Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 20:17

General

  • Target

    731f51dcfb5d968e90f82457084f2849_JaffaCakes118.exe

  • Size

    821KB

  • MD5

    731f51dcfb5d968e90f82457084f2849

  • SHA1

    0a06d69c986a21f37310b6b0bc4df8b2e66eca3f

  • SHA256

    e033486b4c119f41962837b8b84f91c8d86a3bf6d0b9ce8e5221ef18311f6268

  • SHA512

    a2d4dd55efe459ca2c6e092b58d4b2511dd504b82dbc8277c2a78ca8b0709b97832926467008abbbb01aae991e1a8297e987a9750a8ac93aca5dfd1abbf78f36

  • SSDEEP

    12288:PFLlJnnbWOtz6sVJhvaz1Qc/WdI//vfM4qwrbkniafLo6vUTyl0w/q9jJZYG:d3nbWmJVJFwSddIXvfhqbiaxvRxq9x

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Windows security modification 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\731f51dcfb5d968e90f82457084f2849_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\731f51dcfb5d968e90f82457084f2849_JaffaCakes118.exe"
    1⤵
    • Modifies firewall policy service
    • Modifies security service
    • Windows security bypass
    • Disables RegEdit via registry modification
    • Windows security modification
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2752
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
      2⤵
        PID:2324
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        2⤵
          PID:4376

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Create or Modify System Process

      2
      T1543

      Windows Service

      2
      T1543.003

      Privilege Escalation

      Create or Modify System Process

      2
      T1543

      Windows Service

      2
      T1543.003

      Defense Evasion

      Modify Registry

      5
      T1112

      Impair Defenses

      2
      T1562

      Disable or Modify Tools

      2
      T1562.001

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2752-0-0x0000000002150000-0x0000000002151000-memory.dmp
        Filesize

        4KB

      • memory/2752-1-0x0000000000400000-0x00000000004DB000-memory.dmp
        Filesize

        876KB

      • memory/2752-3-0x0000000000400000-0x00000000004DB000-memory.dmp
        Filesize

        876KB

      • memory/2752-4-0x0000000000400000-0x00000000004DB000-memory.dmp
        Filesize

        876KB

      • memory/2752-6-0x0000000000400000-0x00000000004DB000-memory.dmp
        Filesize

        876KB