Analysis

  • max time kernel
    92s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2025 16:43

General

  • Target

    fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe

  • Size

    500KB

  • MD5

    7b0efc4e44f8bb612a1506db5ab5aa0e

  • SHA1

    b71347881754796387238c3741b480f1e8c92b5e

  • SHA256

    fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c

  • SHA512

    2a00bb9541af1a1b22e8b4c55ba7ace3a64e2a27c052b7d78b55a1d1104fc046021784f079379bcf82947285bb5465f03d3b71f7546d61f156aac488bf3e4742

  • SSDEEP

    12288:XHSqctaCAAEZOu8so1G51zlU1wM+AQYMyR00Z:XHSDa7JZOu8sbzU1IA7L+0Z

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Uses the VBS compiler for execution 1 TTPs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NTFS ADS 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe
    "C:\Users\Admin\AppData\Local\Temp\fe7e861f25edd070d70dd0551ef3ffa67bdd4e4527d07738b55bb60f38554a3c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2696
    • C:\Windows\system32\cmd.exe
      "cmd"
      2⤵
      • Subvert Trust Controls: Mark-of-the-Web Bypass
      • NTFS ADS
      PID:2784
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2876-0-0x000007FEF58FE000-0x000007FEF58FF000-memory.dmp

    Filesize

    4KB

  • memory/2876-1-0x000000001AED0000-0x000000001AF4C000-memory.dmp

    Filesize

    496KB

  • memory/2876-2-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2876-3-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2876-5-0x0000000000C30000-0x0000000000C35000-memory.dmp

    Filesize

    20KB

  • memory/2876-7-0x000000001B120000-0x000000001B1D5000-memory.dmp

    Filesize

    724KB

  • memory/2876-8-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB