Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 04:17

General

  • Target

    db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c.exe

  • Size

    818KB

  • MD5

    3f29936a5969953a1ac7b2575c75ce42

  • SHA1

    1012715db3f50f9920e6b087e1c51510240ee4f2

  • SHA256

    db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c

  • SHA512

    d8020f369d48f10662170c90d0224b12e3500b447e5725e628f0e5e2b4cb480e82c2a281a5b29cde87bf13649f74d1f4d49acd908c7be1078df7bbe7ead8d990

  • SSDEEP

    24576:BK4U9Ot+ogFV7gxzq6SOEo9no4DtLIBbl+z2kTh:o4Uw+LF9gJL+om61jh

Malware Config

Extracted

Family

darkcomet

Botnet

Slave

C2

ghost1997.no-ip.biz:1337

Mutex

DC_MUTEX-AZZ26SG

Attributes
  • gencode

    v1pe6tD2bNTU

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Windows security bypass 2 TTPs 1 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c.exe
    "C:\Users\Admin\AppData\Local\Temp\db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\SysWOW64\cmd.exe
      /c net stop MpsSvc
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2164
      • C:\Windows\SysWOW64\net.exe
        net stop MpsSvc
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2180
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop MpsSvc
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2712
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1460
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2316
    • C:\Users\Admin\AppData\Local\Temp\db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c.exe
      C:\Users\Admin\AppData\Local\Temp\db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c.exe
      2⤵
      • Windows security bypass
      • Executes dropped EXE
      • Windows security modification
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c.exe" +s +h
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1176
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp\db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c.exe" +s +h
          4⤵
          • Sets file to hidden
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1508
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1204
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
          4⤵
          • Sets file to hidden
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1500
      • C:\Windows\SysWOW64\notepad.exe
        notepad
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    609022ab499fcebc9bbef18d2fccadf3

    SHA1

    6bd99d9e18a2510870c695c0ba22bece16bc565e

    SHA256

    4447c16d750a01435d3e353266ed7d7db0ca112e2d94d03ae7374b46e4887c3a

    SHA512

    5e28244b34e91c9592ef43a26b40ffca866c3de5757b61550e37adc66f3ef783b0ffb5062e38af95500bc5e726e793581e922260683e858ed1e567cb5b4978c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    541ee1e97aaae74eb2a0adc12719a01c

    SHA1

    4811108377968c86c5a7beee0a1f8046411cf9fa

    SHA256

    30222c624c08eaaf2658c56ae8bfea17bbf75206a66d49e2ba73ab6a0f9d216d

    SHA512

    a16049ed1ae346bc20b86e07bb77da2faf05e8faa8f0f4704d4de2a0d276e884ef1bbe71e48d9916b78cc62180b16c1e1308e2d0426d0dc5b06503201e85ebf2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60a865d2e0001d4d8ac44210b90a2d47

    SHA1

    7164d74d842b1dcc11dfea93137598f8bff8a20c

    SHA256

    7468df6f49e633f81a390d22cce277307dd4b1bc657e0cbaf59782c63d165acb

    SHA512

    18fd8dda69a3eca940f3d2411523883437a4e5fb921c4bb877782c90b9e580feb562a8642709ab745a540f71584d83256d2c9c214ac25cd6a62d56d26204369f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5cfb6beef212605bcd2f87243d7af89

    SHA1

    7b43d5b7a03a10962a1a79a3e92a44fddb68528e

    SHA256

    ce1aeb8028a56d909d158f475426b211a568cfd2fec6e9e42a1819a90e15c3f6

    SHA512

    d35e3d1c2e4c4f5f0013e7aa0b9c3f94002e20a1875c53e5f1959fbcddc6ca5b5e276f518fe8583c804dee00c43b16a8a9cbbc414aef8cd6ee799bd403e38c76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6c87f742fb103e1f77627415a4ad86b

    SHA1

    817df0bf05f601ec027b7de4ada61990f86def00

    SHA256

    a4c3d60a6e8fa27ea597e6b2c145c2bcba9a8de9f24c181c1df1928794160976

    SHA512

    d1d3124d04fb4d8fc96a42dd762e035d6348fe81842a6a397b4287d7c518861c152360bb7ff798f9952992c87859a1aec0d37fb7e5b1cb94685069f543d023d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    edcd72a34127dea4fe651d5807fcc6a5

    SHA1

    1e180d40859b3f837361ee68c0f721f032a3ef68

    SHA256

    12e9b1a0a7b854b6aa3f47ecc6030966fc31da65fec3407d0c4a7767dd4469fe

    SHA512

    8a1f9e997a7f1c71a3f890f340533d1e3027e2ec3a14aa27fe7e0012a807176234e963df62ce395c64bf5802e53a5a79bba84417f9be387813383edf9a3d7288

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    faf1de48f90f156a6d9d5983bc6fff4a

    SHA1

    200e5e51eed90a91b660296cff10ea54189fbc04

    SHA256

    dccc35fc9aef28b8f9622f8206fabc34adf1aa2d3beb59bb42939a276fd4bc4d

    SHA512

    bac7365688773e6f41d3b913d5a44db44b919ac1e438f6b21936ea1991bab86203096fd9d5c9f5eb21741211942d2ee1968fe67349d592819e6fadd845139f3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87204587a7a35371fa8d770f91b7d344

    SHA1

    1f5dbc20d0374b2cfacdf7a56fd9d74d8ac9b75e

    SHA256

    3b9a2e1b078ed4561639037390ffa141291add29f4820e18ea307935954c424c

    SHA512

    8c3a4dafa182d4ce754d1e36479b0bffede582be2a51d8f5d047ac01152233d99dfaabfa3ae387a994bb71a30975547e405b312c90a80e4b8e33b0d135752e47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec1a7446fded99c9a18c9669338ee079

    SHA1

    f035f6b00a9a9a6b04a2f2fc66f2f0acc28e8ca0

    SHA256

    f81b29c7146ad6e5e6c417a80a3a6c2a99dcb50337282c776807b6c370b9b283

    SHA512

    12a860a5900a108fae854cde70ff1cef042826347f61bb81fb00beb9841eb1794578ef98a9debebed1c4d9e0055987ffacdf51c3eeb5c0f59cf97d2cb9f8a054

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a914818c0003c5a1ac778087364fbfa

    SHA1

    f7925e8ec18da78071c74853c5631c8776782c37

    SHA256

    7d51f99e1391c87620f84caf8f0ef9198ae6faa720644a0f2dcfca3e4814d70b

    SHA512

    41b2cf709107462d31f52ee717e7038e65ee3c9665fe699cbee7610fe18de6a7a4f1f7eb6de2855de4d054755fbfc290121c12d3ea9694d8650c5d21da39d3f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    baee3a03d34d346cb4755ace74cdaf1c

    SHA1

    d26ee19a575e699c969bd0c9807520dff70b93b1

    SHA256

    96ddc022de385ffffc1fa1d23d0859285f75c8f0c187995362799626698921ac

    SHA512

    4ab7b584499f64e50f3bda2682960b770b7250a2289d1f4425b7c880c4888fefb91d849647bf6f517683c62efc8998f125ec3468847564ab639746cb504736fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3dd025fae7149f48d3499b8914795753

    SHA1

    50f8031fd4a37a2812891ede77f2a569e23d7d2d

    SHA256

    5647ee14257c931cb05082bbab7a91573f9b000a6868b6a7a65ba2d74518bf38

    SHA512

    fb3f0477f7fd134dbeca18426c39ef76a765e8e608f5f2bd4210180bcb5efab7ef3c6f7fd342759823fb66e5edb5a0f8d5072356c8d5f7454c57790f960c4926

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9af35334cf34bad4c04024aa618b30d5

    SHA1

    50b4773e24e6e5f62dc380bbd558b6000282d910

    SHA256

    54de364e416946ea5546cc5ded3b3aa78f14142f1e67c90554fea08f8a4b1765

    SHA512

    2a27727e32da6e835b437626a7f70e340ed1b23a467231f1a87617c1d1ef371e230ef23fbb54e4f8f501dd393d33d337b8fed100f6c535af399705c19e484e79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f3dd985a5ebedddf340e6837fe7380e

    SHA1

    3027b924f5ebba79ed577a8e4e3c2d984dbfe3e2

    SHA256

    c56616139b68dc2f5b1f2bd642c20159fd2d035343eaa55290d66778a08d69d9

    SHA512

    8e0ffe635cbe8cc48b5aad3a41095bdd24f2d1c9f1737dd11361cce0e0c698d139bfa2e8c05a3227e936a88d507fb39531892d45ede3e697026b49234ff7b658

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    200a43679c845f9081318b5d444bfd7a

    SHA1

    65a37e637f620b4a3110fc9eb713b5b3bd244186

    SHA256

    4d6ff9027e2f5bff3935519f26007552b3fda3796269760b78b754ea29a09c3e

    SHA512

    4d3ab15648d24be0ceef7b8375f925c89baa0f8762aa517879b274b1c43db0f0cfd17c5f4c01eea5eadd3ee839ed35de2ec37413674529984e052850f6e8d4b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    719cb648ffb10dbe768f050eb746820d

    SHA1

    27c61d24b09c9fd35aa84b68eb1cd2790f04a48e

    SHA256

    4ebce09252c7dc759f06b824737e83defec3c71c832f7a5b0be1b407ad43f450

    SHA512

    7cb8ab3b60c4b3dcfe2028a7fa6eb3af5ddd2dcc96fb09bc03f22808dc0ce930c0618c5739cfc7ae3dec46714c57476d0761105ed5fb57874ff0e8613036d12b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b969f580f882234fb77ee73c01656a35

    SHA1

    f1105853becbffd861990faa6a44aece4b0a39b7

    SHA256

    d2710ddd1d50de2649d04855dc1d49343a6951289cc27af35c2a24bc7e61fcaa

    SHA512

    e6444101732d212fbc6f017453385bd908b167590b4ab3e854e79e9009e010a451149664594d2af36b189efebb0a07d0116bcc0f6e0489e044de12d8d1b45bae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    237cf618f3ac772fe1fa7caff37b1bfa

    SHA1

    b2677541539735d4a464e118e952ad976a120231

    SHA256

    39d9ee3e8d820437a8f96a0dd9e2c0909506e389e4e3ab49d83e9ed54d100c09

    SHA512

    31445ae9be73c72e3fef889fc1e7171817475220b4feacb9808f6c6f3d38865de86eb97a09fd19d5c379e9d9cadc29340cc49bfce3d0e2f6d949153b6a83f865

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07d594a4a94e3b0decf11a708479936e

    SHA1

    b46f34cbadaa106d5f26db2dabdd3588181145f3

    SHA256

    4cfe70a568add1018082105f95bc72fbfd74158aa60c825a8e05a2acf0abfd62

    SHA512

    322ecb51f44396ad02fb6c68131b71a876f3dbf351dce81444dbec62300da02ccd2b08c0285ef16b279530484b24fd9d2c7c997c7feac535a07ae5e7c758bded

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    02a813b97153da7e3b44547e284c7ac8

    SHA1

    6104f6babc781f4f25c9d880b3d806fa039fdbb2

    SHA256

    ed0df86d6e24205bde9272c95c347fb31d16c6d213705d372a203b9e3047b456

    SHA512

    200c44e80175d1892a6dd93de508145a0d9938abd5737f362f7d6d581278eab76ff1b43fe6f94362c801a21dd8e4e7e191eca8ef430511142d8560c4ef8fde87

  • C:\Users\Admin\AppData\Local\Temp\CabF01B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF08C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c.exe

    Filesize

    818KB

    MD5

    3f29936a5969953a1ac7b2575c75ce42

    SHA1

    1012715db3f50f9920e6b087e1c51510240ee4f2

    SHA256

    db12ad7e76bce59e18098770a4f2f51eee415423b7c4f9acd53640faba22169c

    SHA512

    d8020f369d48f10662170c90d0224b12e3500b447e5725e628f0e5e2b4cb480e82c2a281a5b29cde87bf13649f74d1f4d49acd908c7be1078df7bbe7ead8d990

  • memory/1460-5-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1480-33-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/1480-71-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/1708-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1708-6-0x0000000000230000-0x0000000000234000-memory.dmp

    Filesize

    16KB

  • memory/2768-12-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2768-20-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2768-8-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2768-29-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2768-10-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2768-72-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2768-502-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2768-504-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2768-14-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2768-30-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2768-22-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2768-24-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2768-28-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2768-18-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2768-16-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2768-31-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2768-32-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2768-73-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB