Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 20:51

General

  • Target

    ebf61961fb9ea495cc4d2eb53ea95fe2_JaffaCakes118.exe

  • Size

    713KB

  • MD5

    ebf61961fb9ea495cc4d2eb53ea95fe2

  • SHA1

    321bc78faf9bacdc2ad4642285710b2062bc2522

  • SHA256

    b9474b5654d989b9e1c8e79eb823323788e007f59ac2fe257cb91ea7e2c7b64c

  • SHA512

    f9bcb9dddb711fd4f36a3b6e741b8cffc4f38130c602ec04624c0b7f23e596b832529b083955a9a3a3d99a663c3c7bf871c8a991069bb59c987a2cdc4faf3c8f

  • SSDEEP

    12288:OaAchpWsuVTv7ItY8XljyypHP7cOLBev03hlULsmWZ++09ZcKDVsgdp:PAEENIq8XwyVPQclDq/+WnpsSp

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebf61961fb9ea495cc4d2eb53ea95fe2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ebf61961fb9ea495cc4d2eb53ea95fe2_JaffaCakes118.exe"
    1⤵
    • Modifies firewall policy service
    • Checks BIOS information in registry
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:3356

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3356-0-0x00000000022B0000-0x00000000022B1000-memory.dmp

          Filesize

          4KB

        • memory/3356-1-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB

        • memory/3356-2-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB

        • memory/3356-3-0x00000000022B0000-0x00000000022B1000-memory.dmp

          Filesize

          4KB

        • memory/3356-4-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB

        • memory/3356-5-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB

        • memory/3356-6-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB

        • memory/3356-7-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB

        • memory/3356-8-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB

        • memory/3356-9-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB

        • memory/3356-10-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB

        • memory/3356-11-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB

        • memory/3356-12-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB

        • memory/3356-13-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB

        • memory/3356-14-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB

        • memory/3356-15-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB