Overview
overview
10Static
static
10DarkComet-...er.zip
windows10-2004-x64
1DarkComet-....1.zip
windows10-2004-x64
1Darkcomet ...44.skn
windows10-2004-x64
3Darkcomet ...45.skn
windows10-2004-x64
3Darkcomet ...46.skn
windows10-2004-x64
3Darkcomet ...47.skn
windows10-2004-x64
3Darkcomet ...48.skn
windows10-2004-x64
3Darkcomet ...49.skn
windows10-2004-x64
3Darkcomet ...50.skn
windows10-2004-x64
3Darkcomet ...51.skn
windows10-2004-x64
3Darkcomet ...53.skn
windows10-2004-x64
3Darkcomet ...54.skn
windows10-2004-x64
3Darkcomet ...55.skn
windows10-2004-x64
3Darkcomet ...56.skn
windows10-2004-x64
3Darkcomet ...57.skn
windows10-2004-x64
3Darkcomet ...58.skn
windows10-2004-x64
3Darkcomet ...59.skn
windows10-2004-x64
3Darkcomet ...61.skn
windows10-2004-x64
3Darkcomet ...63.skn
windows10-2004-x64
3Darkcomet ...64.skn
windows10-2004-x64
3Darkcomet ...65.skn
windows10-2004-x64
3Darkcomet ...66.skn
windows10-2004-x64
3Darkcomet ...68.skn
windows10-2004-x64
3Darkcomet ...71.skn
windows10-2004-x64
3Darkcomet ...n8.skn
windows10-2004-x64
3Darkcomet ...n9.skn
windows10-2004-x64
3Darkcomet ...03.skn
windows10-2004-x64
3Darkcomet ...99.skn
windows10-2004-x64
3Darkcomet ...P2.skn
windows10-2004-x64
3Darkcomet ...X3.skn
windows10-2004-x64
3Darkcomet ...e3.dll
windows10-2004-x64
3DarkComet-...DME.md
windows10-2004-x64
3Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2025, 10:20
Behavioral task
behavioral1
Sample
DarkComet-RAT-5.3.1-master.zip
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
DarkComet-RAT-5.3.1-master/Darkcomet RAT 5.3.1.zip
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Darkcomet RAT 5.3.1/skins/mxskin44.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral4
Sample
Darkcomet RAT 5.3.1/skins/mxskin45.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Darkcomet RAT 5.3.1/skins/mxskin46.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral6
Sample
Darkcomet RAT 5.3.1/skins/mxskin47.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Darkcomet RAT 5.3.1/skins/mxskin48.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral8
Sample
Darkcomet RAT 5.3.1/skins/mxskin49.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Darkcomet RAT 5.3.1/skins/mxskin50.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral10
Sample
Darkcomet RAT 5.3.1/skins/mxskin51.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
Darkcomet RAT 5.3.1/skins/mxskin53.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral12
Sample
Darkcomet RAT 5.3.1/skins/mxskin54.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
Darkcomet RAT 5.3.1/skins/mxskin55.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral14
Sample
Darkcomet RAT 5.3.1/skins/mxskin56.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
Darkcomet RAT 5.3.1/skins/mxskin57.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral16
Sample
Darkcomet RAT 5.3.1/skins/mxskin58.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
Darkcomet RAT 5.3.1/skins/mxskin59.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral18
Sample
Darkcomet RAT 5.3.1/skins/mxskin61.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
Darkcomet RAT 5.3.1/skins/mxskin63.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral20
Sample
Darkcomet RAT 5.3.1/skins/mxskin64.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
Darkcomet RAT 5.3.1/skins/mxskin65.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral22
Sample
Darkcomet RAT 5.3.1/skins/mxskin66.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
Darkcomet RAT 5.3.1/skins/mxskin68.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral24
Sample
Darkcomet RAT 5.3.1/skins/mxskin71.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
Darkcomet RAT 5.3.1/skins/mxskin8.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral26
Sample
Darkcomet RAT 5.3.1/skins/mxskin9.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
Darkcomet RAT 5.3.1/skins/office2003.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral28
Sample
Darkcomet RAT 5.3.1/skins/solaris99.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
Darkcomet RAT 5.3.1/skins/wmpx-XMP2.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral30
Sample
Darkcomet RAT 5.3.1/skins/wmpx-XMPX3.skn
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
Darkcomet RAT 5.3.1/sqlite3.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral32
Sample
DarkComet-RAT-5.3.1-master/README.md
Resource
win10v2004-20250217-en
General
-
Target
Darkcomet RAT 5.3.1/skins/solaris99.skn
-
Size
10KB
-
MD5
19b941df687a06927a07f3f319add5ea
-
SHA1
7aff0275f225f44d216c98678f1a2c6e4d5101bc
-
SHA256
73049bd60f81dae176e2a3ec2a929a502938a4da673a0cbb2b378b91052d21a9
-
SHA512
5f9dae663f751ef71086854ebd02ff8a7e43be7cd84441b7167dbb9b501464e86b4563ac9aa68437a9bb060b12912a995401c273258ca81e5d2ee6f7b9b5b6b7
-
SSDEEP
192:crP4t5sYbNSxZBZEmXaGbliFB50Zicqmt5buaO4XjQNsiOsiOsTAx:crUsY6BamXpb0Not5buahzQNsiOsiOsY
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "127" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3180 OpenWith.exe 856 LogonUI.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Darkcomet RAT 5.3.1\skins\solaris99.skn"1⤵
- Modifies registry class
PID:620
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3180
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3901855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:856