Analysis

  • max time kernel
    143s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2024 07:29

General

  • Target

    1b6b13653278e38989a3ab4025a69a97_JaffaCakes118.exe

  • Size

    6.7MB

  • MD5

    1b6b13653278e38989a3ab4025a69a97

  • SHA1

    4d9573df4054a6cfc2d2d3ea91876368a95e405a

  • SHA256

    1b75e1edeb875c5218baebebc304a5acab2de18c8970506d4fb0dfcae2ef13c4

  • SHA512

    7b9e554a6414f1751addce0b158bfbc107f772c13e6dd52d16989f0f33c0afabe11a4d854afe2614166401cdffdf77564b79db894f2f61556cb91dc5525f325b

  • SSDEEP

    196608:nwk9Yh8IRzdq9DK+C/J4X3hDzFLcje2x1Rzf+Qkc5OsHuyDjKa:nw79q9DdCJ41Geu1Rzf+lA7uyDjKa

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

andreprivet.ddns.net:1604

Mutex

DC_MUTEX-RWR5U28

Attributes
  • InstallPath

    zh-PH\WWAHost.exe

  • gencode

    WolGzuCR4Xlr

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    WAHost

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b6b13653278e38989a3ab4025a69a97_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1b6b13653278e38989a3ab4025a69a97_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Roaming\start.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Users\Admin\AppData\Roaming\11.exe
        11.exe -p03658512984 -dC:\Users\Admin\AppData\Roaming
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2508
        • C:\Users\Admin\AppData\Roaming\po.exe
          "C:\Users\Admin\AppData\Roaming\po.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2792
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\po.exe" +s +h
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1912
            • C:\Windows\SysWOW64\attrib.exe
              attrib "C:\Users\Admin\AppData\Roaming\po.exe" +s +h
              6⤵
              • Sets file to hidden
              • Views/modifies file attributes
              PID:2000
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming" +s +h
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:484
            • C:\Windows\SysWOW64\attrib.exe
              attrib "C:\Users\Admin\AppData\Roaming" +s +h
              6⤵
              • Sets file to hidden
              • Views/modifies file attributes
              PID:1968
          • C:\Windows\SysWOW64\zh-PH\WWAHost.exe
            "C:\Windows\system32\zh-PH\WWAHost.exe"
            5⤵
            • Modifies firewall policy service
            • Executes dropped EXE
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1780
            • C:\Windows\SysWOW64\notepad.exe
              notepad
              6⤵
                PID:620
          • C:\Program Files\VideoLAN\VLC\vlc.exe
            "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Roaming\12.mp3"
            4⤵
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            PID:1928
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:692

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\12.mp3

      Filesize

      7.1MB

      MD5

      994ed675fa3c1ec9be2dc88f80a54d6c

      SHA1

      0be3478c5cbe848ea920d87c7853aec2c3d990fa

      SHA256

      95012f310436a52c4e083fabdf42db4c8d3242bc42689b63e8e613f73696d924

      SHA512

      38e04c70da86d6a1b473188789712236c09967139581da9578c23804d56f2866b3b1fb2cf115658624c0d6e044f00ba804b8c4efbbb77926b4affdc84af6f901

    • C:\Users\Admin\AppData\Roaming\em7zgKwn0yM.jpg

      Filesize

      13KB

      MD5

      2341cf2283361b7a0f971f592bb88e0d

      SHA1

      4b9de14303a97a791449b8d972132ab4188f1e8a

      SHA256

      21ac2c0e131e17e2a4210a020ae7857ab3dd0968cd0696f65dbe6ffaa4ead26c

      SHA512

      2bbb780c096ebe683d5b0c1e2e14390536dfecf0643b41f4b7922b90a20d822b7846ebe7d6fc2f11deb79987a52a157c2867768a3d581b239d76c3894faebcfd

    • C:\Users\Admin\AppData\Roaming\start.bat

      Filesize

      32B

      MD5

      d9b4214e353ba616f5edc2633ba76e36

      SHA1

      a69e0090704947fd72fbfab013699aa56896121b

      SHA256

      f027b25ce42d032279e22532ebae52023482a4fb278d4c3159ccab3102e0fc28

      SHA512

      9d89a0fa65de20b5a089e304939f0da1a34d5ee0509564c42de63e164a1216df31f5e0f0a208f2b9851c33902ef568853322f3df02a0415c78ed66be16b78121

    • \Users\Admin\AppData\Roaming\11.exe

      Filesize

      6.6MB

      MD5

      eea149721c01291896b69895fd414964

      SHA1

      cd7f559e2847a6d26679472040ecc05ab8eef548

      SHA256

      5c4bf3713ff356a995d6fa59b7e68105ab4385cd22f6f519fbe3bdf993add823

      SHA512

      e01aec03356ac64b704d42bf764e89bb286a966f5c2da65201737a5af1accab04d5be8be5f07833a96b5525c9697334bcbddde2ad6f1e6932d7d526a352ea7a7

    • \Users\Admin\AppData\Roaming\po.exe

      Filesize

      251KB

      MD5

      010b72d9045c7aede13473e1f4514ca9

      SHA1

      50cc0ba901b8bc1cfd34a277af34b7f666d1f693

      SHA256

      67bd0a65268d058dbf0ca7cd6a4b30060a4aa60bfd3d59c04768b1422d7f433a

      SHA512

      1c492a8927196c028c49931bbc99f6f1dd26f4d97eca35d576c953786d3101119910bb39d9a22b1a65289ad3d66c703bc69305ca616372f03443a17bfc0b3a65

    • memory/620-100-0x0000000000220000-0x0000000000221000-memory.dmp

      Filesize

      4KB

    • memory/620-62-0x00000000000C0000-0x00000000000C1000-memory.dmp

      Filesize

      4KB

    • memory/692-51-0x00000000001A0000-0x00000000001A2000-memory.dmp

      Filesize

      8KB

    • memory/1780-110-0x0000000000400000-0x00000000004B7000-memory.dmp

      Filesize

      732KB

    • memory/1780-109-0x0000000000400000-0x00000000004B7000-memory.dmp

      Filesize

      732KB

    • memory/1780-60-0x0000000000400000-0x00000000004B7000-memory.dmp

      Filesize

      732KB

    • memory/1928-112-0x000007FEFB350000-0x000007FEFB384000-memory.dmp

      Filesize

      208KB

    • memory/1928-131-0x000007FEF6B50000-0x000007FEF6B68000-memory.dmp

      Filesize

      96KB

    • memory/1928-124-0x000007FEF77A0000-0x000007FEF77C1000-memory.dmp

      Filesize

      132KB

    • memory/1928-126-0x000007FEF7760000-0x000007FEF7771000-memory.dmp

      Filesize

      68KB

    • memory/1928-127-0x000007FEF6C30000-0x000007FEF6C41000-memory.dmp

      Filesize

      68KB

    • memory/1928-128-0x000007FEF6C10000-0x000007FEF6C21000-memory.dmp

      Filesize

      68KB

    • memory/1928-111-0x000000013FFE0000-0x00000001400D8000-memory.dmp

      Filesize

      992KB

    • memory/1928-129-0x000007FEF6BF0000-0x000007FEF6C0B000-memory.dmp

      Filesize

      108KB

    • memory/1928-114-0x000007FEFB3A0000-0x000007FEFB3B8000-memory.dmp

      Filesize

      96KB

    • memory/1928-116-0x000007FEFB0A0000-0x000007FEFB0B1000-memory.dmp

      Filesize

      68KB

    • memory/1928-118-0x000007FEF7980000-0x000007FEF7991000-memory.dmp

      Filesize

      68KB

    • memory/1928-120-0x000007FEF7940000-0x000007FEF7951000-memory.dmp

      Filesize

      68KB

    • memory/1928-119-0x000007FEF7960000-0x000007FEF797D000-memory.dmp

      Filesize

      116KB

    • memory/1928-117-0x000007FEF79A0000-0x000007FEF79B7000-memory.dmp

      Filesize

      92KB

    • memory/1928-115-0x000007FEFB0C0000-0x000007FEFB0D7000-memory.dmp

      Filesize

      92KB

    • memory/1928-113-0x000007FEF6230000-0x000007FEF64E4000-memory.dmp

      Filesize

      2.7MB

    • memory/1928-121-0x000007FEF6030000-0x000007FEF6230000-memory.dmp

      Filesize

      2.0MB

    • memory/1928-123-0x000007FEF77D0000-0x000007FEF780F000-memory.dmp

      Filesize

      252KB

    • memory/1928-125-0x000007FEF7780000-0x000007FEF7798000-memory.dmp

      Filesize

      96KB

    • memory/1928-132-0x000007FEF4F50000-0x000007FEF4F80000-memory.dmp

      Filesize

      192KB

    • memory/1928-130-0x000007FEF6BD0000-0x000007FEF6BE1000-memory.dmp

      Filesize

      68KB

    • memory/2508-50-0x0000000000C80000-0x0000000000C82000-memory.dmp

      Filesize

      8KB

    • memory/2508-45-0x00000000031E0000-0x0000000003297000-memory.dmp

      Filesize

      732KB

    • memory/2508-43-0x00000000031E0000-0x0000000003297000-memory.dmp

      Filesize

      732KB

    • memory/2508-35-0x00000000031E0000-0x0000000003297000-memory.dmp

      Filesize

      732KB

    • memory/2792-46-0x0000000000400000-0x00000000004B7000-memory.dmp

      Filesize

      732KB

    • memory/2792-103-0x0000000000400000-0x00000000004B7000-memory.dmp

      Filesize

      732KB