Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    29-04-2024 02:32

General

  • Target

    06a15ab711359ca5c66335039793daaf_JaffaCakes118.exe

  • Size

    770KB

  • MD5

    06a15ab711359ca5c66335039793daaf

  • SHA1

    95bd3194b060bc8e775e5bc0a76bc6dc0094a70b

  • SHA256

    f51a0aa16b0a033eaeb45e5bbea6b492b499a0af1404309882f333f18f4e890a

  • SHA512

    925fe2815b0ff212a26b1d1e63de27c44f83069c9a8b3643f114c28b9b6764ca867e5039324ca92174730f777dcd75e5f4f43b13583ff8ad599fbe810a58f998

  • SSDEEP

    12288:P9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9EkNC/B:5Z1xuVVjfFoynPaVBUR8f+kN10EdB

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

tihe17.zapto.org:8030

Mutex

DC_MUTEX-X1RN242

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    umehiZR0cf0n

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06a15ab711359ca5c66335039793daaf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\06a15ab711359ca5c66335039793daaf_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\06a15ab711359ca5c66335039793daaf_JaffaCakes118.exe" +s +h
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp\06a15ab711359ca5c66335039793daaf_JaffaCakes118.exe" +s +h
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:2632
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:2588
    • C:\Users\Admin\AppData\Local\Temp\1.EXE
      "C:\Users\Admin\AppData\Local\Temp\1.EXE"
      2⤵
      • Executes dropped EXE
      • Maps connected drives based on registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Windows\syswow64\svchost.exe
        C:\Windows\syswow64\svchost.exe
        3⤵
        • Adds policy Run key to start application
        • Drops file in Program Files directory
        PID:2276
    • C:\Windows\SysWOW64\notepad.exe
      notepad
      2⤵
      • Deletes itself
      PID:2552
    • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
      "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
      2⤵
      • Modifies firewall policy service
      • Modifies security service
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2492
      • C:\Users\Admin\AppData\Local\Temp\1.EXE
        "C:\Users\Admin\AppData\Local\Temp\1.EXE"
        3⤵
        • Executes dropped EXE
        • Maps connected drives based on registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2940
        • C:\Windows\syswow64\svchost.exe
          C:\Windows\syswow64\svchost.exe
          4⤵
            PID:1768
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          3⤵
            PID:1960
          • C:\Windows\explorer.exe
            "C:\Windows\explorer.exe"
            3⤵
              PID:344
            • C:\Windows\SysWOW64\notepad.exe
              notepad
              3⤵
                PID:2332

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Persistence

          Boot or Logon Autostart Execution

          3
          T1547

          Registry Run Keys / Startup Folder

          2
          T1547.001

          Winlogon Helper DLL

          1
          T1547.004

          Create or Modify System Process

          2
          T1543

          Windows Service

          2
          T1543.003

          Privilege Escalation

          Boot or Logon Autostart Execution

          3
          T1547

          Registry Run Keys / Startup Folder

          2
          T1547.001

          Winlogon Helper DLL

          1
          T1547.004

          Create or Modify System Process

          2
          T1543

          Windows Service

          2
          T1543.003

          Defense Evasion

          Modify Registry

          8
          T1112

          Impair Defenses

          2
          T1562

          Disable or Modify Tools

          2
          T1562.001

          Hide Artifacts

          2
          T1564

          Hidden Files and Directories

          2
          T1564.001

          Discovery

          Query Registry

          1
          T1012

          Peripheral Device Discovery

          1
          T1120

          System Information Discovery

          2
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \Users\Admin\AppData\Local\Temp\1.EXE
            Filesize

            13KB

            MD5

            95ff7bbd32e9002d393e056828187814

            SHA1

            68a9b42cc5a5fd10f3cd53baaacbb80646b0c057

            SHA256

            40999d697b90d2ef63889c53e00cc1be3f94d2a0581198ad6199ed2a29a14e94

            SHA512

            8bc2f53dab5afa0eeb577fa9521bea42ccf7b176a2733dd312779774b31bc9e65b4fac7942386e0af76fa5a7dcde5e5d401abc7befb16ffb8091befaf9cf2d77

          • \Users\Admin\Documents\MSDCSC\msdcsc.exe
            Filesize

            770KB

            MD5

            06a15ab711359ca5c66335039793daaf

            SHA1

            95bd3194b060bc8e775e5bc0a76bc6dc0094a70b

            SHA256

            f51a0aa16b0a033eaeb45e5bbea6b492b499a0af1404309882f333f18f4e890a

            SHA512

            925fe2815b0ff212a26b1d1e63de27c44f83069c9a8b3643f114c28b9b6764ca867e5039324ca92174730f777dcd75e5f4f43b13583ff8ad599fbe810a58f998

          • memory/2040-0-0x0000000000270000-0x0000000000271000-memory.dmp
            Filesize

            4KB

          • memory/2040-7-0x0000000002600000-0x0000000002605000-memory.dmp
            Filesize

            20KB

          • memory/2276-13-0x00000000001F0000-0x00000000001F8000-memory.dmp
            Filesize

            32KB

          • memory/2492-62-0x0000000001E80000-0x0000000001E85000-memory.dmp
            Filesize

            20KB

          • memory/2552-42-0x00000000001F0000-0x00000000001F1000-memory.dmp
            Filesize

            4KB

          • memory/2552-14-0x0000000000080000-0x0000000000081000-memory.dmp
            Filesize

            4KB