Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    17-04-2024 20:18

General

  • Target

    f6964be59c0dcfc3bcf276ead2eeccd8_JaffaCakes118.exe

  • Size

    661KB

  • MD5

    f6964be59c0dcfc3bcf276ead2eeccd8

  • SHA1

    97de8a0c4d5048d8523e2631f04354f71fb35a3a

  • SHA256

    568c425570f2be7ba94db76f173f1e1812c57b5568cc1c4d20ae94608b90f1d1

  • SHA512

    7ad90806b02180fc2e17e5cfd6db750a36bc4020c61aa418aba739655174391b01609ae9d38f3a7ff4485bb2b52b7d7763753ec23c15df1839d859d98964e05d

  • SSDEEP

    12288:TsBMe3QUYDugu73AUy1uOzOeYFCJAbiIvRNsqZaYVJyc4Nwp:QB/YDuy5zOyAFv3gYVJj4N

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6964be59c0dcfc3bcf276ead2eeccd8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f6964be59c0dcfc3bcf276ead2eeccd8_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\f6964be59c0dcfc3bcf276ead2eeccd8_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f6964be59c0dcfc3bcf276ead2eeccd8_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2088
      • C:\Users\Admin\AppData\Local\Temp\f6964be59c0dcfc3bcf276ead2eeccd8_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\f6964be59c0dcfc3bcf276ead2eeccd8_JaffaCakes118.exe
        3⤵
        • Modifies firewall policy service
        • Modifies security service
        • Windows security bypass
        • Disables RegEdit via registry modification
        • Windows security modification
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1976
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\f6964be59c0dcfc3bcf276ead2eeccd8_JaffaCakes118.exe" +s +h
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Users\Admin\AppData\Local\Temp\f6964be59c0dcfc3bcf276ead2eeccd8_JaffaCakes118.exe" +s +h
            5⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:2756
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2596
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
            5⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:2672
      • C:\Users\Admin\AppData\Local\Temp\f6964be59c0dcfc3bcf276ead2eeccd8_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\f6964be59c0dcfc3bcf276ead2eeccd8_JaffaCakes118.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\f6964be59c0dcfc3bcf276ead2eeccd8_JaffaCakes118.exe

    Filesize

    661KB

    MD5

    f6964be59c0dcfc3bcf276ead2eeccd8

    SHA1

    97de8a0c4d5048d8523e2631f04354f71fb35a3a

    SHA256

    568c425570f2be7ba94db76f173f1e1812c57b5568cc1c4d20ae94608b90f1d1

    SHA512

    7ad90806b02180fc2e17e5cfd6db750a36bc4020c61aa418aba739655174391b01609ae9d38f3a7ff4485bb2b52b7d7763753ec23c15df1839d859d98964e05d

  • memory/1724-7-0x0000000000400000-0x00000000004AD000-memory.dmp

    Filesize

    692KB

  • memory/1976-28-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/1976-13-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1976-55-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1976-54-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1976-26-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1976-15-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1976-17-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1976-19-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1976-21-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1976-23-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1976-24-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1976-25-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1976-35-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1976-27-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1976-36-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/1976-37-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/2088-0-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2088-6-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2088-4-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2088-2-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2088-45-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2088-42-0x0000000000480000-0x00000000004E7000-memory.dmp

    Filesize

    412KB

  • memory/2088-12-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2536-33-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/2536-29-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/2536-40-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/2536-48-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/2536-53-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/2536-31-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB