Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 03:51

General

  • Target

    0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe

  • Size

    660KB

  • MD5

    0290e54eb7e7f652fe81aedd265721d5

  • SHA1

    5b910e05680f4305a0cfe542b12841c8ca6453cf

  • SHA256

    582035e362c45975270e6868f215f00ee07866ae05e7a7b63fbaab44381bf423

  • SHA512

    2c0d8dc7332f2b56b85f0f547224a2d9566d2493c6c35122a5cd8d227c0688142aec25f6c9edc013243b236ad1507ba04d5ab40edb08034f0b6e5adeb55efeae

  • SSDEEP

    12288:4X2JVHMRtDaSm3TJvVNvWV5YTsY7tHwbz/htfcoCoK632zb7G/Q0n:uss2Sm39NNv9wY7tHwbzfIoK6Mof

Malware Config

Extracted

Family

darkcomet

Botnet

Retards

C2

tehboss.no-ip.org:1604

Mutex

DC_MUTEX-5BJCK2U

Attributes
  • InstallPath

    microsoft\svchost.exe

  • gencode

    EpZ3tJtuYHzf

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    winlogon

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Windows\SysWOW64\notepad.exe
      notepad
      2⤵
      • Deletes itself
      PID:116
    • C:\Users\Admin\AppData\Roaming\microsoft\svchost.exe
      "C:\Users\Admin\AppData\Roaming\microsoft\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
          PID:2168
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          3⤵
            PID:4288
          • C:\Windows\SysWOW64\notepad.exe
            notepad
            3⤵
              PID:1468

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Boot or Logon Autostart Execution

        2
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Winlogon Helper DLL

        1
        T1547.004

        Privilege Escalation

        Boot or Logon Autostart Execution

        2
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Winlogon Helper DLL

        1
        T1547.004

        Defense Evasion

        Modify Registry

        2
        T1112

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        2
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
          Filesize

          660KB

          MD5

          0290e54eb7e7f652fe81aedd265721d5

          SHA1

          5b910e05680f4305a0cfe542b12841c8ca6453cf

          SHA256

          582035e362c45975270e6868f215f00ee07866ae05e7a7b63fbaab44381bf423

          SHA512

          2c0d8dc7332f2b56b85f0f547224a2d9566d2493c6c35122a5cd8d227c0688142aec25f6c9edc013243b236ad1507ba04d5ab40edb08034f0b6e5adeb55efeae

        • memory/116-3-0x0000000000580000-0x0000000000581000-memory.dmp
          Filesize

          4KB

        • memory/1468-65-0x0000000000F80000-0x0000000000F81000-memory.dmp
          Filesize

          4KB

        • memory/2024-70-0x0000000000400000-0x00000000004B4000-memory.dmp
          Filesize

          720KB

        • memory/2024-72-0x0000000000400000-0x00000000004B4000-memory.dmp
          Filesize

          720KB

        • memory/2024-79-0x0000000000400000-0x00000000004B4000-memory.dmp
          Filesize

          720KB

        • memory/2024-66-0x0000000000400000-0x00000000004B4000-memory.dmp
          Filesize

          720KB

        • memory/2024-67-0x0000000000400000-0x00000000004B4000-memory.dmp
          Filesize

          720KB

        • memory/2024-68-0x0000000000400000-0x00000000004B4000-memory.dmp
          Filesize

          720KB

        • memory/2024-69-0x0000000000400000-0x00000000004B4000-memory.dmp
          Filesize

          720KB

        • memory/2024-78-0x0000000000400000-0x00000000004B4000-memory.dmp
          Filesize

          720KB

        • memory/2024-71-0x0000000000400000-0x00000000004B4000-memory.dmp
          Filesize

          720KB

        • memory/2024-64-0x0000000002370000-0x0000000002371000-memory.dmp
          Filesize

          4KB

        • memory/2024-73-0x0000000000400000-0x00000000004B4000-memory.dmp
          Filesize

          720KB

        • memory/2024-74-0x0000000000400000-0x00000000004B4000-memory.dmp
          Filesize

          720KB

        • memory/2024-75-0x0000000000400000-0x00000000004B4000-memory.dmp
          Filesize

          720KB

        • memory/2024-76-0x0000000000400000-0x00000000004B4000-memory.dmp
          Filesize

          720KB

        • memory/2024-77-0x0000000000400000-0x00000000004B4000-memory.dmp
          Filesize

          720KB

        • memory/2728-0-0x0000000002250000-0x0000000002251000-memory.dmp
          Filesize

          4KB

        • memory/2728-62-0x0000000000400000-0x00000000004B4000-memory.dmp
          Filesize

          720KB