Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2024, 00:09

General

  • Target

    a740572c4f3f7536b4ecb865b442efff_JaffaCakes118.exe

  • Size

    253KB

  • MD5

    a740572c4f3f7536b4ecb865b442efff

  • SHA1

    7568ce11bb45757ed8f24b5a0b68b9d876949e0f

  • SHA256

    157a376e0e9e28aa1ba429b2fbb1776a938e767d3c63dda1bf5e357888d49d7e

  • SHA512

    574a167dc10f008cabc73ff5927ff7e633660e3dc5c5191bfc2cc0dfef27dee0e608f06c93542ff3fe21fe1221faf8899e18efd602679e4ad2a2f329bb1be65e

  • SSDEEP

    6144:LD7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZl:Ll8E4w5huat7UovONzbXwx

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

192.168.1.2:8080

fixs2.hopto.rog:8080

Mutex

DC_MUTEX-H774XG1

Attributes
  • InstallPath

    MSDCSC\msdcsc.com

  • gencode

    NoUENzT16G7i

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a740572c4f3f7536b4ecb865b442efff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a740572c4f3f7536b4ecb865b442efff_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Users\Admin\Desktop\ôîòî íîæ.com
      "C:\Users\Admin\Desktop\ôîòî íîæ.com"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1640
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\Desktop\ôîòî íîæ.com" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\Desktop\ôîòî íîæ.com" +s +h
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:3012
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\Desktop" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2356
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\Desktop" +s +h
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:2672
      • C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.com
        "C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.com"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1928
        • C:\Windows\SysWOW64\notepad.exe
          notepad
          4⤵
            PID:2612

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\ôîòî íîæ.com

      Filesize

      253KB

      MD5

      624cd8952ea4ffeda2cac7b0fe423e68

      SHA1

      2471af0135bebad0fc716ca6bdeb32dcc2a6cbdf

      SHA256

      d386d8151807f0ffacd58fc7ea5b5b031e7ebf8a3d4e455c3010ed2251be5142

      SHA512

      67b59e984b0413d00108ab3a2d5beb5242518a8eb90a44fb5f9eecbbe58011f511f84ac0ba54067b8cb2a9d0c480eb4f0c7e27b8b4ce0044ea0df6ebf559a95d

    • memory/1640-9-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/1640-10-0x00000000002B0000-0x00000000002B1000-memory.dmp

      Filesize

      4KB

    • memory/1640-23-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/1928-68-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/1928-64-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/1928-66-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/1928-24-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/1928-70-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/1928-71-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/1928-73-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/1928-75-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/1928-77-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/2612-25-0x0000000000080000-0x0000000000081000-memory.dmp

      Filesize

      4KB

    • memory/2612-63-0x0000000000180000-0x0000000000181000-memory.dmp

      Filesize

      4KB