Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/02/2025, 08:52

General

  • Target

    9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe

  • Size

    618KB

  • MD5

    fc6644242e58080f167d46d04cdb71e1

  • SHA1

    9880ec5e986863a70b3c67a202d192823dde3ffc

  • SHA256

    9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53

  • SHA512

    799d56eb3a06e95b043f11e8389a88fbeb2f2e2a125839985d87938cc50df7388b07ff88a93af3eee91c3bf05dbed509355aced73f14fa1917b2c07dec7ef2b4

  • SSDEEP

    12288:00nyfXuIBDtfuEQYu2G3S4ivrAhiUdNIHlYOG0Qqdn:Bny/f9uEQYFG3S4snyMbpvn

Malware Config

Extracted

Family

darkcomet

Botnet

Noob

C2

qwezzkomet.ddns.net:1604

Mutex

DC_MUTEX-QLSEJBG

Attributes
  • InstallPath

    IME\en-US\winint.exe

  • gencode

    iE1Pc1blaQlU

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    NT Kernel & System

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe
    "C:\Users\Admin\AppData\Local\Temp\9e289b23122e14ef9a6b10d7012b1f144e6f4b1fec368fcc7c7e3da7f166ab53.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\IME\en-US\Core\Start.exe
      "C:\Windows\IME\en-US\Core\Start.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\EADC.tmp\Start.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3004
        • C:\Windows\IME\en-US\Core\Core.exe
          Core.exe -p34533f5353fh443gi45g3hgio4h
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2536
          • C:\Windows\IME\en-US\svchost.exe
            "C:\Windows\IME\en-US\svchost.exe"
            5⤵
            • Modifies WinLogon for persistence
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2352
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\IME\en-US\svchost.exe" +s +h
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2476
              • C:\Windows\SysWOW64\attrib.exe
                attrib "C:\Windows\IME\en-US\svchost.exe" +s +h
                7⤵
                • Sets file to hidden
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Views/modifies file attributes
                PID:1500
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\IME\en-US" +s +h
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2636
              • C:\Windows\SysWOW64\attrib.exe
                attrib "C:\Windows\IME\en-US" +s +h
                7⤵
                • Sets file to hidden
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Views/modifies file attributes
                PID:1204
            • C:\Users\Admin\AppData\Local\Temp\DEL.EXE
              "C:\Users\Admin\AppData\Local\Temp\DEL.EXE"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2116
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\5EA.tmp\Del.bat" "
                7⤵
                • System Location Discovery: System Language Discovery
                PID:584
            • C:\Windows\SysWOW64\notepad.exe
              notepad
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1372
            • C:\Windows\IME\en-US\winint.exe
              "C:\Windows\IME\en-US\winint.exe"
              6⤵
              • Modifies firewall policy service
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1664
              • C:\Windows\SysWOW64\notepad.exe
                notepad
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5EA.tmp\Del.bat

    Filesize

    35B

    MD5

    0dd7be343d4c404c956c220e2d595a00

    SHA1

    68ce8c2be7e17d449bee35b8cd257ccac0892c72

    SHA256

    149ee28a3041b49aec3f259a2060aa0e8f6791f42163e0cc22a57c3377a55795

    SHA512

    9d58f3e3963c9296353ec92993964333580c6fc1fbdd9c8506871422f2ed17b5128c09900804414121c20d138c5e1f0acd69022b8af7c62177f464888a6d6fd9

  • C:\Users\Admin\AppData\Local\Temp\DEL.EXE

    Filesize

    24KB

    MD5

    e8d073b16af601c459cf0a2fe6273cde

    SHA1

    93ddddfd1f1b98ea37d9faa9af34c7552f079d11

    SHA256

    7f3edd352c0e933867ef0511347087013fff8defc6afdfffcb422eb9cd0c1f18

    SHA512

    9cca8c056b2019c31177c7ebad6e1b2ef873d364da7878e2e9004170cc3ede506ada4fcda69cc753a2a40a4b854a1eaa1d5d708818617db73c4f5314d118fcd4

  • C:\Users\Admin\AppData\Local\Temp\EADC.tmp\Start.bat

    Filesize

    38B

    MD5

    87d911d7e2a82e8c4ef5553240009a1c

    SHA1

    e1418a471c277148376a3ba32baf5cb0248ad62a

    SHA256

    463369daa69218c1b91b025bd59696e68096f612df75d45a69c6331183fa20bc

    SHA512

    d9af43381cd4e06f105b6fe212d42e7187d538a405d38fbf76dcaa3e7b35b67fe11788983c3864db939323ad10d05d3767479058cac977794ced7358b8bb7e86

  • C:\Windows\IME\en-US\Core\Core.exe

    Filesize

    492KB

    MD5

    1e3e929e3322895842b017ec1388e0d5

    SHA1

    df4a8eb2a3e49aa67edc018759dbdec602ab4852

    SHA256

    31275bd110dc0013ab7c510b77a2eb3b4a14adc41f3ccb0ef8a455810a37f45d

    SHA512

    bdc2e226dde7bed4c8a64a734a10ceaa3b353ca29cf89a13017816541b391bf45053b3698398d3fb6e7c112d21e05b76d0898085d965847e09668d1f952bbba5

  • \Windows\IME\en-US\Core\Start.exe

    Filesize

    24KB

    MD5

    aea720b21fa014a1dbeb6880fca9db3c

    SHA1

    7431f43fefc4ee84d740146e85ad8d91c851449f

    SHA256

    2c09a12c001c082c60cf43f984af4bd627987810bfcc735d5fe5e91f0423b4e3

    SHA512

    e9a332063573218c7bf34cc73289e3841e6d98f1adaba83477c470867cb6fa1387a0d1298610cbd73d6f14afd6d979e9f0a69e3eed60dd876aacf46d8680fbe7

  • \Windows\IME\en-US\svchost.exe

    Filesize

    683KB

    MD5

    2d3ff8b3115e8822031a345ae5be8a70

    SHA1

    5a5930fd44b1ae87116fa6217ebe4204f0798f13

    SHA256

    a8b6ac32953856542c656a18d28e177b3f32472e5ba43a618e9bf25ed5e23ab6

    SHA512

    75207a079e07d974ad219b544af366e3dc588a1e8ee0926ab4c94e7fa5f90351592ed6ad611a50ff91db6b319824f81e1de2036e4bd4181584ce083b31048ae7

  • memory/1372-121-0x0000000000160000-0x0000000000161000-memory.dmp

    Filesize

    4KB

  • memory/1372-93-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/2084-18-0x00000000035A0000-0x00000000035B0000-memory.dmp

    Filesize

    64KB

  • memory/2084-19-0x00000000035A0000-0x00000000035B0000-memory.dmp

    Filesize

    64KB

  • memory/2084-7-0x0000000003590000-0x00000000035A0000-memory.dmp

    Filesize

    64KB

  • memory/2116-92-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2116-75-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2352-73-0x00000000035E0000-0x00000000035F0000-memory.dmp

    Filesize

    64KB

  • memory/2352-72-0x00000000035E0000-0x00000000035F0000-memory.dmp

    Filesize

    64KB

  • memory/2888-60-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2888-22-0x000000000040E000-0x000000000040F000-memory.dmp

    Filesize

    4KB

  • memory/2888-21-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB