65c0d65f9a8dcb7ea470eaa491105a95a53581571f427bf1b3634722a8ecfb5a567c76b1ef04a9d4f5b05d0a8cc692f850d2a2b3fdb2

  • \Program Files (x86)\PC Helpsoft\PC Cleaner\PCCleaner.exe

    Filesize

    1.8MB

    MD5

    732978cd7c578c5b2b3c79b0a9114c2d

    SHA1

    3a97df574f86c9d133406761e8ec51400138e816

    SHA256

    cb5fbbaf0f984d6491d1c83135b849ed14b8dda5805af3bfec5cda77ac5920b3

    SHA512

    aa5d340c6deb1bd3d2ec2e28ee23b5cf51751edc084480bc00146475d4f5fa6aee57c431e874513b57bb9a190ec32ca1d0b667264c0a3ca6af4fe6379cbb9276

  • memory/1668-74-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1668-80-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1668-76-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1668-88-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1668-89-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1668-78-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1668-82-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1668-85-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1668-87-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1668-70-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1668-72-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1668-84-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1668-68-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2112-22-0x00000000036D0000-0x0000000003EB4000-memory.dmp

    Filesize

    7.9MB

  • memory/2112-33-0x00000000036D0000-0x0000000003EB4000-memory.dmp

    Filesize

    7.9MB

  • memory/2112-54-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2112-31-0x00000000036D0000-0x0000000003EB4000-memory.dmp

    Filesize

    7.9MB

  • memory/2112-32-0x00000000036D0000-0x0000000003EB4000-memory.dmp

    Filesize

    7.9MB

  • memory/2112-91-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2312-37-0x0000000000400000-0x0000000000BE4000-memory.dmp

    Filesize

    7.9MB

  • memory/2312-35-0x0000000000400000-0x0000000000BE4000-memory.dmp

    Filesize

    7.9MB

  • memory/2620-61-0x0000000005250000-0x0000000005312000-memory.dmp

    Filesize

    776KB

  • memory/2620-60-0x0000000005770000-0x000000000585E000-memory.dmp

    Filesize

    952KB

  • memory/2620-53-0x00000000005E0000-0x00000000005E8000-memory.dmp

    Filesize

    32KB

  • memory/2620-52-0x0000000001250000-0x000000000135C000-memory.dmp

    Filesize

    1.0MB