Analysis

  • max time kernel
    154s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 00:53

General

  • Target

    fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe

  • Size

    756KB

  • MD5

    fb8e1534329adc7639e908f62b48bb52

  • SHA1

    82385f786fe919ec65311c36280ec7d2de02c564

  • SHA256

    e62a4691aa6400e577127e91a57a6b3a8636836b234c885099dffd90be98f072

  • SHA512

    55f58d7f8698bd53c94cea21e7d98ab67cf47a1b2614b1aa19f67716691b947723d8559a54cb98f10a7a5483883accfef674c53f01c2a4ee94acc93ab0ea341f

  • SSDEEP

    12288:d9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9EkNC/aMsE3:3Z1xuVVjfFoynPaVBUR8f+kN10Eda+3

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

soronopkzelite.no-ip.org:70

Mutex

DC_MUTEX-6QU9SKK

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    iSevFmhtikT2

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 2 TTPs 6 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe" +s +h
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe" +s +h
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:488
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3340
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:4776
    • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
      "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
      2⤵
      • Modifies firewall policy service
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5108
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies firewall policy service
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2228
        • C:\Windows\SysWOW64\notepad.exe
          notepad
          4⤵
            PID:1392
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3972 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2324

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

        Filesize

        756KB

        MD5

        fb8e1534329adc7639e908f62b48bb52

        SHA1

        82385f786fe919ec65311c36280ec7d2de02c564

        SHA256

        e62a4691aa6400e577127e91a57a6b3a8636836b234c885099dffd90be98f072

        SHA512

        55f58d7f8698bd53c94cea21e7d98ab67cf47a1b2614b1aa19f67716691b947723d8559a54cb98f10a7a5483883accfef674c53f01c2a4ee94acc93ab0ea341f

      • memory/1392-18-0x0000000000230000-0x0000000000231000-memory.dmp

        Filesize

        4KB

      • memory/1804-0-0x0000000000400000-0x00000000004CA000-memory.dmp

        Filesize

        808KB

      • memory/1804-1-0x00000000023D0000-0x00000000023D1000-memory.dmp

        Filesize

        4KB

      • memory/1804-14-0x0000000000400000-0x00000000004CA000-memory.dmp

        Filesize

        808KB

      • memory/2228-16-0x0000000000400000-0x00000000004CA000-memory.dmp

        Filesize

        808KB

      • memory/5108-15-0x00000000006B0000-0x00000000006B1000-memory.dmp

        Filesize

        4KB

      • memory/5108-17-0x0000000000400000-0x00000000004CA000-memory.dmp

        Filesize

        808KB