Analysis

  • max time kernel
    153s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2024 03:46

General

  • Target

    fe5abeb99b41caabc40ca3fdc4e32357_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    fe5abeb99b41caabc40ca3fdc4e32357

  • SHA1

    31395d40d0499d83a755e558d16f46a23340b500

  • SHA256

    3de1898cb9ba05922118274f4286962392e3eb63ddb7744ffe3cd3ca9970df1b

  • SHA512

    b2cbdd292881a529fc4eec2423ecdb3603cf52139949557887144816d13617f08919d794af0a4a1aa097d36f48af55956ecc02ced0c175157e20918a6fc5909c

  • SSDEEP

    24576:cjg6rklsxivedtl8wz8iJ2Gqxfrk0mg5jWWPPv/k:ckmklsxw2Dwg2Gg5jXv/k

Malware Config

Extracted

Family

darkcomet

Botnet

Fucked

C2

hidesn.no-ip.org:1604

Mutex

DC_MUTEX-ZEGD8UE

Attributes
  • InstallPath

    System32C/winlogon.exe

  • gencode

    QKzVM5n527Ug

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    winlogon

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies firewall policy service 2 TTPs 6 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Sets file to hidden 1 TTPs 4 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs
  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe5abeb99b41caabc40ca3fdc4e32357_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fe5abeb99b41caabc40ca3fdc4e32357_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:468
    • C:\Users\Admin\AppData\Local\Temp\1.exe
      "C:\Users\Admin\AppData\Local\Temp\1.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies firewall policy service
      • Modifies security service
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Checks computer location settings
      • Executes dropped EXE
      • Windows security modification
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:760
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\1.exe" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:400
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp\1.exe" +s +h
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:1496
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4040
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:4688
    • C:\Users\Admin\AppData\Local\Temp\2.exe
      "C:\Users\Admin\AppData\Local\Temp\2.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies firewall policy service
      • Modifies security service
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Checks computer location settings
      • Executes dropped EXE
      • Windows security modification
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\2.exe" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp\2.exe" +s +h
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:1340
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4620
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:3544
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
          PID:4300
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          3⤵
            PID:2804
          • C:\Windows\SysWOW64\notepad.exe
            notepad
            3⤵
              PID:4336
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3696 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:700

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\1.exe

            Filesize

            756KB

            MD5

            813f1a78f96928559c28ca0e9e893364

            SHA1

            b2a6db617a08f972c5fad15db2dec11f9ec473f7

            SHA256

            d8d4c8d87b35eed612c023f596483a2abd342280971a4eef995488e824a0e452

            SHA512

            1458119161d04f366866d98c8f00edcf985dfad29e20f0b2dea1ea8459c9e77dffddb844cc7d8294ae57b4fc34975347d3f6874e22ed2ed4769bfe08b8a641ac

          • C:\Users\Admin\AppData\Local\Temp\2.exe

            Filesize

            756KB

            MD5

            a3b4f11a867a36b24b1a00d32025b230

            SHA1

            bef76a2a11954d86030cd7b7bcb23648a61f0f12

            SHA256

            015cbf610dd013789e40a9dc415fd422df6038ba733a7f43f076afc410779123

            SHA512

            05f505584db73cf36ec99db073f288c8fdbe95895b6f64ab533985b48f4657cb821e380fcdce27b6ee4ce1ccbaffc8c1298dc52a1dfcdab3f2d0c7c0646f9a9a

          • memory/468-16-0x00007FFED7CC0000-0x00007FFED8661000-memory.dmp

            Filesize

            9.6MB

          • memory/468-3-0x000000001B830000-0x000000001B9B2000-memory.dmp

            Filesize

            1.5MB

          • memory/468-8-0x00007FFED7CC0000-0x00007FFED8661000-memory.dmp

            Filesize

            9.6MB

          • memory/468-2-0x00000000011F0000-0x0000000001200000-memory.dmp

            Filesize

            64KB

          • memory/468-1-0x00007FFED7CC0000-0x00007FFED8661000-memory.dmp

            Filesize

            9.6MB

          • memory/468-29-0x00007FFED7CC0000-0x00007FFED8661000-memory.dmp

            Filesize

            9.6MB

          • memory/468-0-0x00007FFED7CC0000-0x00007FFED8661000-memory.dmp

            Filesize

            9.6MB

          • memory/760-36-0x0000000000400000-0x00000000004CA000-memory.dmp

            Filesize

            808KB

          • memory/760-32-0x0000000000400000-0x00000000004CA000-memory.dmp

            Filesize

            808KB

          • memory/760-38-0x0000000000400000-0x00000000004CA000-memory.dmp

            Filesize

            808KB

          • memory/760-34-0x0000000002510000-0x0000000002511000-memory.dmp

            Filesize

            4KB

          • memory/2544-35-0x00000000022C0000-0x00000000022C1000-memory.dmp

            Filesize

            4KB

          • memory/2544-43-0x0000000000400000-0x00000000004CA000-memory.dmp

            Filesize

            808KB

          • memory/2544-33-0x0000000000400000-0x00000000004CA000-memory.dmp

            Filesize

            808KB

          • memory/2544-49-0x0000000000400000-0x00000000004CA000-memory.dmp

            Filesize

            808KB

          • memory/2544-40-0x0000000000400000-0x00000000004CA000-memory.dmp

            Filesize

            808KB

          • memory/2544-41-0x00000000022C0000-0x00000000022C1000-memory.dmp

            Filesize

            4KB

          • memory/2544-42-0x0000000000400000-0x00000000004CA000-memory.dmp

            Filesize

            808KB

          • memory/2544-37-0x0000000000400000-0x00000000004CA000-memory.dmp

            Filesize

            808KB

          • memory/2544-44-0x0000000000400000-0x00000000004CA000-memory.dmp

            Filesize

            808KB

          • memory/2544-45-0x0000000000400000-0x00000000004CA000-memory.dmp

            Filesize

            808KB

          • memory/2544-46-0x0000000000400000-0x00000000004CA000-memory.dmp

            Filesize

            808KB

          • memory/2544-47-0x0000000000400000-0x00000000004CA000-memory.dmp

            Filesize

            808KB

          • memory/2544-48-0x0000000000400000-0x00000000004CA000-memory.dmp

            Filesize

            808KB

          • memory/4336-39-0x0000000000950000-0x0000000000951000-memory.dmp

            Filesize

            4KB