Threat name:
Darkcomet njRat RevengeRAT
Alert
Classification:
rans.troj.adwa.spyw.evad
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes the view of files in windows explorer (hidden files and folders)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to log keystrokes
Contains functionality to log keystrokes (.Net Source)
Contains functionalty to change the wallpaper
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Disables windows user account control
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files to the document folder of the user
Drops PE files to the startup folder
Drops VBS files to the startup folder
Found malware configuration
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potential malicious VBS script found (has network functionality)
Protects its processes via BreakOnTermination flag
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Sigma detected: Drops script at startup location
Sigma detected: Register Wscript In Run Key
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Uses dynamic DNS services
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
Windows Shell Script Host drops VBS files
Writes to foreign memory regions
Wscript called in batch mode (surpress errors)
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
330348
Sample:
mcyl1aQlAL.exe
Startdate:
14/12/2020
Architecture:
WINDOWS
Score:
100
83
canonicalizer.ucsuri.tcs
2->83
85
552020.ddns.net
2->85
87
prda.aadg.msidentity.com
2->87
95
Sigma detected: Register
Wscript In Run Key
2->95
97
Snort IDS alert for
network traffic (e.g.
based on Emerging Threat
rules)
2->97
99
Found malware configuration
2->99
101
31 other signatures
2->101
9
mcyl1aQlAL.exe
1
5
2->9
started
12
chrome.exe
4
2->12
started
14
Alternative Flash Playe.exe
3
2->14
started
16
3 other processes
2->16
signatures3
process4
file5
57
C:\Users\user\...\Alternative Flash Playe.exe, PE32
9->57
dropped
59
C:\Users\user\AppData\...\mcyl1aQlAL.exe.log, ASCII
9->59
dropped
18
Alternative Flash Playe.exe
7
12
9->18
started
61
C:\Users\user\AppData\Roaming\chrome.exe, PE32
12->61
dropped
23
chrome.exe
12->23
started
process6
dnsIp7
89
552020.ddns.net
41.232.107.99, 1177, 1604, 333
TE-ASTE-ASEG
Egypt
18->89
49
C:\Users\user\AppData\Roaming\...\wwww.exe, PE32
18->49
dropped
51
C:\Users\user\AppData\Roaming\...\google.exe, PE32
18->51
dropped
53
C:\Users\user\AppData\Roaming\...\dark.exe, PE32
18->53
dropped
55
3 other malicious files
18->55
dropped
103
Creates autostart registry
keys with suspicious
names
18->103
105
Creates multiple autostart
registry keys
18->105
25
wwww.exe
18->25
started
29
dark.exe
18->29
started
31
wscript.exe
18->31
started
33
4 other processes
18->33
107
Antivirus detection
for dropped file
23->107
109
Machine Learning detection
for dropped file
23->109
file8
signatures9
process10
dnsIp11
63
C:\Users\user\Documents\UNKRLCVOHV\wwww.exe, PE32
25->63
dropped
65
C:\Users\user\Documents\TQDFJHPUIU\wwww.exe, PE32
25->65
dropped
67
C:\Users\user\Documents\SQSJKEBWDT\wwww.exe, PE32
25->67
dropped
75
20 other files (10 malicious)
25->75
dropped
119
Protects its processes
via BreakOnTermination
flag
25->119
121
Changes the view of
files in windows explorer
(hidden files and folders)
25->121
123
Creates multiple autostart
registry keys
25->123
125
Modifies the hosts file
25->125
36
netsh.exe
25->36
started
69
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe, PE32
29->69
dropped
127
Creates an undocumented
autostart registry key
29->127
129
Drops executables to
the windows directory
(C:\Windows) and
starts them
29->129
131
Creates an autostart
registry key pointing
to binary in C:\Windows
29->131
139
3 other signatures
29->139
38
msdcsc.exe
29->38
started
42
notepad.exe
29->42
started
71
C:\Users\user\AppData\Local\Temp\test.vbs, ASCII
31->71
dropped
133
Potential malicious
VBS script found (has
network functionality)
31->133
135
Windows Shell Script
Host drops VBS files
31->135
137
Drops VBS files to the
startup folder
31->137
141
2 other signatures
31->141
44
wscript.exe
31->44
started
79
552020.ddns.net
33->79
81
192.168.2.1
unknown
unknown
33->81
73
C:\Users\user\AppData\Local\Temp\google.exe, PE32
33->73
dropped
47
conhost.exe
33->47
started
file12
signatures13
process14
dnsIp15
91
552020.ddns.net
38->91
111
Disables UAC (registry)
38->111
113
Installs a global keyboard
hook
38->113
115
Disables windows user
account control
38->115
93
552020.ddns.net
44->93
77
C:\Users\user\AppData\Roaming\...\test.vbs, ASCII
44->77
dropped
117
System process connects
to network (likely due
to code injection or
exploit)
44->117
file16
signatures17
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.